Analysis
-
max time kernel
152s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 13:12
Behavioral task
behavioral1
Sample
4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe
Resource
win10v2004-20220812-en
General
-
Target
4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe
-
Size
270KB
-
MD5
90d1650e8a355e7e0b2b9717a3e0f473
-
SHA1
6adbe498c033f613899c00341676664341aa5a00
-
SHA256
4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3
-
SHA512
306984641413562ed0e936dd67b1d5fe945599444e9090bf9b00e615be101678330a0a83903322ff5373d078913972dabcbcf18caf4f73850378a28c55c810ed
-
SSDEEP
6144:kWfCbohHv6mC21AAf3os6SC+vyJ65FrD1yyIchVjz5GEKQVfjixoS/:tfuopvBCSfYdN6yE55D1yyIcVPqQVfjq
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\winlogon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 624 winlogon.exe 944 winlogon.exe 1700 winlogon.exe -
resource yara_rule upx behavioral1/memory/2032-56-0x0000000000400000-0x000000000058E000-memory.dmp upx behavioral1/files/0x000a000000013a13-61.dat upx behavioral1/files/0x000a000000013a13-65.dat upx behavioral1/files/0x000a000000013a13-64.dat upx behavioral1/files/0x000a000000013a13-67.dat upx behavioral1/files/0x000a000000013a13-63.dat upx behavioral1/files/0x000a000000013a13-62.dat upx behavioral1/memory/2032-68-0x0000000000400000-0x000000000058E000-memory.dmp upx behavioral1/memory/624-72-0x0000000000400000-0x000000000058E000-memory.dmp upx behavioral1/files/0x000a000000013a13-71.dat upx behavioral1/memory/944-73-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/files/0x000a000000013a13-75.dat upx behavioral1/memory/944-77-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1700-78-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/944-79-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/files/0x000a000000013a13-82.dat upx behavioral1/memory/1700-85-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/624-86-0x0000000000400000-0x000000000058E000-memory.dmp upx behavioral1/memory/1700-87-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1700-90-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/944-91-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1700-103-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/944-104-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 624 set thread context of 944 624 winlogon.exe 31 PID 624 set thread context of 1700 624 winlogon.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 1388 reg.exe 1260 reg.exe 1172 reg.exe 1220 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1700 winlogon.exe Token: 1 944 winlogon.exe Token: SeCreateTokenPrivilege 944 winlogon.exe Token: SeAssignPrimaryTokenPrivilege 944 winlogon.exe Token: SeLockMemoryPrivilege 944 winlogon.exe Token: SeIncreaseQuotaPrivilege 944 winlogon.exe Token: SeMachineAccountPrivilege 944 winlogon.exe Token: SeTcbPrivilege 944 winlogon.exe Token: SeSecurityPrivilege 944 winlogon.exe Token: SeTakeOwnershipPrivilege 944 winlogon.exe Token: SeLoadDriverPrivilege 944 winlogon.exe Token: SeSystemProfilePrivilege 944 winlogon.exe Token: SeSystemtimePrivilege 944 winlogon.exe Token: SeProfSingleProcessPrivilege 944 winlogon.exe Token: SeIncBasePriorityPrivilege 944 winlogon.exe Token: SeCreatePagefilePrivilege 944 winlogon.exe Token: SeCreatePermanentPrivilege 944 winlogon.exe Token: SeBackupPrivilege 944 winlogon.exe Token: SeRestorePrivilege 944 winlogon.exe Token: SeShutdownPrivilege 944 winlogon.exe Token: SeDebugPrivilege 944 winlogon.exe Token: SeAuditPrivilege 944 winlogon.exe Token: SeSystemEnvironmentPrivilege 944 winlogon.exe Token: SeChangeNotifyPrivilege 944 winlogon.exe Token: SeRemoteShutdownPrivilege 944 winlogon.exe Token: SeUndockPrivilege 944 winlogon.exe Token: SeSyncAgentPrivilege 944 winlogon.exe Token: SeEnableDelegationPrivilege 944 winlogon.exe Token: SeManageVolumePrivilege 944 winlogon.exe Token: SeImpersonatePrivilege 944 winlogon.exe Token: SeCreateGlobalPrivilege 944 winlogon.exe Token: 31 944 winlogon.exe Token: 32 944 winlogon.exe Token: 33 944 winlogon.exe Token: 34 944 winlogon.exe Token: 35 944 winlogon.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 624 winlogon.exe 944 winlogon.exe 1700 winlogon.exe 944 winlogon.exe 944 winlogon.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1532 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 27 PID 2032 wrote to memory of 1532 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 27 PID 2032 wrote to memory of 1532 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 27 PID 2032 wrote to memory of 1532 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 27 PID 1532 wrote to memory of 1648 1532 cmd.exe 29 PID 1532 wrote to memory of 1648 1532 cmd.exe 29 PID 1532 wrote to memory of 1648 1532 cmd.exe 29 PID 1532 wrote to memory of 1648 1532 cmd.exe 29 PID 2032 wrote to memory of 624 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 30 PID 2032 wrote to memory of 624 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 30 PID 2032 wrote to memory of 624 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 30 PID 2032 wrote to memory of 624 2032 4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe 30 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 944 624 winlogon.exe 31 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 624 wrote to memory of 1700 624 winlogon.exe 32 PID 944 wrote to memory of 1924 944 winlogon.exe 33 PID 944 wrote to memory of 1924 944 winlogon.exe 33 PID 944 wrote to memory of 1924 944 winlogon.exe 33 PID 944 wrote to memory of 1924 944 winlogon.exe 33 PID 944 wrote to memory of 1564 944 winlogon.exe 34 PID 944 wrote to memory of 1564 944 winlogon.exe 34 PID 944 wrote to memory of 1564 944 winlogon.exe 34 PID 944 wrote to memory of 1564 944 winlogon.exe 34 PID 944 wrote to memory of 772 944 winlogon.exe 36 PID 944 wrote to memory of 772 944 winlogon.exe 36 PID 944 wrote to memory of 772 944 winlogon.exe 36 PID 944 wrote to memory of 772 944 winlogon.exe 36 PID 944 wrote to memory of 1920 944 winlogon.exe 39 PID 944 wrote to memory of 1920 944 winlogon.exe 39 PID 944 wrote to memory of 1920 944 winlogon.exe 39 PID 944 wrote to memory of 1920 944 winlogon.exe 39 PID 1924 wrote to memory of 1388 1924 cmd.exe 40 PID 1924 wrote to memory of 1388 1924 cmd.exe 40 PID 1924 wrote to memory of 1388 1924 cmd.exe 40 PID 1924 wrote to memory of 1388 1924 cmd.exe 40 PID 1564 wrote to memory of 1260 1564 cmd.exe 41 PID 1564 wrote to memory of 1260 1564 cmd.exe 41 PID 1564 wrote to memory of 1260 1564 cmd.exe 41 PID 1564 wrote to memory of 1260 1564 cmd.exe 41 PID 772 wrote to memory of 1172 772 cmd.exe 43 PID 772 wrote to memory of 1172 772 cmd.exe 43 PID 772 wrote to memory of 1172 772 cmd.exe 43 PID 772 wrote to memory of 1172 772 cmd.exe 43 PID 1920 wrote to memory of 1220 1920 cmd.exe 44 PID 1920 wrote to memory of 1220 1920 cmd.exe 44 PID 1920 wrote to memory of 1220 1920 cmd.exe 44 PID 1920 wrote to memory of 1220 1920 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe"C:\Users\Admin\AppData\Local\Temp\4e7c8caeb5fcf866d30e596e2ce6535a50e64f1fcf36bc1fe11ad006ec1b92c3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qaJPZ.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe" /f3⤵
- Adds Run key to start application
PID:1648
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1172
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1220
-
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD54da6717f2c70f4bd32ad33a227a2ff47
SHA13d7f7159e1f695bd469287d1ad4ffa0841b407a8
SHA256a12bb2e5d2fb0b3c400ce311fae72995a00b57a97d23e4b9effec47cff189d07
SHA5126765314054ad9bf2164058248f3d3a17775176925abbe4376aec030dca3a5e59be8b9e96139941fec2b2e1a9bff38f87abdb29ea09a299d8ab7e23ecec4083df
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b
-
Filesize
270KB
MD5d1682ad218757c82461fbdc6d7dbeaef
SHA10535f5addb7fbdd2f8f97c55f4f26e8364a9a971
SHA2564369597ffab4cf70c07f1cd6d9a04d1d9076e06d50cfe80567610f603a2abcf1
SHA512b81a3a6a814331a5fc89546d0f277dc9eff99ea5313a687e04e32c61121c34ec660eb9c55aa9c402b5378daad1185ac57e9a134191898ddee4172e2eff16991b