Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe
Resource
win10v2004-20221111-en
General
-
Target
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe
-
Size
1.0MB
-
MD5
8bc0e7d1a78d454caaa87d3b7caa92c3
-
SHA1
d0135e2e13f0d13aa2c49fb0d78f987f8d9ad67f
-
SHA256
a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1
-
SHA512
237016f4e9dd9b6a10359926caf886aea96595b20e87117b316019151e361895ba5ae10efd13f1c3066bc07ef4746d9ef59f857da7a6adc5966f75fbfebc4454
-
SSDEEP
24576:s4SRmIAZ6QGs1ikSHP5hs10Ot1LisENzP:s4SZO5SvOtVisEJP
Malware Config
Extracted
darkcomet
V2
spamblocker.no-ip.biz:1604
DC_MUTEX-NZ2A7W0
-
gencode
ji6MMZDpnHyq
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2964 pspluginwkr.exe 2804 winresume.exe 3304 pspluginwkr.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation pspluginwkr.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winresume.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce pspluginwkr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\System Monitor Control = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\pspluginwkr.exe" pspluginwkr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1396 set thread context of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 2804 set thread context of 2072 2804 winresume.exe 91 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch.new a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch.new a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe Token: SeIncreaseQuotaPrivilege 2332 AppLaunch.exe Token: SeSecurityPrivilege 2332 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2332 AppLaunch.exe Token: SeLoadDriverPrivilege 2332 AppLaunch.exe Token: SeSystemProfilePrivilege 2332 AppLaunch.exe Token: SeSystemtimePrivilege 2332 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2332 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2332 AppLaunch.exe Token: SeCreatePagefilePrivilege 2332 AppLaunch.exe Token: SeBackupPrivilege 2332 AppLaunch.exe Token: SeRestorePrivilege 2332 AppLaunch.exe Token: SeShutdownPrivilege 2332 AppLaunch.exe Token: SeDebugPrivilege 2332 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2332 AppLaunch.exe Token: SeChangeNotifyPrivilege 2332 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2332 AppLaunch.exe Token: SeUndockPrivilege 2332 AppLaunch.exe Token: SeManageVolumePrivilege 2332 AppLaunch.exe Token: SeImpersonatePrivilege 2332 AppLaunch.exe Token: SeCreateGlobalPrivilege 2332 AppLaunch.exe Token: 33 2332 AppLaunch.exe Token: 34 2332 AppLaunch.exe Token: 35 2332 AppLaunch.exe Token: 36 2332 AppLaunch.exe Token: SeDebugPrivilege 2964 pspluginwkr.exe Token: SeDebugPrivilege 2804 winresume.exe Token: SeIncreaseQuotaPrivilege 2072 AppLaunch.exe Token: SeSecurityPrivilege 2072 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2072 AppLaunch.exe Token: SeLoadDriverPrivilege 2072 AppLaunch.exe Token: SeSystemProfilePrivilege 2072 AppLaunch.exe Token: SeSystemtimePrivilege 2072 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2072 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2072 AppLaunch.exe Token: SeCreatePagefilePrivilege 2072 AppLaunch.exe Token: SeBackupPrivilege 2072 AppLaunch.exe Token: SeRestorePrivilege 2072 AppLaunch.exe Token: SeShutdownPrivilege 2072 AppLaunch.exe Token: SeDebugPrivilege 2072 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2072 AppLaunch.exe Token: SeChangeNotifyPrivilege 2072 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2072 AppLaunch.exe Token: SeUndockPrivilege 2072 AppLaunch.exe Token: SeManageVolumePrivilege 2072 AppLaunch.exe Token: SeImpersonatePrivilege 2072 AppLaunch.exe Token: SeCreateGlobalPrivilege 2072 AppLaunch.exe Token: 33 2072 AppLaunch.exe Token: 34 2072 AppLaunch.exe Token: 35 2072 AppLaunch.exe Token: 36 2072 AppLaunch.exe Token: SeDebugPrivilege 3304 pspluginwkr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2332 AppLaunch.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2332 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 82 PID 1396 wrote to memory of 2964 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 83 PID 1396 wrote to memory of 2964 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 83 PID 1396 wrote to memory of 2964 1396 a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe 83 PID 2964 wrote to memory of 2804 2964 pspluginwkr.exe 84 PID 2964 wrote to memory of 2804 2964 pspluginwkr.exe 84 PID 2964 wrote to memory of 2804 2964 pspluginwkr.exe 84 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 2072 2804 winresume.exe 91 PID 2804 wrote to memory of 3304 2804 winresume.exe 92 PID 2804 wrote to memory of 3304 2804 winresume.exe 92 PID 2804 wrote to memory of 3304 2804 winresume.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe"C:\Users\Admin\AppData\Local\Temp\a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\winresume.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\winresume.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\pspluginwkr.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD5c19eb8c8e7a40e6b987f9d2ee952996e
SHA16fc3049855bc9100643e162511673c6df0f28bfb
SHA256677e9e30350df17e2bc20fa9f7d730e9f7cc6e870d6520a345f5f7dc5b31f58a
SHA512860713b4a787c2189ed12a47d4b68b60ac00c7a253cae52dd4eb9276dacafeae3a81906b6d0742c8ecfdfaa255777c445beb7c2a532f3c677a9903237ac97596
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
15KB
MD599e0106f89c12144cd3c82216382e110
SHA144e1640b98b27aca3530d41a7b853c73172623fc
SHA2564bef292be3b4fc87d7300408032886248e6bcfa002d3c5e48b7e47d6fedc78c5
SHA5123b6d8f7679896ab1e69ae94025162116397c8adcf46a95c30dd54b2f8f95e0fc6adc9f068e5ecd4ed070084c646e12368588511756374c62c7525bf3b91e10ab
-
Filesize
1.0MB
MD58bc0e7d1a78d454caaa87d3b7caa92c3
SHA1d0135e2e13f0d13aa2c49fb0d78f987f8d9ad67f
SHA256a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1
SHA512237016f4e9dd9b6a10359926caf886aea96595b20e87117b316019151e361895ba5ae10efd13f1c3066bc07ef4746d9ef59f857da7a6adc5966f75fbfebc4454
-
Filesize
1.0MB
MD58bc0e7d1a78d454caaa87d3b7caa92c3
SHA1d0135e2e13f0d13aa2c49fb0d78f987f8d9ad67f
SHA256a45f2cfac684b87635a67fcd3ec67a46b5dda029574f5f3f3ca3c9381a3929c1
SHA512237016f4e9dd9b6a10359926caf886aea96595b20e87117b316019151e361895ba5ae10efd13f1c3066bc07ef4746d9ef59f857da7a6adc5966f75fbfebc4454
-
Filesize
514B
MD5d369cb0d999aecfc2569c7acca61b89a
SHA1d3f2669bc0a7e18655451a66145770c741fbdb22
SHA256fa9b43598af8c54ba2db25a2d7f6c2e13c954fc49464e95baccbf36166fbd231
SHA512b64770d41d537c43afd1c42581c192fecef65040f450518cf3b2ac3e92ac971e4ae7c833400af23e8f03b58fa5605a3aa02ddbc2ffe1a9b88d571e6bfc25da2d