Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 02:03
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.00ab2708d7778ad98cb032a24c965fe0_JC.dll
Resource
win7-20231020-en
General
-
Target
NEAS.00ab2708d7778ad98cb032a24c965fe0_JC.dll
-
Size
120KB
-
MD5
00ab2708d7778ad98cb032a24c965fe0
-
SHA1
3339165357f4f0d29ede4e0a65f65446f949b09f
-
SHA256
63c64c0ac585acba98b208bdfb221465ff45f89bf5a2763acc0f175643760feb
-
SHA512
9226f624a373751ed4bf98023233a2b2a3acbb8eaaf4f88af85721a7bcdd629c0b2124bf7b50bbdb3f88eafd26b09f178907265728156df3fbefd8b5f8d113ae
-
SSDEEP
1536:sA0DjyfXTcSPARecIT/l2Yn+JveTlhlwsBdaB0vc40p2pM8QgMYvzWjy:sA0DjyXp4RecId+JIlhOrQW8QgvzWj
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76534e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76392a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f76392a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f76534e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76534e.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76534e.exe -
Executes dropped EXE 3 IoCs
pid Process 1700 f76392a.exe 3024 f76406a.exe 2568 f76534e.exe -
Loads dropped DLL 6 IoCs
pid Process 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe 2532 rundll32.exe -
resource yara_rule behavioral1/memory/1700-11-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-15-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-16-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-19-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-23-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-26-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-33-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-47-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-56-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-59-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-60-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-61-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-62-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-63-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-64-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-79-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-80-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-81-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-84-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-86-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-106-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-108-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/1700-145-0x0000000000640000-0x00000000016FA000-memory.dmp upx behavioral1/memory/2568-150-0x0000000000900000-0x00000000019BA000-memory.dmp upx behavioral1/memory/2568-187-0x0000000000900000-0x00000000019BA000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76534e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f76534e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f76392a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76534e.exe -
Enumerates connected drives 3 TTPs 11 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: f76392a.exe File opened (read-only) \??\H: f76392a.exe File opened (read-only) \??\I: f76392a.exe File opened (read-only) \??\J: f76392a.exe File opened (read-only) \??\N: f76392a.exe File opened (read-only) \??\E: f76392a.exe File opened (read-only) \??\K: f76392a.exe File opened (read-only) \??\L: f76392a.exe File opened (read-only) \??\M: f76392a.exe File opened (read-only) \??\O: f76392a.exe File opened (read-only) \??\P: f76392a.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f763a42 f76392a.exe File opened for modification C:\Windows\SYSTEM.INI f76392a.exe File created C:\Windows\f769492 f76534e.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1700 f76392a.exe 1700 f76392a.exe 2568 f76534e.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 1700 f76392a.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe Token: SeDebugPrivilege 2568 f76534e.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2532 2564 rundll32.exe 28 PID 2564 wrote to memory of 2532 2564 rundll32.exe 28 PID 2564 wrote to memory of 2532 2564 rundll32.exe 28 PID 2564 wrote to memory of 2532 2564 rundll32.exe 28 PID 2564 wrote to memory of 2532 2564 rundll32.exe 28 PID 2564 wrote to memory of 2532 2564 rundll32.exe 28 PID 2564 wrote to memory of 2532 2564 rundll32.exe 28 PID 2532 wrote to memory of 1700 2532 rundll32.exe 29 PID 2532 wrote to memory of 1700 2532 rundll32.exe 29 PID 2532 wrote to memory of 1700 2532 rundll32.exe 29 PID 2532 wrote to memory of 1700 2532 rundll32.exe 29 PID 1700 wrote to memory of 1104 1700 f76392a.exe 13 PID 1700 wrote to memory of 1164 1700 f76392a.exe 14 PID 1700 wrote to memory of 1192 1700 f76392a.exe 16 PID 1700 wrote to memory of 1856 1700 f76392a.exe 22 PID 1700 wrote to memory of 2564 1700 f76392a.exe 27 PID 1700 wrote to memory of 2532 1700 f76392a.exe 28 PID 1700 wrote to memory of 2532 1700 f76392a.exe 28 PID 2532 wrote to memory of 3024 2532 rundll32.exe 30 PID 2532 wrote to memory of 3024 2532 rundll32.exe 30 PID 2532 wrote to memory of 3024 2532 rundll32.exe 30 PID 2532 wrote to memory of 3024 2532 rundll32.exe 30 PID 2532 wrote to memory of 2568 2532 rundll32.exe 31 PID 2532 wrote to memory of 2568 2532 rundll32.exe 31 PID 2532 wrote to memory of 2568 2532 rundll32.exe 31 PID 2532 wrote to memory of 2568 2532 rundll32.exe 31 PID 1700 wrote to memory of 1104 1700 f76392a.exe 13 PID 1700 wrote to memory of 1164 1700 f76392a.exe 14 PID 1700 wrote to memory of 1192 1700 f76392a.exe 16 PID 1700 wrote to memory of 3024 1700 f76392a.exe 30 PID 1700 wrote to memory of 3024 1700 f76392a.exe 30 PID 1700 wrote to memory of 2568 1700 f76392a.exe 31 PID 1700 wrote to memory of 2568 1700 f76392a.exe 31 PID 2568 wrote to memory of 1104 2568 f76534e.exe 13 PID 2568 wrote to memory of 1164 2568 f76534e.exe 14 PID 2568 wrote to memory of 1192 2568 f76534e.exe 16 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76392a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f76534e.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.00ab2708d7778ad98cb032a24c965fe0_JC.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.00ab2708d7778ad98cb032a24c965fe0_JC.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\f76392a.exeC:\Users\Admin\AppData\Local\Temp\f76392a.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\f76406a.exeC:\Users\Admin\AppData\Local\Temp\f76406a.exe4⤵
- Executes dropped EXE
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\f76534e.exeC:\Users\Admin\AppData\Local\Temp\f76534e.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2568
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
257B
MD59af897d172d504e8ddd996cfa864ffe2
SHA10283ad550501390ffc10f161bcc437615f75a50c
SHA256432e070f2a930b4566fb1eca8dc1f11c87d77a4c072ef90704e782a5793ecb38
SHA512be3b9b341218bb91ed6fcf93652f913a9463f6d1c52b5151ff8e33235e9b3d8976094725e222ed75deeaf8c3bb6fb92e92dd2715c0c63b52da8dc88ee58eb263
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf
-
Filesize
97KB
MD5d0f207ed656d6efa9365ef17dadf6a8c
SHA1fc594b20cd5b0a392374d63c67099c7ab1f8435a
SHA256b472e696b762413c85fcd148f3c46a5fbcd971fd56a302753b507bcde52710f7
SHA512d3ccf0c52664e6dee1455d306b0c5b24a60ad9f94026d694e98090d5688e775d1c9e77644fe63dd6a6a432c6d745ee3f7460f45dc1b1938ef2152353484247bf