Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25/06/2022, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe
Resource
win7-20220414-en
General
-
Target
6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe
-
Size
253KB
-
MD5
bce37dd072dc0eeeba64a67f92e9e7c3
-
SHA1
a04ad84a2dabb2271c94faced586a90f4a460584
-
SHA256
6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b
-
SHA512
fcaa1eb9f77a8bf3018454a9d0117c70c58d0f6e332cfb674bafd752a2a823d63081b2a0116c45caeda5bb44ffd3ef1372fd8f23014db6c3f39061ee85c69947
Malware Config
Signatures
-
Detects PlugX Payload 8 IoCs
resource yara_rule behavioral1/memory/1044-67-0x0000000000310000-0x000000000033C000-memory.dmp family_plugx behavioral1/memory/564-75-0x0000000000270000-0x000000000029C000-memory.dmp family_plugx behavioral1/memory/612-84-0x0000000000340000-0x000000000036C000-memory.dmp family_plugx behavioral1/memory/1924-85-0x0000000000280000-0x00000000002AC000-memory.dmp family_plugx behavioral1/memory/564-86-0x0000000000270000-0x000000000029C000-memory.dmp family_plugx behavioral1/memory/836-91-0x0000000000280000-0x00000000002AC000-memory.dmp family_plugx behavioral1/memory/1924-92-0x0000000000280000-0x00000000002AC000-memory.dmp family_plugx behavioral1/memory/836-93-0x0000000000280000-0x00000000002AC000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
pid Process 1044 Nv.exe 564 Nv.exe 612 Nv.exe -
Deletes itself 1 IoCs
pid Process 1044 Nv.exe -
Loads dropped DLL 8 IoCs
pid Process 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 1044 Nv.exe 564 Nv.exe 612 Nv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 33 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{39AF2D23-0397-4256-81C4-CB472CFA4974}\WpadDecisionReason = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a6-7d-ce-ba-e5\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00b4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{39AF2D23-0397-4256-81C4-CB472CFA4974} svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a6-7d-ce-ba-e5\WpadDecisionTime = 007a7c5e4388d801 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{39AF2D23-0397-4256-81C4-CB472CFA4974}\WpadNetworkName = "Network 3" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{39AF2D23-0397-4256-81C4-CB472CFA4974}\WpadDecision = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{39AF2D23-0397-4256-81C4-CB472CFA4974}\WpadDecisionTime = 007a7c5e4388d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a6-7d-ce-ba-e5 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{39AF2D23-0397-4256-81C4-CB472CFA4974}\fa-a6-7d-ce-ba-e5 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\fa-a6-7d-ce-ba-e5\WpadDecision = "0" svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 42003200360041003300420034003000360042003200410038003300380046000000 svchost.exe Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1044 Nv.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 1924 svchost.exe 1924 svchost.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 1924 svchost.exe 1924 svchost.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 1924 svchost.exe 1924 svchost.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 1924 svchost.exe 1924 svchost.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 1924 svchost.exe 1924 svchost.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 1924 svchost.exe 1924 svchost.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 836 msiexec.exe 1924 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1044 Nv.exe Token: SeTcbPrivilege 1044 Nv.exe Token: SeDebugPrivilege 564 Nv.exe Token: SeTcbPrivilege 564 Nv.exe Token: SeDebugPrivilege 612 Nv.exe Token: SeTcbPrivilege 612 Nv.exe Token: SeDebugPrivilege 1924 svchost.exe Token: SeTcbPrivilege 1924 svchost.exe Token: SeDebugPrivilege 836 msiexec.exe Token: SeTcbPrivilege 836 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1044 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 28 PID 1448 wrote to memory of 1044 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 28 PID 1448 wrote to memory of 1044 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 28 PID 1448 wrote to memory of 1044 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 28 PID 1448 wrote to memory of 1044 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 28 PID 1448 wrote to memory of 1044 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 28 PID 1448 wrote to memory of 1044 1448 6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe 28 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 612 wrote to memory of 1924 612 Nv.exe 32 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33 PID 1924 wrote to memory of 836 1924 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe"C:\Users\Admin\AppData\Local\Temp\6be45f6054be1bcd7e91aab715f3e4342c3ad988d4f53ebb41cb79caea1da70b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Nv.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Nv.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\ProgramData\SxS\Nv.exe"C:\ProgramData\SxS\Nv.exe" 100 10441⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:564
-
C:\ProgramData\SxS\Nv.exe"C:\ProgramData\SxS\Nv.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 19243⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
48KB
MD5d659d95d46f71f172cd4f2aca9532949
SHA113a4a93c5a76ad1ea95cc6e9c7e2282f1981c85d
SHA2569e4800663e62415d01f844195d8bae0be71a1bd14b9d4103c6dedb9266957837
SHA512ad423ef32635358f8c47854a95c9e18dde7fe1e31c450aee7fd16f5a4043a8fd135ad5eac7491909acdf5afd6d013f8fd9b1f07809d8ff88458dbad31dddaba5
-
Filesize
110KB
MD5c889dc4f6294e882c8ce08f1f9a0aa12
SHA12522d785f2f78d0bb2841723695e1ab55afa1313
SHA256d6ad656de945a3e4a8179bae85173bcdf986c85d8328d5e788a8a695faf1576b
SHA51244d16808678fcbd5936e1a22f715865c948026fdf283b121f3ae17e8f40809f4d75e055b84daf60808a5a9f59f585402b4ce73d9dac0d86524baf207226c6662
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
48KB
MD5d659d95d46f71f172cd4f2aca9532949
SHA113a4a93c5a76ad1ea95cc6e9c7e2282f1981c85d
SHA2569e4800663e62415d01f844195d8bae0be71a1bd14b9d4103c6dedb9266957837
SHA512ad423ef32635358f8c47854a95c9e18dde7fe1e31c450aee7fd16f5a4043a8fd135ad5eac7491909acdf5afd6d013f8fd9b1f07809d8ff88458dbad31dddaba5
-
Filesize
110KB
MD5c889dc4f6294e882c8ce08f1f9a0aa12
SHA12522d785f2f78d0bb2841723695e1ab55afa1313
SHA256d6ad656de945a3e4a8179bae85173bcdf986c85d8328d5e788a8a695faf1576b
SHA51244d16808678fcbd5936e1a22f715865c948026fdf283b121f3ae17e8f40809f4d75e055b84daf60808a5a9f59f585402b4ce73d9dac0d86524baf207226c6662
-
Filesize
48KB
MD5d659d95d46f71f172cd4f2aca9532949
SHA113a4a93c5a76ad1ea95cc6e9c7e2282f1981c85d
SHA2569e4800663e62415d01f844195d8bae0be71a1bd14b9d4103c6dedb9266957837
SHA512ad423ef32635358f8c47854a95c9e18dde7fe1e31c450aee7fd16f5a4043a8fd135ad5eac7491909acdf5afd6d013f8fd9b1f07809d8ff88458dbad31dddaba5
-
Filesize
48KB
MD5d659d95d46f71f172cd4f2aca9532949
SHA113a4a93c5a76ad1ea95cc6e9c7e2282f1981c85d
SHA2569e4800663e62415d01f844195d8bae0be71a1bd14b9d4103c6dedb9266957837
SHA512ad423ef32635358f8c47854a95c9e18dde7fe1e31c450aee7fd16f5a4043a8fd135ad5eac7491909acdf5afd6d013f8fd9b1f07809d8ff88458dbad31dddaba5
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
48KB
MD5d659d95d46f71f172cd4f2aca9532949
SHA113a4a93c5a76ad1ea95cc6e9c7e2282f1981c85d
SHA2569e4800663e62415d01f844195d8bae0be71a1bd14b9d4103c6dedb9266957837
SHA512ad423ef32635358f8c47854a95c9e18dde7fe1e31c450aee7fd16f5a4043a8fd135ad5eac7491909acdf5afd6d013f8fd9b1f07809d8ff88458dbad31dddaba5