Analysis
-
max time kernel
34s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
1ff9879aba9138b20606b03471ec3d11
-
SHA1
3b4e3eec402e23200372840a1ba15362a5171119
-
SHA256
83a4c4955e180a527d9057901b5e1abfea25de6078856364d795ca53d68cd530
-
SHA512
92f3ca8002886b6009568b3ae7970b683eaf3e1408a473a8cc8961a8c11179c29f86448d183b8e701af27ecba98b98e697e3af07759de512d6e53ae5f3f78ef3
-
SSDEEP
49152:JW1lxogtOUV5vcxh5K1/l2HhM6auEqA6bggdR:JW1Dth/cTqlYMG7ngW
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c20c2a39b4.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1888 chrome.exe 288 chrome.exe 744 chrome.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c20c2a39b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c20c2a39b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe -
Executes dropped EXE 2 IoCs
pid Process 2532 skotes.exe 2780 c20c2a39b4.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine c20c2a39b4.exe Key opened \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Wine file.exe -
Loads dropped DLL 3 IoCs
pid Process 2240 file.exe 2532 skotes.exe 2532 skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000195c5-93.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2240 file.exe 2532 skotes.exe 2780 c20c2a39b4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2188 2780 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2864 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2240 file.exe 2532 skotes.exe 2780 c20c2a39b4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 file.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2532 2240 file.exe 30 PID 2240 wrote to memory of 2532 2240 file.exe 30 PID 2240 wrote to memory of 2532 2240 file.exe 30 PID 2240 wrote to memory of 2532 2240 file.exe 30 PID 2532 wrote to memory of 2780 2532 skotes.exe 33 PID 2532 wrote to memory of 2780 2532 skotes.exe 33 PID 2532 wrote to memory of 2780 2532 skotes.exe 33 PID 2532 wrote to memory of 2780 2532 skotes.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\1007864001\c20c2a39b4.exe"C:\Users\Admin\AppData\Local\Temp\1007864001\c20c2a39b4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
PID:1888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7039758,0x7fef7039768,0x7fef70397785⤵PID:2368
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1176,i,12202193460034013037,16804783892326860686,131072 /prefetch:25⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1532 --field-trial-handle=1176,i,12202193460034013037,16804783892326860686,131072 /prefetch:85⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1176,i,12202193460034013037,16804783892326860686,131072 /prefetch:85⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1528 --field-trial-handle=1176,i,12202193460034013037,16804783892326860686,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2232 --field-trial-handle=1176,i,12202193460034013037,16804783892326860686,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1392 --field-trial-handle=1176,i,12202193460034013037,16804783892326860686,131072 /prefetch:25⤵PID:2592
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵PID:3004
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 9644⤵
- Program crash
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007865001\f15a14c13c.exe"C:\Users\Admin\AppData\Local\Temp\1007865001\f15a14c13c.exe"3⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\1007866001\ae7a19e39a.exe"C:\Users\Admin\AppData\Local\Temp\1007866001\ae7a19e39a.exe"3⤵PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\1007867001\e928bac014.exe"C:\Users\Admin\AppData\Local\Temp\1007867001\e928bac014.exe"3⤵PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\1007868001\cc194fc276.exe"C:\Users\Admin\AppData\Local\Temp\1007868001\cc194fc276.exe"3⤵PID:2492
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
2.1MB
MD539087eedf788929413d57b9d6ed122ce
SHA1b6f64402556e62a07da3619c3754d326d57466c6
SHA256c7056773d8ec1c9198d9e9b527081d9bddb03fa73f08b5f1fe4670445b9d7eab
SHA5129a9787ce0cbc9794354160efedfec74aa4726965221abdef225b09474cfaff80ebfade61c2c0c51f5a1dd82ed03a75463824439714a9eebae4cc54376a8583cf
-
Filesize
1.6MB
MD5d286d2909ff282f2481e287797e4242e
SHA16bf3dcffde37c4a8ed744775cdcc24635e52838f
SHA25693e514083ac18782f4d7ba982e923ba76e1c7d8ef69eb19831c662cfa19b9d2f
SHA51269b6dcdc47e306d0712aa8e1604d69a598629986b2eebcdafce4a032be48ce9aa135df7f9b5ce360a2d4bd2d7ed2e1a7e9b7aaf977171ce33e4224bedbacb0b1
-
Filesize
1.1MB
MD528e44392ffd7ed9a54f12be352fed5ff
SHA13221ee0a73b7c884fd0fbf3fd2d42da4ad72595c
SHA25638332af4cc2256cda421a104e7033b2dbccc5e408dc69b8615745573b95c5254
SHA5121de030fd87eae01b002391f9bd2e97933b63028fee0f38dc849811f66e6b04af568fb4241ecb623edf7476a5ecc88a23791f23f698b130ba59883bdde9965627
-
Filesize
1.6MB
MD5689b4aa6c789c9a8c2e996badc46e43d
SHA1d516221788cb29e6de7848705e47973744c4da76
SHA25665644af878fa0322a2a297d5609b998f11b15894476c7c8beb477f5db8d20778
SHA5123ac190d84e63e3dbdcf07b59bb429c6528e92670278e18af5277903e275d90e8b2bba6ff771d5e17c0193ec48417455ba9fecd675c89e62d6cdeaa710cea3e07
-
Filesize
1.6MB
MD50ee67cdeb17157e48809b30381ddc3e0
SHA1e30694c07c61e12259ee3c7a3c453d34adbecffc
SHA25675d0a9bf8102109fc9f79e04d48f870a1b5aa02617d0e1ee01db7d8725a17319
SHA5129fb55aef9ca23ee3aac805cc4fb6defabd87290aa4e05cebce51615b7942ed1d81fe4517b2c0864b2bf96642c02f1500629a4b7a7cf4cf8acd1312251def2267
-
Filesize
1.1MB
MD5311ff2ed48f73d633f5e32678ff2de50
SHA1ee0e8114c1b6c796f9995c853c980506b67cf954
SHA256803cb7806c8993b28c97891240c472c9cae008a6aeff244ca30ab590e2f2c4a5
SHA512b0b7178b8da459a284521220997d87f345708f9219181c128cee6a94a1b6a45b0376bc38c2cde9769b6f843a9987e5ddf2263a0ea430fce4ec13fe58c53146ea
-
Filesize
1.5MB
MD59631370fb5b3be7f57eedf104c5473b2
SHA1798505e5f3625bf22354bba067ded38b4dbcfe10
SHA2560fdfa13bcd8d35d8213252c81c52a89e0a7e48d16ff702cd571981926a8f7009
SHA512ff2f7ea699806cf11d3cd5791beb0390844251a26b026ea2423bdc1fd92dd55e56cd458f4566a3c52acc3f532955e9b496593b87c96b0b611d4961ffd185f068
-
Filesize
648KB
MD551848b3350f7dda6fbf114d940021685
SHA104fb1b8286fc07682d1295df1b7bfbd2e8e6cd59
SHA256efc0ed11dc329d79fe778d3d4c3e31454923e50c965fa5324cec9cfc241815e8
SHA51294040b7f804093d1131bc961b86f1a744fff203b332b08530bc06c22cee649db4334449e95fbda64620d0490e9eb3a5c98d4a854dcafde610a0a92ac7b6fd666
-
Filesize
900KB
MD5ff55ee0e99c5f1906e2695aa226a4eeb
SHA16bdd2886a6465cfd05503f2fb6490d90da978a9f
SHA25671beefcdf3cd912bf1faf0052e83f3c527339d8ec0a793b00c83c738035851ca
SHA512c73e86740d73d6623935737e964e77bfe5542fc34f450b1f48492d7f9b418dfb8ec89fecf47e849f3441b01da12834544d4f7a83ff3030066ea1e9f269a12a89
-
Filesize
923KB
MD5805238d4aab2a239cf70f0f10c6513c0
SHA1b6844074cef9629f56924a0d68e457f60987a29c
SHA256351f271e6962c5c74204f6bea5d5759def2031b6a569bdc712dd08e007d76377
SHA51227c3dd092af89cd1af57068e39bbb5798bee3d109f662b2b3a96bc1edef29f2ef4152307efffb957e18a3fd952c269ff6a838589cd6edf43af261dc200384c87
-
Filesize
923KB
MD5e65c4f4fca2750392c7261b0bcc4fa43
SHA1aced2650b5331fcb8142a06bd59d429109ccc81c
SHA256aba11af976f81ace3c45363e4c0d082ee5303ce78b2e64e17d9930394eb3cbd0
SHA512410bd50c7cdd8c4d78e844bc4357264c27ef37f3c133889dde626f83c99632260f730986ae3aff54361dcfdc61777ec0f89cf43544fa0564bccf79ad15e1ab31
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD51ff9879aba9138b20606b03471ec3d11
SHA13b4e3eec402e23200372840a1ba15362a5171119
SHA25683a4c4955e180a527d9057901b5e1abfea25de6078856364d795ca53d68cd530
SHA51292f3ca8002886b6009568b3ae7970b683eaf3e1408a473a8cc8961a8c11179c29f86448d183b8e701af27ecba98b98e697e3af07759de512d6e53ae5f3f78ef3
-
Filesize
412KB
MD54a9630cc033d9a6c86da8c3a9386c67a
SHA17748f3c96be0a5a022258ae1ded1812be0738b35
SHA2563a0f2cf29943c7cec50b628bb9ebea5e7a4e65905da60ea3d6cd74e544b124f4
SHA51292a824ba79b68995856cae0de634694bdee91ba449133435b698d731ecd78b6c90fb6048d595eb00e3fe3a02ed3cfdd4b32e8c4991a6fae699937c50e7d44162
-
Filesize
93KB
MD509b4d4541dd5e3ff50f0b86b55ebba11
SHA1a656b4bd894b499238ecf200188424ce5a95f369
SHA256d90c81c3c5cc7bcd8b32b55c1e2effad39305946920b29524858010eeb3c0fd2
SHA512b52c0c32663fda668c2c006faca4f250d9dd0c2ba18e7e147c6a4d49ff0d0eadd6201e833ebd3d865dbd84a7db52356f1f5a51ba7cd0ca5f20a8d6b5a03f2ac2
-
Filesize
1.9MB
MD59e70bc2a5938a90703578f2ac13840c1
SHA1ba3e018d01c562b298ab3b42354e39a9c76f1bfd
SHA2561e7c826b5b5178ff28717ebb2c502935f984c6386e4072bb52275e61d4551049
SHA512b8cadad799decf8176b4cfe4cfacbf47d1d0d207e8f1d7284ec3d257b2078c2b691c93a1cae66f9ac7f61bb58c3ec51cb1d522de6dc4224700ad36b65a233ad3
-
Filesize
1.1MB
MD5daf4822e33dbcae5897ad025d0fde283
SHA1d794bccc99bbc5d20042d3c0b217eff163eca902
SHA256286a05a83f1d4df8e6a97f85e44b8b70cd47fb0bf9acfa79e24b1c89d9db704d
SHA512d7a5b600cf2bdc47b95e1b6e00fa40ff6728dfef77740165492aae0c10d72c6f5e54eec735488afa2fa2720bf88a41f14a55fa8c088d1bb735551f48c1f1c29d
-
Filesize
1.1MB
MD50e52a4c8665eb426190b527a6e89a8ca
SHA12c57c28d72879de920a7ca9285438f862819a86d
SHA25648898438e04be165ad73b3cfb17372a378fb7e321414f098b534bbb1af13b999
SHA512ccff9e7d5b05ab6a48e27cbaa12ce8c81809460dfd80e2cf47c0ce35e22962b2129b67310d2244264e3a10273d5646030e492a3325dfbcfafed92b3e2b361feb
-
Filesize
1.4MB
MD5b0918c656d0bd6ae56e91792a702b401
SHA142cd7bbd3c439b73e2dd642c62209f7bf3ff82a8
SHA256fc8bb4580cbe7a40edd8113ee3a60cfac9f7b66dccb028f8a7566036da0a0ee4
SHA512b60fc21e96d8fbc1a4604278f22cebaa253a167e60dd84e9e350657bc10b84ecc91a954091e5abf4c9a4c1b7ae27d68617f0c550b6f3bd0ce76c507cca5d1660
-
Filesize
900KB
MD52efedd62c21ff11aa26c4231a1540741
SHA10ad70bd33f40beceb0e58685ba661847f94f5726
SHA2564fc9093c5934b81401baf7c4996668db65f628945674e3876a28f33a3b2115a0
SHA5125a621fb666d22a8af3279e1b527ee5c1abeb8199c464d762da0a44fc34353fbb90fc5acb5fab4e272ee9e911eb76f9550e93b45e713a35510baa3ad7474452d7