Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 03:37
Behavioral task
behavioral1
Sample
cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe
Resource
win10v2004-20220812-en
General
-
Target
cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe
-
Size
268KB
-
MD5
0a0e57a0fe628df8be4a06a46b345ff6
-
SHA1
b17ba3d3b1ca1a66f6ea3e934e22941f5a1b2be2
-
SHA256
cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b
-
SHA512
11ebd455c1d04545ca3da4cf4407d1b71c52389f5535abeca874aad74cee8eaf6b9d0f736a5f8780b462e7a89568b8fff5e37cf42b5f760a59dd65df533cdcfd
-
SSDEEP
6144:XbfO3SlNyTkyhlx0kRujRYO4VYAtHJ3DFLjxIE++/gAxcbibMoSN:LfIST8kk0kMlCPTvXxKXoSN
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\winlogon.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 1120 winlogon.exe 1744 winlogon.exe 1968 winlogon.exe -
resource yara_rule upx behavioral1/memory/1916-56-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral1/files/0x000c0000000122ff-61.dat upx behavioral1/files/0x000c0000000122ff-62.dat upx behavioral1/files/0x000c0000000122ff-65.dat upx behavioral1/files/0x000c0000000122ff-64.dat upx behavioral1/files/0x000c0000000122ff-63.dat upx behavioral1/files/0x000c0000000122ff-67.dat upx behavioral1/memory/1916-68-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral1/files/0x000c0000000122ff-71.dat upx behavioral1/memory/1744-72-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/files/0x000c0000000122ff-74.dat upx behavioral1/memory/1744-76-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1744-77-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1968-78-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/files/0x000c0000000122ff-81.dat upx behavioral1/memory/1120-84-0x0000000000400000-0x000000000057E000-memory.dmp upx behavioral1/memory/1968-85-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1968-87-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1744-99-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/1968-100-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1744-102-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1120 set thread context of 1744 1120 winlogon.exe 31 PID 1120 set thread context of 1968 1120 winlogon.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry key 1 TTPs 4 IoCs
pid Process 1016 reg.exe 1108 reg.exe 1372 reg.exe 1040 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1968 winlogon.exe Token: 1 1744 winlogon.exe Token: SeCreateTokenPrivilege 1744 winlogon.exe Token: SeAssignPrimaryTokenPrivilege 1744 winlogon.exe Token: SeLockMemoryPrivilege 1744 winlogon.exe Token: SeIncreaseQuotaPrivilege 1744 winlogon.exe Token: SeMachineAccountPrivilege 1744 winlogon.exe Token: SeTcbPrivilege 1744 winlogon.exe Token: SeSecurityPrivilege 1744 winlogon.exe Token: SeTakeOwnershipPrivilege 1744 winlogon.exe Token: SeLoadDriverPrivilege 1744 winlogon.exe Token: SeSystemProfilePrivilege 1744 winlogon.exe Token: SeSystemtimePrivilege 1744 winlogon.exe Token: SeProfSingleProcessPrivilege 1744 winlogon.exe Token: SeIncBasePriorityPrivilege 1744 winlogon.exe Token: SeCreatePagefilePrivilege 1744 winlogon.exe Token: SeCreatePermanentPrivilege 1744 winlogon.exe Token: SeBackupPrivilege 1744 winlogon.exe Token: SeRestorePrivilege 1744 winlogon.exe Token: SeShutdownPrivilege 1744 winlogon.exe Token: SeDebugPrivilege 1744 winlogon.exe Token: SeAuditPrivilege 1744 winlogon.exe Token: SeSystemEnvironmentPrivilege 1744 winlogon.exe Token: SeChangeNotifyPrivilege 1744 winlogon.exe Token: SeRemoteShutdownPrivilege 1744 winlogon.exe Token: SeUndockPrivilege 1744 winlogon.exe Token: SeSyncAgentPrivilege 1744 winlogon.exe Token: SeEnableDelegationPrivilege 1744 winlogon.exe Token: SeManageVolumePrivilege 1744 winlogon.exe Token: SeImpersonatePrivilege 1744 winlogon.exe Token: SeCreateGlobalPrivilege 1744 winlogon.exe Token: 31 1744 winlogon.exe Token: 32 1744 winlogon.exe Token: 33 1744 winlogon.exe Token: 34 1744 winlogon.exe Token: 35 1744 winlogon.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 1120 winlogon.exe 1744 winlogon.exe 1744 winlogon.exe 1968 winlogon.exe 1744 winlogon.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1136 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 27 PID 1916 wrote to memory of 1136 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 27 PID 1916 wrote to memory of 1136 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 27 PID 1916 wrote to memory of 1136 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 27 PID 1136 wrote to memory of 1520 1136 cmd.exe 29 PID 1136 wrote to memory of 1520 1136 cmd.exe 29 PID 1136 wrote to memory of 1520 1136 cmd.exe 29 PID 1136 wrote to memory of 1520 1136 cmd.exe 29 PID 1916 wrote to memory of 1120 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 30 PID 1916 wrote to memory of 1120 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 30 PID 1916 wrote to memory of 1120 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 30 PID 1916 wrote to memory of 1120 1916 cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe 30 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1744 1120 winlogon.exe 31 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1120 wrote to memory of 1968 1120 winlogon.exe 32 PID 1744 wrote to memory of 344 1744 winlogon.exe 33 PID 1744 wrote to memory of 344 1744 winlogon.exe 33 PID 1744 wrote to memory of 344 1744 winlogon.exe 33 PID 1744 wrote to memory of 344 1744 winlogon.exe 33 PID 1744 wrote to memory of 396 1744 winlogon.exe 35 PID 1744 wrote to memory of 396 1744 winlogon.exe 35 PID 1744 wrote to memory of 396 1744 winlogon.exe 35 PID 1744 wrote to memory of 396 1744 winlogon.exe 35 PID 1744 wrote to memory of 1828 1744 winlogon.exe 36 PID 1744 wrote to memory of 1828 1744 winlogon.exe 36 PID 1744 wrote to memory of 1828 1744 winlogon.exe 36 PID 1744 wrote to memory of 1828 1744 winlogon.exe 36 PID 344 wrote to memory of 1016 344 cmd.exe 39 PID 344 wrote to memory of 1016 344 cmd.exe 39 PID 344 wrote to memory of 1016 344 cmd.exe 39 PID 344 wrote to memory of 1016 344 cmd.exe 39 PID 1744 wrote to memory of 1680 1744 winlogon.exe 40 PID 1744 wrote to memory of 1680 1744 winlogon.exe 40 PID 1744 wrote to memory of 1680 1744 winlogon.exe 40 PID 1744 wrote to memory of 1680 1744 winlogon.exe 40 PID 396 wrote to memory of 1108 396 cmd.exe 42 PID 396 wrote to memory of 1108 396 cmd.exe 42 PID 396 wrote to memory of 1108 396 cmd.exe 42 PID 396 wrote to memory of 1108 396 cmd.exe 42 PID 1828 wrote to memory of 1372 1828 cmd.exe 43 PID 1828 wrote to memory of 1372 1828 cmd.exe 43 PID 1828 wrote to memory of 1372 1828 cmd.exe 43 PID 1828 wrote to memory of 1372 1828 cmd.exe 43 PID 1680 wrote to memory of 1040 1680 cmd.exe 44 PID 1680 wrote to memory of 1040 1680 cmd.exe 44 PID 1680 wrote to memory of 1040 1680 cmd.exe 44 PID 1680 wrote to memory of 1040 1680 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe"C:\Users\Admin\AppData\Local\Temp\cfbfe562aae9179bfa9d6cfca07bc277ec48ec035b72b27fec7f49b4ca14657b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\iXMid.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe" /f3⤵
- Adds Run key to start application
PID:1520
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Roaming\winlogon.exewinlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogon.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogon.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1372
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\darkeye-nosttingspersistent2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1040
-
-
-
-
C:\Users\Admin\AppData\Roaming\winlogon.exeC:\Users\Admin\AppData\Roaming\winlogon.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD54da6717f2c70f4bd32ad33a227a2ff47
SHA13d7f7159e1f695bd469287d1ad4ffa0841b407a8
SHA256a12bb2e5d2fb0b3c400ce311fae72995a00b57a97d23e4b9effec47cff189d07
SHA5126765314054ad9bf2164058248f3d3a17775176925abbe4376aec030dca3a5e59be8b9e96139941fec2b2e1a9bff38f87abdb29ea09a299d8ab7e23ecec4083df
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c
-
Filesize
268KB
MD5b944905a26ee7be70559732e18a1cb8c
SHA1413c2ab4cba1836213c4ea6a12d24281774827a1
SHA2569e65547abebcd0149ee6cec4a556d773bd4d1d3b526d2c45022fe64e4b6e5d0b
SHA51242931198e3f2dd7b264c29da7bfc97c28f5b23921ac5d7b31524ce4a59f0b02824ad2f98573871aed7a44e3d6c8589ad4bc3b920560534c44b9f09803de2d96c