Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 07:30
Static task
static1
Behavioral task
behavioral1
Sample
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe
Resource
win7-20240508-en
General
-
Target
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe
-
Size
4.8MB
-
MD5
cf0b2b6db9247d897dce923963cd4489
-
SHA1
69ee0a9e0d6162cf702e57f3869eb5ae3eec8661
-
SHA256
ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975
-
SHA512
2d9a61c9c38f3e71c558a2fa155a9b39ed48b4fe2dd2c045bf5c38ff7c70dfa640a7b4d85533ba74156cc4fba3dfe6f6ee28e84ea1d032ee2ae9f37cdbcc1dd9
-
SSDEEP
24576:W4L1dN9IgGFCXy3DryDNYhJkfdTazmaj9Tb9X9Pu3mmGld6oKZmMP+73lIqV:NB3pyYqhJkfdVa5TLG3mmhHmMP+bl3V
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Loads dropped DLL 1 IoCs
pid Process 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
resource yara_rule behavioral1/memory/1684-0-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-7-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-13-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-6-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-4-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-14-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-12-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-17-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-8-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-5-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-42-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-43-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-45-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-46-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-47-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-49-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-50-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-51-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-54-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-55-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-62-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-64-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-66-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-68-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-71-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-72-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-75-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-77-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-81-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-83-0x0000000002950000-0x0000000003A0A000-memory.dmp upx behavioral1/memory/1684-84-0x0000000002950000-0x0000000003A0A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\S: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\T: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\Y: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\I: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\L: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\O: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\N: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\P: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\Q: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\V: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\E: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\H: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\J: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\M: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\Z: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\X: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\K: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\R: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\U: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened (read-only) \??\W: ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened for modification F:\autorun.inf ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\f763237 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe File opened for modification C:\Windows\SYSTEM.INI ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeManageVolumePrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeManageVolumePrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe Token: SeDebugPrivilege 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1104 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 19 PID 1684 wrote to memory of 1168 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 20 PID 1684 wrote to memory of 1204 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 21 PID 1684 wrote to memory of 1624 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 23 PID 1684 wrote to memory of 1104 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 19 PID 1684 wrote to memory of 1168 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 20 PID 1684 wrote to memory of 1204 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 21 PID 1684 wrote to memory of 1104 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 19 PID 1684 wrote to memory of 1168 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 20 PID 1684 wrote to memory of 1204 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 21 PID 1684 wrote to memory of 1104 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 19 PID 1684 wrote to memory of 1168 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 20 PID 1684 wrote to memory of 1204 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 21 PID 1684 wrote to memory of 1104 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 19 PID 1684 wrote to memory of 1168 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 20 PID 1684 wrote to memory of 1204 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 21 PID 1684 wrote to memory of 1104 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 19 PID 1684 wrote to memory of 1168 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 20 PID 1684 wrote to memory of 1204 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 21 PID 1684 wrote to memory of 1104 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 19 PID 1684 wrote to memory of 1168 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 20 PID 1684 wrote to memory of 1204 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 21 PID 1684 wrote to memory of 1556 1684 ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe 30 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1104
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1168
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe"C:\Users\Admin\AppData\Local\Temp\ab84fa30df78283736e231eeb8931d333e75765c693a2916b96c47926a192975.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1684
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1624
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1556
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD58b17fe253285961fe8e4a206ac3a81fb
SHA1d72e1905d86189f992083bd533bc198ea28c853d
SHA2563b6ebf2f2487e777a23946d0e6ddcb39426aadc9b5df261f0ff4b09cbf74fe4d
SHA512c35758d7b32111c614517ed693e4608dcf03dcf0154bdcd852707331bb5fd14daa44b014f4bb63b9137d4dd410b200af021b9262df2fbcd32eb99576acc3edb8
-
Filesize
480KB
MD5d5f22fc1beff60f5fa9398effca73e2f
SHA1f84c5f048b5269381a8c6d1dc21905458856543b
SHA256214a5e9aab33148866db82ab51c5bcce9e4240794c2c2850fa0f7b3bc3aa34e6
SHA512b031336bf42a55e738a412b39acff8b57892f8d2b49c3ec4eadc9f7c9ad45cbc0f5b06a921fd07cfed2faf2de07c6957dfd8975de5e322f0f82c558ee9dcf1c3