Analysis
-
max time kernel
151s -
max time network
178s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 10:54
Behavioral task
behavioral1
Sample
928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe
Resource
win10v2004-20221111-en
General
-
Target
928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe
-
Size
516KB
-
MD5
37c9f3557e3ec966350b8ca66a63d7c8
-
SHA1
fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
-
SHA256
928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
-
SHA512
3cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
SSDEEP
12288:7oZLpiEZJvHmHmktFxydpPyz+UoCn+v98noWLdoSR:kZLp8mkHYd06cOKnok
Malware Config
Extracted
cybergate
v1.07.5
satz client
satzbeiber.no-ip.info:82
G122MH31Q5K2H7
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winrawr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" winrawr.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run winrawr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" winrawr.exe -
Executes dropped EXE 5 IoCs
pid Process 1852 winrawr.exe 856 winrawr.exe 1804 winrawr.exe 1624 server.exe 1660 server.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{C571601X-Y625-VW65-5720-6SSF4CF1C805} winrawr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C571601X-Y625-VW65-5720-6SSF4CF1C805}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" winrawr.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{C571601X-Y625-VW65-5720-6SSF4CF1C805} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C571601X-Y625-VW65-5720-6SSF4CF1C805}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
resource yara_rule behavioral1/memory/1636-57-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/files/0x000a00000001230c-61.dat upx behavioral1/files/0x000a00000001230c-65.dat upx behavioral1/files/0x000a00000001230c-64.dat upx behavioral1/files/0x000a00000001230c-63.dat upx behavioral1/files/0x000a00000001230c-62.dat upx behavioral1/files/0x000a00000001230c-67.dat upx behavioral1/memory/1636-68-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/files/0x000a00000001230c-71.dat upx behavioral1/memory/856-72-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1852-76-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/files/0x000a00000001230c-74.dat upx behavioral1/memory/856-77-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/856-79-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/856-80-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/856-81-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/856-83-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/856-92-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/792-97-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/files/0x000800000001231b-99.dat upx behavioral1/memory/792-100-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/856-102-0x00000000104F0000-0x0000000010555000-memory.dmp upx behavioral1/files/0x000a00000001230c-107.dat upx behavioral1/memory/1804-109-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/memory/856-110-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/856-116-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1804-115-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/files/0x000800000001231b-117.dat upx behavioral1/files/0x000800000001231b-118.dat upx behavioral1/files/0x000800000001231b-120.dat upx behavioral1/memory/1804-123-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1624-125-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/files/0x000800000001231b-131.dat upx behavioral1/memory/1660-134-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1624-136-0x0000000000400000-0x0000000000B9D000-memory.dmp upx behavioral1/memory/1660-135-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1660-137-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1660-138-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/1804-139-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Loads dropped DLL 7 IoCs
pid Process 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 1804 winrawr.exe 1804 winrawr.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winrawr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" winrawr.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run winrawr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" winrawr.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\win rawr = "C:\\Users\\Admin\\AppData\\Roaming\\winrawr.exe" reg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe winrawr.exe File opened for modification C:\Windows\SysWOW64\install\server.exe winrawr.exe File opened for modification C:\Windows\SysWOW64\install\server.exe winrawr.exe File opened for modification C:\Windows\SysWOW64\install\ winrawr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1852 set thread context of 856 1852 winrawr.exe 34 PID 1624 set thread context of 1660 1624 server.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 856 winrawr.exe 1660 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1804 winrawr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 792 explorer.exe Token: SeRestorePrivilege 792 explorer.exe Token: SeBackupPrivilege 1804 winrawr.exe Token: SeRestorePrivilege 1804 winrawr.exe Token: SeDebugPrivilege 1804 winrawr.exe Token: SeDebugPrivilege 1804 winrawr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 winrawr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 1852 winrawr.exe 1624 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 748 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 30 PID 1636 wrote to memory of 748 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 30 PID 1636 wrote to memory of 748 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 30 PID 1636 wrote to memory of 748 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 30 PID 748 wrote to memory of 1560 748 cmd.exe 32 PID 748 wrote to memory of 1560 748 cmd.exe 32 PID 748 wrote to memory of 1560 748 cmd.exe 32 PID 748 wrote to memory of 1560 748 cmd.exe 32 PID 1636 wrote to memory of 1852 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 33 PID 1636 wrote to memory of 1852 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 33 PID 1636 wrote to memory of 1852 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 33 PID 1636 wrote to memory of 1852 1636 928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe 33 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 1852 wrote to memory of 856 1852 winrawr.exe 34 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20 PID 856 wrote to memory of 1244 856 winrawr.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe"C:\Users\Admin\AppData\Local\Temp\928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "win rawr" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winrawr.exe" /f4⤵
- Adds Run key to start application
PID:1560
-
-
-
C:\Users\Admin\AppData\Roaming\winrawr.exe"C:\Users\Admin\AppData\Roaming\winrawr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Roaming\winrawr.exe"C:\Users\Admin\AppData\Roaming\winrawr.exe"4⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1596
-
-
C:\Users\Admin\AppData\Roaming\winrawr.exe"C:\Users\Admin\AppData\Roaming\winrawr.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\SysWOW64\install\server.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5256cc58ec06f79a6945eaec6f0afaba4
SHA19798af7c334a273fef8bf58514b5458fe2072b8c
SHA256e818d6a1302f9a027feb83d8aae893f00b342db8823ee628122c00b04af159a9
SHA512540404c5815a473079f691d9da97378f744621e23e0474ed1a756b8aef24bd5fed76d4df9d86a5a18ff64bf8dbd667d90c0b1965c73829db3ff81b949afb446c
-
Filesize
1KB
MD5ff50b64b66650852b3749433beee3300
SHA188f820fed71e4a946edd1197a47f5575fcc5dc4b
SHA2563e27fabf6a09784276840f91fe96fc9a9cb26403917e6d804e1bd64b1db15100
SHA512c86897dd6f700ced18896215b125c176c3c3e7d3cb8dc59ef526b27315310ef2b3d9f56ccbb6d6e4cc4ca7449fbd6fda351282fd6e3cf5458c1b3c4fd21e7dc7
-
Filesize
224KB
MD57ee1a8fae0168480ae9b6b6d35ad6984
SHA1cee3759e7b951f16f8481c2d1d5dd15576b54232
SHA2566f49acdf03e4705cb5ac59bc4fd89ab617c2ea42de51fcefecc78f8280fea849
SHA5125994d81b0c3c265221d39e645274038072ba557fa1ceada6c72d572f5db21c8d5a4157dd5ff9cda22455d9365b41f84f2d065e69c3ce9ba85563de59e4c90c53
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998
-
Filesize
516KB
MD537c9f3557e3ec966350b8ca66a63d7c8
SHA1fe0d64d55fb23cd39db79e9ce7e7ce9ee8435b3d
SHA256928855e9fc17c49dcb9ec087095df7c67f6d87a8b812da0cb1ce4a21d2ea77c4
SHA5123cdad0e71b93f0ace46403f2b00f6abd0a18eb33ec9f09fa675f3707e50c9c6de8dcf0fe9f5ac9fa811a185b4f562509e4abd0f48ceb4493a8eaf54c993bd998