Analysis
-
max time kernel
63s -
max time network
60s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe
-
Size
344KB
-
MD5
d1d4f19b1f9c7f68d3e58717b4f0098f
-
SHA1
d41998133044f5715daf7a72db5655cf2eb2abd4
-
SHA256
d0f57f00f0a1177228642d40b4ae6bedda4b694e73aab3c3554619eea8df8923
-
SHA512
d40ddf106862f6540aefc9dd830572ceeb3df2030d12a23aab574aaecfc3b42c7ece64c7d2aaddb21dd2f0b260bab2e3430d448ffc03f8098be5194c397efb27
-
SSDEEP
3072:mEGh0oblEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGRlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}\stubpath = "C:\\Windows\\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe" 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}\stubpath = "C:\\Windows\\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe" {BC9C4338-A9D0-4188-A703-79686247CA42}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040} {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2D9FDDF3-C781-47be-8D12-65052F805095}\stubpath = "C:\\Windows\\{2D9FDDF3-C781-47be-8D12-65052F805095}.exe" {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF} 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC9C4338-A9D0-4188-A703-79686247CA42} {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC9C4338-A9D0-4188-A703-79686247CA42}\stubpath = "C:\\Windows\\{BC9C4338-A9D0-4188-A703-79686247CA42}.exe" {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{914E4320-BA6A-4f54-9BAA-B61F9122B70D} {BC9C4338-A9D0-4188-A703-79686247CA42}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}\stubpath = "C:\\Windows\\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe" {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2D9FDDF3-C781-47be-8D12-65052F805095} {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe -
Executes dropped EXE 5 IoCs
pid Process 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe 1952 {2D9FDDF3-C781-47be-8D12-65052F805095}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe File created C:\Windows\{BC9C4338-A9D0-4188-A703-79686247CA42}.exe {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe File created C:\Windows\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe {BC9C4338-A9D0-4188-A703-79686247CA42}.exe File created C:\Windows\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe File created C:\Windows\{2D9FDDF3-C781-47be-8D12-65052F805095}.exe {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4052 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe Token: SeIncBasePriorityPrivilege 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe Token: SeIncBasePriorityPrivilege 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe Token: SeIncBasePriorityPrivilege 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe Token: SeIncBasePriorityPrivilege 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2540 4052 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe 102 PID 4052 wrote to memory of 2540 4052 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe 102 PID 4052 wrote to memory of 2540 4052 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe 102 PID 4052 wrote to memory of 2008 4052 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe 101 PID 4052 wrote to memory of 2008 4052 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe 101 PID 4052 wrote to memory of 2008 4052 2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe 101 PID 2540 wrote to memory of 2304 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 104 PID 2540 wrote to memory of 2304 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 104 PID 2540 wrote to memory of 2304 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 104 PID 2540 wrote to memory of 1336 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 103 PID 2540 wrote to memory of 1336 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 103 PID 2540 wrote to memory of 1336 2540 {FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe 103 PID 2304 wrote to memory of 1908 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe 108 PID 2304 wrote to memory of 1908 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe 108 PID 2304 wrote to memory of 1908 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe 108 PID 2304 wrote to memory of 1160 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe 107 PID 2304 wrote to memory of 1160 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe 107 PID 2304 wrote to memory of 1160 2304 {BC9C4338-A9D0-4188-A703-79686247CA42}.exe 107 PID 1908 wrote to memory of 1060 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe 111 PID 1908 wrote to memory of 1060 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe 111 PID 1908 wrote to memory of 1060 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe 111 PID 1908 wrote to memory of 4588 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe 110 PID 1908 wrote to memory of 4588 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe 110 PID 1908 wrote to memory of 4588 1908 {914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe 110 PID 1060 wrote to memory of 1952 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe 113 PID 1060 wrote to memory of 1952 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe 113 PID 1060 wrote to memory of 1952 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe 113 PID 1060 wrote to memory of 4760 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe 112 PID 1060 wrote to memory of 4760 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe 112 PID 1060 wrote to memory of 4760 1060 {E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_d1d4f19b1f9c7f68d3e58717b4f0098f_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2008
-
-
C:\Windows\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exeC:\Windows\{FC6BFCFC-5314-4783-8F07-EDC9BE8855CF}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FC6BF~1.EXE > nul3⤵PID:1336
-
-
C:\Windows\{BC9C4338-A9D0-4188-A703-79686247CA42}.exeC:\Windows\{BC9C4338-A9D0-4188-A703-79686247CA42}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{BC9C4~1.EXE > nul4⤵PID:1160
-
-
C:\Windows\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exeC:\Windows\{914E4320-BA6A-4f54-9BAA-B61F9122B70D}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{914E4~1.EXE > nul5⤵PID:4588
-
-
C:\Windows\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exeC:\Windows\{E3BC0D61-632A-4be2-AAF8-97CDB5E09040}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E3BC0~1.EXE > nul6⤵PID:4760
-
-
C:\Windows\{2D9FDDF3-C781-47be-8D12-65052F805095}.exeC:\Windows\{2D9FDDF3-C781-47be-8D12-65052F805095}.exe6⤵
- Executes dropped EXE
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{2D9FD~1.EXE > nul7⤵PID:3708
-
-
C:\Windows\{87BFF860-FBE2-4e6f-A20C-ACFE0AF4237B}.exeC:\Windows\{87BFF860-FBE2-4e6f-A20C-ACFE0AF4237B}.exe7⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{87BFF~1.EXE > nul8⤵PID:2616
-
-
C:\Windows\{3A48962A-609F-4514-B16C-04B4D44C252C}.exeC:\Windows\{3A48962A-609F-4514-B16C-04B4D44C252C}.exe8⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3A489~1.EXE > nul9⤵PID:4940
-
-
C:\Windows\{4B2064FD-AAF4-42d2-A086-AEE09D4E3A76}.exeC:\Windows\{4B2064FD-AAF4-42d2-A086-AEE09D4E3A76}.exe9⤵PID:1084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{4B206~1.EXE > nul10⤵PID:2444
-
-
C:\Windows\{6983A493-1DC9-4e64-85C4-0FC11F03AFD3}.exeC:\Windows\{6983A493-1DC9-4e64-85C4-0FC11F03AFD3}.exe10⤵PID:376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6983A~1.EXE > nul11⤵PID:3508
-
-
C:\Windows\{ACC9AADE-9694-4691-A105-3FDE320610B8}.exeC:\Windows\{ACC9AADE-9694-4691-A105-3FDE320610B8}.exe11⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{ACC9A~1.EXE > nul12⤵PID:3848
-
-
C:\Windows\{7A58BE06-24EC-4e15-B7D9-2A46C117563B}.exeC:\Windows\{7A58BE06-24EC-4e15-B7D9-2A46C117563B}.exe12⤵PID:3032
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD5ee8dc33b2884f4c58188e21f310f8d95
SHA12b483faf8cee84a6ba70ec27891c75958c4ddb88
SHA256236027506e01522a3cecf128ac8dac0c403e7493d193b5b3de9b9f267dee90e5
SHA512766a75b942dbd50c1fd42fd499fb123d0a4b1408706e580bb2d60f207c0e0f5055d872a6f1e8c0b229661bfa3491c56825b65a048990be2102c958497fe0d4b4
-
Filesize
1KB
MD50469c37c06779c374b10516f746e54cd
SHA1a554cdfb5bfe2fdbef5626dff44175a0a14c9aa7
SHA25642a50b9c0cdee18b6513ca0684fe36d5108fee23b4202466ba22f5312f2c43b5
SHA5128116e597ca3fc7d7b801424a1b37533ade4fbe62b33f7045e6eaeb6b03275c7e981498b4e237230262e157aed9d257faadb6ba1586191f0ebb8d87f292cf4ce0
-
Filesize
29KB
MD531c5aab0cabe241b78146db5afce4619
SHA17250f5c87e8bb1b3dcf768c48b09faf2e128fd4a
SHA256fd94ba83aa883557d00c0344399fcca637db2c2ed990490d3ab920085bef8883
SHA512e8294516f959020156871f66d99108e8b4a9f4cdea2a5d5bf450501a1846b0ff101541b31f75f2a46c180c719835f32bfa7057c51dc1aaee022e72a3e2d907bd
-
Filesize
11KB
MD5f12317aa126b70a926c52a6b1ae4cba2
SHA1b82657bcbf88e35c66bceb2f30b69ef38ee95ff8
SHA256421ca303c6ac2c95f15a061a6be570c0c60ed07ee0ea501731e6176c77e0da1f
SHA5127c46303898c300a693af88dbf51ec9a9263e0d6f213cb0cfd8b941cfbe7d1807c4cbec79e9325ff8e6d76cc192a39d35ba3dc747a92650feaaebe21af7289aa7
-
Filesize
105KB
MD57971472133f9999af0b993ae4fb03c1c
SHA124d343a0138862a4766bfb1aaeb089b10d9e2541
SHA256df2cbeac0dff39ebc72ffd744070bea357413ec92450486dec49ed79de340dd3
SHA5125cf008bbb696760ea691f9476acf960a7a0d4202be9f4fc49df9f5ad1cdb56e3039513f9e8b2486414c97e18777c9bd4aae917b4487d1bc0d707fcb8a1be6491
-
Filesize
56KB
MD5e2dbe35a74512511c5369b61e1b570ab
SHA157b93ffccdcf87ee044c6bb9b166a53333dfeee2
SHA2567a6f772d76da1841ee1a64a2342a985cd7959ec6b3ee687fd992f95685be13ce
SHA512aff9755620e0fd981156836e9189a0eaefaf5c8f88f8d3a208f6a1ceebf193aed34d9896d9ac21674782b55689d81a66ccfeebb23f944c4af60ab85730ce374b
-
Filesize
344KB
MD568f344955c696e8b207485f39f39d1ba
SHA1f2ddefc3fdee99e7d7c0a9e45921192e33cbef07
SHA256cbb35b2f299f246999d4f7bb45dc986eeff3e380c873ebe5f98a642fe9dc3d1d
SHA51248e5802f8d14a4e519eeb8902a83c69e82f68e91844513a2d7acac50503199a04148bc390728ed36833adb811c905cfbbc778888018b83981eb0204b1e5ba37c
-
Filesize
10KB
MD54d1b3788b54d9b55b7f12202bf22df68
SHA19fb32301c8b1bea41ec4208108e613c6c85d59d5
SHA256ea6a3a902826e7b62f7416662a99cc359724a51e6b7b8ddbe7a78eb4a693da40
SHA512b327a4e11860c4ab0959abdb98e0333910a208811b01ce3ae3b07f5b8d07d398c2a29b11ffccaf0dc4ccf5ab0cfb35a162d6e1a46aad33f53cdc215a8353bafc
-
Filesize
24KB
MD582c55604589506eb98712a5fbbb4e17d
SHA1c6ba1e3591dc132777be9d2d5d75f68ab1aa272e
SHA2564bc96fde36af72dd5dbba0b76f245b7bb48eb55560a224beacb0cb4c38e96e79
SHA512632d161529407fd462740fe2747df8bc700a1bdf125e9f38329d2c4fa8c4a4a8a58614dac7f72097728763b3a415d49ba0c1ec9c9f8804bf5bc80c420996dd05
-
Filesize
54KB
MD5963f2bf39a995b04553b707e004a5112
SHA1e02c912b09232669494dd671153ed76c01be6d7b
SHA256201ddbbfce47396ce74eb1ac1b1521d5eb7f13f073f49bdc72abffc7086dbeb8
SHA51234bb42719615ab9c52b48304bc0105967ac4b3b4263e163de6d41d4371261514fc28ff9fdcf94cfe49f930acc4be84e09c6219fca8a77bd3dabc2dbdbaa46548
-
Filesize
47KB
MD5d21fff654338b0f7b19e7f8c82386116
SHA1c05b2077459f17088c97fe2e7971a0fe8e898120
SHA256abc6e833cfe9bfa358fd4b15ea9522632cd4954c2fa897190bdcc83ec1b68e63
SHA5129f24770a2911f2ce3c340242df2ea6a164567d18c26269691b45a4545a7df9dad99ddee4e92ed34c33692bb2ba597283d46f42f9d6ea5f9adceb60d319730ce7
-
Filesize
96KB
MD58e3de64bf0053af0a2ef9cb9cf8cf01c
SHA147a77a2b35c33d5a0fddbe7d7e34668c98a0ac4c
SHA2565a76f579f469f4c70e385f8c491879c788ec00f30b57858d6cbba62a630f6cbe
SHA512f624088f0da54e1ac1f8ffb4a3447f9ef08325a1226dab4586c5fdc46fa80397774c56a6699dec25f5d828bc13338fc4237b1b62e7c5d889d4dbacf5537a7c94
-
Filesize
10KB
MD5e871bdcf64993e56f4be26c98cd24fe2
SHA199a6dbac427f2a5178707260d7dacbef5c4afc0b
SHA2561c39c4408cc6a985011af2c9125d514f7d998c068fe5f2c09f9700312702870c
SHA512f36227e5a6ba70299b75cb378c79523c5653fdb85962c0ac0e25452e40b2ea2c3b14aa86a5ae0760a913910f02c61024c10dbc42b3c5311ab4331082edc27597
-
Filesize
30KB
MD50ddad1a9f287779d1b74cf5f079855f4
SHA1577e168ec26b60fde50d966890f3a038e187ccca
SHA256aaf64ffdc6790cf3ec363b598b6d164220788cbab169fb5a2c6ba2a71f04eaaa
SHA51212874ba08a39555654023035b65f60203cf8f88601ade3738936deaf9ce71bf57191882dafa52a38ad10defdf8e1537f45454e5f0674d15759ea712364c8c986
-
Filesize
11KB
MD55186aafc15bef0e3d9f8fb70620abdd5
SHA12d2859ef09e408283c96dacf5dc4f4d6ccf70da4
SHA256485a3a8f8d4e6cae5aad497ab26e9ff71b03b8b5a411b7f3a3316d70a486f8c7
SHA512f5cb272c6131e6561ff56e569250e2e7fff00c92fa0df7416beed30b8265d06226148049eb771eb8b9ae8d318311bc89e9e7c1ee1e0e5ddf41a9b46359c9362d
-
Filesize
11KB
MD5c830a2ce72869b0d43a58f582a7ac1ed
SHA14eb3472b8f7d9583db14b7e068ecc981e691388a
SHA25673a61dea22131bd0d8ce70404e3806abb414eb72b11e2f2bec4045e80e0ce482
SHA5126f42f4a98405c012e24cbc6d9ba15b510f45f4619941c9a225baae6d9401eb67e9e86dc4ce12c93f94ff1abccd54d8f57a28860497e583d24c9ce4247811294c
-
Filesize
344KB
MD5afc50fb9557c8de369443007d5ef9b88
SHA1dd4310149faaad5b7b21c550a449519a0af44b86
SHA2568bc8ece47aa37a6d2a4933cd60f5c6b1a9d250cdddda7c8a15762b40ea3d5909
SHA512c75e9f8d032298a6891bcbe2a23bc6a15059308b7093f829cd883da227a701dfbac448e377e06282fd505d66adaf6f05f6e0c050dbd0ea4c43b31637c25ffea4