Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25/05/2022, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe
Resource
win10v2004-20220414-en
General
-
Target
1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe
-
Size
6.2MB
-
MD5
0a6c36584f98ec2f98121071477e7702
-
SHA1
6c839ed190e408f65b3b0c856e5adcb1d305c067
-
SHA256
1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518
-
SHA512
1e620fe29a47929c491fbe3003ae0177e4f7ff5b90c5b456f54fd67d17916c8657f80552f7f0acfd333fc0f393555d9202a564edc4f4ed5a2c9282691b414442
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Windows\\System64\\1systemsmss.exe, explorer.exe" 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 1systemsmss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe -
Executes dropped EXE 7 IoCs
pid Process 1532 1systemsmss.exe 988 svnhost.exe 1296 svnhost.exe 1456 svnhost.exe 1364 svnhost.exe 1992 systemsmss.exe 1768 systemsmss.exe -
Loads dropped DLL 6 IoCs
pid Process 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1532 1systemsmss.exe 1208 cmd.exe 1364 svnhost.exe 1364 svnhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run 1systemsmss.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\System64\1systemsmss.exe 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe File created C:\Windows\Zont911\Home.zip 1systemsmss.exe File created C:\Windows\System64\vp8encoder.dll 1systemsmss.exe File created C:\Windows\System64\svnhost.exe 1systemsmss.exe File opened for modification C:\Windows\System64\svnhost.exe 1systemsmss.exe File created C:\Windows\System64\systemsmss.exe 1systemsmss.exe File created C:\Windows\System64\1systemsmss.exe 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe File created C:\Windows\System64\vp8decoder.dll 1systemsmss.exe File opened for modification C:\Windows\System64\vp8decoder.dll 1systemsmss.exe File opened for modification C:\Windows\System64\vp8encoder.dll 1systemsmss.exe File opened for modification C:\Windows\System64\systemsmss.exe 1systemsmss.exe File created C:\Windows\Zont911\Tupe.bat 1systemsmss.exe File created C:\Windows\Zont911\Regedit.reg 1systemsmss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1724 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe 1532 1systemsmss.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 988 svnhost.exe Token: SeDebugPrivilege 1456 svnhost.exe Token: SeTakeOwnershipPrivilege 1364 svnhost.exe Token: SeTcbPrivilege 1364 svnhost.exe Token: SeTcbPrivilege 1364 svnhost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 988 svnhost.exe 1296 svnhost.exe 1456 svnhost.exe 1364 svnhost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1532 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 28 PID 1984 wrote to memory of 1532 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 28 PID 1984 wrote to memory of 1532 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 28 PID 1984 wrote to memory of 1532 1984 1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe 28 PID 1532 wrote to memory of 1724 1532 1systemsmss.exe 29 PID 1532 wrote to memory of 1724 1532 1systemsmss.exe 29 PID 1532 wrote to memory of 1724 1532 1systemsmss.exe 29 PID 1532 wrote to memory of 1724 1532 1systemsmss.exe 29 PID 1532 wrote to memory of 1208 1532 1systemsmss.exe 33 PID 1532 wrote to memory of 1208 1532 1systemsmss.exe 33 PID 1532 wrote to memory of 1208 1532 1systemsmss.exe 33 PID 1532 wrote to memory of 1208 1532 1systemsmss.exe 33 PID 1208 wrote to memory of 2000 1208 cmd.exe 31 PID 1208 wrote to memory of 2000 1208 cmd.exe 31 PID 1208 wrote to memory of 2000 1208 cmd.exe 31 PID 1208 wrote to memory of 2000 1208 cmd.exe 31 PID 1208 wrote to memory of 988 1208 cmd.exe 32 PID 1208 wrote to memory of 988 1208 cmd.exe 32 PID 1208 wrote to memory of 988 1208 cmd.exe 32 PID 1208 wrote to memory of 988 1208 cmd.exe 32 PID 1208 wrote to memory of 1296 1208 cmd.exe 34 PID 1208 wrote to memory of 1296 1208 cmd.exe 34 PID 1208 wrote to memory of 1296 1208 cmd.exe 34 PID 1208 wrote to memory of 1296 1208 cmd.exe 34 PID 1208 wrote to memory of 1456 1208 cmd.exe 36 PID 1208 wrote to memory of 1456 1208 cmd.exe 36 PID 1208 wrote to memory of 1456 1208 cmd.exe 36 PID 1208 wrote to memory of 1456 1208 cmd.exe 36 PID 1364 wrote to memory of 1992 1364 svnhost.exe 37 PID 1364 wrote to memory of 1992 1364 svnhost.exe 37 PID 1364 wrote to memory of 1992 1364 svnhost.exe 37 PID 1364 wrote to memory of 1992 1364 svnhost.exe 37 PID 1364 wrote to memory of 1768 1364 svnhost.exe 38 PID 1364 wrote to memory of 1768 1364 svnhost.exe 38 PID 1364 wrote to memory of 1768 1364 svnhost.exe 38 PID 1364 wrote to memory of 1768 1364 svnhost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe"C:\Users\Admin\AppData\Local\Temp\1d8291a5cba2f38b160dfc10921e29a54799ff0ef634b410aa1a6618b04fb518.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\System64\1systemsmss.exe"C:\Windows\System64\1systemsmss.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"3⤵
- Runs .reg file with regedit
PID:1724
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\Zont911\Tupe.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /firewall4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /start4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1456
-
-
-
-
C:\Windows\SysWOW64\chcp.comChcp 12511⤵PID:2000
-
C:\Windows\System64\svnhost.exe"C:\Windows\System64\svnhost.exe" /silentinstall1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:988
-
C:\Windows\System64\svnhost.exeC:\Windows\System64\svnhost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe /tray2⤵
- Executes dropped EXE
PID:1992
-
-
C:\Windows\System64\systemsmss.exeC:\Windows\System64\systemsmss.exe2⤵
- Executes dropped EXE
PID:1768
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD555c22619697b70b6633fe93ad0c9b609
SHA172c6b5851a3353e9b4e9b07aa81140e12deeea3e
SHA25650f6a9a883308cead80229f8c1c668afbdb3b294a1b790666c82e6403a08d7ab
SHA5121c3ae633247b6d7db76dc65b4dab86654fbadacfd16a2be0b97c4da8508952939f0a0c7d4f2c70d66b2f4ca082fbe015bf5c05c78888d2a6562ca4d477c4ae43
-
Filesize
2.6MB
MD5e27e4c2d690dad995884f1fba64e1a4a
SHA173e9c94422eb9a977601899c2ca3178f1d2bf5ff
SHA256f06a07ed3e16fb91b7b111890828d30d1824469b30ceb8ebbacc8ddedd3c3e9f
SHA5120fdcc1185370aa4f72b4805dc743796fa96ba8fecd6c04158fb203f16967b7e70184552283535b4e881cb4e2e09809aaf86787a87f1200aa52332edbe756e2a1
-
Filesize
3.0MB
MD596b2e75a641fc1e6a3f5c34291548189
SHA1821eec4f1fe4f7e06b70ef3ab02b9769b0de3d31
SHA2563e905e484d3228dea18a035b1c80c70502a6e4c659e25c8cb3b5ab27ba01238f
SHA512fc682f3d4e3f88d63808f59e16878c1b70be9170d00c87c8badfd11d6cac7d5099e89cc53e314554068ddfb0a5d42e671c479027c4ca7dba917394ba77c65ce8
-
Filesize
2.3MB
MD54120d9c48f492d3389b14133662d285d
SHA1adcea66e623f57e4085d54cc0fc168c7b95fceef
SHA256d71c702b9cabdf41d32b5f584eea2bbf122e3ae0d710b854246018e47f45a8c2
SHA512fb0748bdca0c7c97f248325b09e10922dd147fe522f05c70b8629abbe35f29e6ad49df90f21296390e44a4f53169d8c75a3297e1a24ea4164f9d7c70b55cd83a
-
Filesize
2.4MB
MD526bb460ea99a9cf68e898421175cbb1f
SHA1def0734c36b41dee420587b213fb982f8f3ad18b
SHA25672a1df50a2a4e7093a645357c11035700212ec63011314b852bca12ca547ebbd
SHA512ab5971985a5ec89a87466c7380085097b7760887e708e2795075c1744d43427b91569b5ae648a6c6a984c9d751b58c384bcc0b72969e3878d882282b815591a4
-
Filesize
2.7MB
MD5eb40cd8f246fcb5364ddaec4056aab86
SHA1200a2547e104ac81d000d023f2fb3a85b139ae25
SHA2562884ef9230f4c0b70d48c028875556ed1a5bf7c18831debd177087d589603317
SHA5123529340ffe6464831a057ae29ac1be8c9314314829abf624043e79582c82d93c67d2251859a6b52ec9fcc940f877900f12f401ad254ff4c1785dafabf015ae3a
-
Filesize
2.4MB
MD526bb460ea99a9cf68e898421175cbb1f
SHA1def0734c36b41dee420587b213fb982f8f3ad18b
SHA25672a1df50a2a4e7093a645357c11035700212ec63011314b852bca12ca547ebbd
SHA512ab5971985a5ec89a87466c7380085097b7760887e708e2795075c1744d43427b91569b5ae648a6c6a984c9d751b58c384bcc0b72969e3878d882282b815591a4
-
Filesize
2.6MB
MD5780b7ddd071aec9b3a6799d65a0e000e
SHA1be32e523bdc3e2fb70106da0d14dfc80518ed87a
SHA2561c72674e04c346ff936b53fcf1c7b563fcc507486c5349d50863573ca52658ed
SHA5129b7f58fe31fecc3c1e6d1954149e38fae0a10ee0bbef09c8dc208eda64c07c7e5363c577ed4f262fe60fa26780bf3c550e986a4cea17fb335469c7895a2f90a0
-
Filesize
2.4MB
MD53cb0dd71720bac9bf6c88bd931ae7833
SHA11ae719c4a982822f2ae6a36c90fbb66b731af042
SHA2565dcbbf8699d03ef7833a92f5b29e59eb2b9beaa351e31dd5c3fb18b75fe61f56
SHA512fbd04aa41019967e74f071f391a025a35a89c93697460daa1aed52f8aa5e9d2cc79c33e62a6cec01f1f951df3536321adf8118fbc8b96e2e72cd81a121773144
-
Filesize
2.4MB
MD51ef55065139dca2a3800765979efb9e7
SHA1da4b5a18275064f199e5b64f63ac817498aa1015
SHA256a2be45665684a6ecef5e01f420db2a870e31ecdc277cfa18294ec626e1c134c2
SHA512d907fa51b4caa89a2605ed899f8d93a422c082aa361ea78ba9f1846720117bf7db055f112d3f1321b8ede64290fd4999f68b26754e3a1d3833db921b48b82b1a
-
Filesize
378KB
MD5d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
Filesize
1.6MB
MD5dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7
-
Filesize
11KB
MD5ce871700179dfc5638b9bcd2052a9e11
SHA131318891734c352a94e3e4b616fce40d29dd28e3
SHA2563ef1ec65cf389b0e33c693c2f8a07ba479a5b0d9f9e281c42e6acc561f798061
SHA512fbbcf4de0d77483d5ea9a74590373fcc53f2ea15b3f81cb38d353ae0c4f2c42b9e53e65da77a64c521a50c3478f5b8533e5153230299ac2f644924662cabb715
-
Filesize
281B
MD5691f040de6d335962416b319dcd416dc
SHA1db49109c0917910f7fce8b6de690a1c7e2026226
SHA256605d0b9c2fd1972c4ee60d8eefd336be636884dcdf54a4e5f2829c46e80fdcea
SHA512f34ba36bdeaa43a1265ec69acfa0f199f2b4d5d90b4ea890327478f4f48ec7597d660b922dd1e149de3a1ff9b48c79e4c9c53e8a482b4cb5842bc0976f93bf89
-
Filesize
2.4MB
MD57d0eaf62e06e5a388d740bd30d297ea3
SHA10f7b9e17bc4e96b387074257ba216f6d92e60f2a
SHA2568f159842b5c1640555f1d75dc4ffd86934a3845d7e0faaa76f68d905b607dc8b
SHA512a81d207bd70dba0454717d6c322296899b49072fc027337a98e40ab446f8f2be98c378564b900eb498608b8c5623adc8cd60aca5a2af41c9131b83994cf623ac
-
Filesize
2.7MB
MD5670266316a8618ba97874c1b6e6c0278
SHA1d661766be3be8988648497b22e2b75ec30fc537e
SHA2567a95bcbca367e39f7905ecee515729cddf3358fc87b6e09988e46af03ab73f2e
SHA5121554af535fb2b9c703e22d33b64c5077c673f8689e9da0dd1bb581229fef0c48503b1785be7e4023650bffa24af8332542a885c0f13abd99caeafab7a528de7f
-
Filesize
2.6MB
MD5948db41c9c1cb22f69578f20c352368e
SHA1428aa0966098ee2dffd30106b2e59656c9510024
SHA256e7cfffb6ba757bf87bd229c071fdc30f5643046bf7062dc959347edbc00e6275
SHA512b60a88d7ea5e154c912f27a91e9d1836451fa30ea1b72548c78ce7b32db92eee51f8e64a67c870b9f17a941cec22e4329861db27733ececc972d52588add5aa9
-
Filesize
2.6MB
MD5cabbf7f69f09e1dfad590e4fee4feca4
SHA10564beca21e88bc389c33a6c44c426f4f0c939ff
SHA2560013b2d16d2345a0edd24f89905df70514e75c9e212cc1ecab3d999c64681eb2
SHA512b4fbfe315c54dd824ae74a0cf4341dbcb706f34f71d821e8dcc8b9a6c673e548291a09615807f595f89ead5fef4a8b249424622f0f3316b4e6c2060c2df55186
-
Filesize
2.4MB
MD59c7e5d1d811ff90cc0025f2c477bb31f
SHA103e9d9161caa97d2444601d2914c89e32cd23626
SHA2562bab4c7ae161758b4acba6efe4f6085936408b4916850139765c8d683f05e9b0
SHA512089943e06dd8817b6a75f85b6993e7f701a83ba3fa81db0020398d4569b50de145b845089bb8f9a8225fa292aacc3c6d3269d706f3f22de97e95be40f2b24b53
-
Filesize
2.9MB
MD5e6926ab1e4b5e16d7b174783b8cd2e72
SHA1d6b3b1ec7b321bfbee8b87582a1a2a418e4fb63b
SHA256f86ea3b8c45be890cf587001c7fd27a1c6d071fa04e86fdccf5a7761eb878dce
SHA51263f8de4cf79bf1f085c695c03b74cd2128bc707780407f3471b121281facec9d59488a3dc06198b3ba7a44b3fcc47d8a30cb6518f6b62266739b7d351fdb0d58