Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe
Resource
win10v2004-20220812-en
General
-
Target
16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe
-
Size
20KB
-
MD5
92bf68dd3665bfa20e535ff4b35b45c0
-
SHA1
9a9d782690d7d4c1c60264deef3cc3852ee4f7c8
-
SHA256
16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d
-
SHA512
9b0171586dbdef314b8ea6f8b76a5da48effd9c3400ef0af89afc0180437056e2002af7b405d997e6217885a7f61b03ba38a13ed7f0420aa24641ab1b465f735
-
SSDEEP
192:1l5E3krTuntKy0peHDfCpHfBv+I4QwXt9V+jqu0G5KDJBzwHOe:1M3PnQoHDCpHf4I4Qwdc0G5KDJRwt
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\drivers\winlogon.exe 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe -
Executes dropped EXE 3 IoCs
pid Process 620 winlogon.exe 1272 AE 0124 BE.exe 1168 winlogon.exe -
Loads dropped DLL 4 IoCs
pid Process 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 620 winlogon.exe 620 winlogon.exe -
Drops autorun.inf file 1 TTPs 26 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification D:\Autorun.inf winlogon.exe File opened for modification \??\E:\Autorun.inf winlogon.exe File opened for modification \??\F:\Autorun.inf winlogon.exe File opened for modification \??\J:\Autorun.inf winlogon.exe File opened for modification \??\S:\Autorun.inf winlogon.exe File opened for modification C:\Autorun.inf winlogon.exe File opened for modification \??\K:\Autorun.inf winlogon.exe File opened for modification \??\N:\Autorun.inf winlogon.exe File opened for modification \??\U:\Autorun.inf winlogon.exe File opened for modification \??\V:\Autorun.inf winlogon.exe File opened for modification \??\X:\Autorun.inf winlogon.exe File opened for modification \??\Z:\Autorun.inf winlogon.exe File opened for modification \??\H:\Autorun.inf winlogon.exe File opened for modification \??\I:\Autorun.inf winlogon.exe File opened for modification \??\L:\Autorun.inf winlogon.exe File opened for modification \??\Q:\Autorun.inf winlogon.exe File opened for modification \??\R:\Autorun.inf winlogon.exe File opened for modification \??\W:\Autorun.inf winlogon.exe File opened for modification \??\A:\Autorun.inf winlogon.exe File opened for modification \??\G:\Autorun.inf winlogon.exe File opened for modification \??\M:\Autorun.inf winlogon.exe File opened for modification \??\O:\Autorun.inf winlogon.exe File opened for modification \??\P:\Autorun.inf winlogon.exe File opened for modification \??\T:\Autorun.inf winlogon.exe File opened for modification \??\Y:\Autorun.inf winlogon.exe File opened for modification \??\B:\Autorun.inf winlogon.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File created C:\Windows\AE 0124 BE.gif 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe File opened for modification C:\Windows\AE 0124 BE.gif 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe File created C:\Windows\Msvbvm60.dll AE 0124 BE.exe File created C:\Windows\AE 0124 BE.exe AE 0124 BE.exe File opened for modification C:\Windows\Msvbvm60.dll AE 0124 BE.exe File opened for modification C:\Windows\Msvbvm60.dll 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe File created C:\Windows\Msvbvm60.dll 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe File created C:\Windows\AE 0124 BE.exe winlogon.exe File opened for modification C:\Windows\AE 0124 BE.exe winlogon.exe File opened for modification C:\Windows\Msvbvm60.dll winlogon.exe File opened for modification C:\Windows\AE 0124 BE.exe AE 0124 BE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9196A91-5886-11ED-A6AC-DE5CC620A9B4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf00000000020000000000106600000001000020000000e1c530adf5bc7afe283d48550c2811ec52e2d08a50a0c66b570b6b6c33018c24000000000e800000000200002000000027135f85f1d827069847de6b2dfc0a9c50a786cf4d824a8478890849a2080dfd200000000febae412a568539428c5decaabc672ee4b0fbc36d47082e1cd1f507415a242d40000000c2596b24234f484bc0d0c2d53f83136bcbede76df936b1f24722ea086f086bb15159645a3e79ad8c55212120561d90444e0a13f0176ac6ad466798c0a6952f37 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000006644b6c650eab802cb08b21c1065e7fb3a60e4477a8a18d0d40a0f59af99dcbc000000000e8000000002000020000000f3c0676bba11af8a4494cabc3e279cbe44941783c3991940d07a9f86c93834c6900000007af76f28da32afc12468b3346bdd768da3d1b2a844a11aebb0dc84e23f4563edcf5c14d40702ba630f97a9736a3fa648060f1808cdfaf6711bb1268acfec2c8db8013a3776e4e798a30c7a4fb8ee022330714997c028d2e083c22083a96087ff762b5aec18753e430f42cc753bd44ed0c9c9e4f2024bf0fb07d2f7dfbad7408478cc190fe5fb481b7c4c77d7dab85aa64000000002659838b3ca2a627902d172a1bbd9eb9a3530eec054564dbbe0796dfde5624ca60ed44ec706fafcf8c7402f3e25e63792b6a7eb7040e73f6808a53df598292e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c022adb593ecd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373922109" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 940 iexplore.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 940 iexplore.exe 940 iexplore.exe 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 620 winlogon.exe 1272 AE 0124 BE.exe 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1380 wrote to memory of 940 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 27 PID 1380 wrote to memory of 940 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 27 PID 1380 wrote to memory of 940 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 27 PID 1380 wrote to memory of 940 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 27 PID 940 wrote to memory of 1888 940 iexplore.exe 29 PID 940 wrote to memory of 1888 940 iexplore.exe 29 PID 940 wrote to memory of 1888 940 iexplore.exe 29 PID 940 wrote to memory of 1888 940 iexplore.exe 29 PID 1380 wrote to memory of 620 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 30 PID 1380 wrote to memory of 620 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 30 PID 1380 wrote to memory of 620 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 30 PID 1380 wrote to memory of 620 1380 16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe 30 PID 620 wrote to memory of 1272 620 winlogon.exe 31 PID 620 wrote to memory of 1272 620 winlogon.exe 31 PID 620 wrote to memory of 1272 620 winlogon.exe 31 PID 620 wrote to memory of 1272 620 winlogon.exe 31 PID 620 wrote to memory of 1168 620 winlogon.exe 32 PID 620 wrote to memory of 1168 620 winlogon.exe 32 PID 620 wrote to memory of 1168 620 winlogon.exe 32 PID 620 wrote to memory of 1168 620 winlogon.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe"C:\Users\Admin\AppData\Local\Temp\16bcb4399443c51e2225a621e348c32eb53280d75cb6fe3cc6031d2790df017d.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Windows\AE 0124 BE.gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:940 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\AE 0124 BE.exe"C:\Windows\AE 0124 BE.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
C:\Windows\SysWOW64\drivers\winlogon.exe"C:\Windows\System32\drivers\winlogon.exe"3⤵
- Executes dropped EXE
PID:1168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD55f6cf9886bd383d7beeec510bb085c0a
SHA1bff6b1b9c3454eaa1ea1af1e58b7bbf8ebc0e496
SHA256e790255b5e82337aad15735012a331400c7545a6ab6a9e7ca65adc96564eefc4
SHA51269470ee62a85b7955a239b3e3aa93e87172093080ef3148da4b36ee581026c66c7cefd51326a2fbefc1a948208ef60444b65591da8a87f5a48500ab023686daa
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
20KB
MD57e3eba5b3cc2711f2031011837d62f39
SHA1808876996c436928067cdc7f68a9ab4bf7a7d414
SHA25676d4318923a9cd1d7471e6931e0eeb450808456b71267236f1c099282e86398b
SHA512345f664ae95381f88f4c34a77cbfecd4d741eeb07fd1352d4e4f9b9575801cdb5bc0e507cce7a5b3fc5801f5f82c70bf09c1959285908863abd57935c914bcbc
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
25B
MD5589b6886a49054d03b739309a1de9fcc
SHA10ec1dff7a03f13dea28eea5e754d5b0e5e1dc308
SHA256564815feb9c5bdadb145cd0d16738c4e5fbc6a46cf65c62ac6a985c43d1939e8
SHA5124b6f567398863aba39eec00e9f071364b79d5c29867b93fb968725e10e33a9bfff60f8ab6acceae44e715a35ec7139d12da06c33fa074b6be02ff5357c53c0eb
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556
-
Filesize
40KB
MD5d05f440293d371ec03f9f6505ac78b84
SHA1cda8c65aeac384bafd344918c744a0ca7b6d6958
SHA256fd1f572587b67565c00b8cc70b0b33db19608366e97c3c51fc1b9377e30d711e
SHA512fc13dcd2283e727bc5c15b4774db5eeaee78c4445a9c058629b72a2cd8d3c88725e946bf13b1af9b6852f4b00c33b5d6d04cef33c5e988c26aae0434e254d556