Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26/06/2022, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
Resource
win10v2004-20220414-en
General
-
Target
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe
-
Size
344KB
-
MD5
54a1ca99363f3f777841416acc597cd5
-
SHA1
1f24ad129b53307b679d797145ab0f17b19927b4
-
SHA256
37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
-
SHA512
a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\Recovery+hanxi.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/DD6EA5598E7ABB52
http://tes543berda73i48fsdfsd.keratadze.at/DD6EA5598E7ABB52
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/DD6EA5598E7ABB52
http://xlowfznrg4wf7dli.ONION/DD6EA5598E7ABB52
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 1748 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe -
Deletes itself 1 IoCs
pid Process 272 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run tbeteuspyvbw.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\kphgmqqpavbl = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\tbeteuspyvbw.exe\"" tbeteuspyvbw.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2024 set thread context of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 1748 set thread context of 1120 1748 tbeteuspyvbw.exe 31 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\nn.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\Recovery+hanxi.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\fur.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\split.avi tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\Recovery+hanxi.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\Recovery+hanxi.png tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\History.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Recovery+hanxi.html tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\Recovery+hanxi.html tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\readme.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\Recovery+hanxi.html tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Recovery+hanxi.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\Recovery+hanxi.html tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\Recovery+hanxi.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\Recovery+hanxi.png tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\AssertDebug.cr2 tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\Recovery+hanxi.png tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\Recovery+hanxi.html tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\Recovery+hanxi.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\Recovery+hanxi.png tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt tbeteuspyvbw.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt tbeteuspyvbw.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tbeteuspyvbw.exe 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe File opened for modification C:\Windows\tbeteuspyvbw.exe 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 tbeteuspyvbw.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 tbeteuspyvbw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe 1120 tbeteuspyvbw.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe Token: SeDebugPrivilege 1120 tbeteuspyvbw.exe Token: SeIncreaseQuotaPrivilege 1624 WMIC.exe Token: SeSecurityPrivilege 1624 WMIC.exe Token: SeTakeOwnershipPrivilege 1624 WMIC.exe Token: SeLoadDriverPrivilege 1624 WMIC.exe Token: SeSystemProfilePrivilege 1624 WMIC.exe Token: SeSystemtimePrivilege 1624 WMIC.exe Token: SeProfSingleProcessPrivilege 1624 WMIC.exe Token: SeIncBasePriorityPrivilege 1624 WMIC.exe Token: SeCreatePagefilePrivilege 1624 WMIC.exe Token: SeBackupPrivilege 1624 WMIC.exe Token: SeRestorePrivilege 1624 WMIC.exe Token: SeShutdownPrivilege 1624 WMIC.exe Token: SeDebugPrivilege 1624 WMIC.exe Token: SeSystemEnvironmentPrivilege 1624 WMIC.exe Token: SeRemoteShutdownPrivilege 1624 WMIC.exe Token: SeUndockPrivilege 1624 WMIC.exe Token: SeManageVolumePrivilege 1624 WMIC.exe Token: 33 1624 WMIC.exe Token: 34 1624 WMIC.exe Token: 35 1624 WMIC.exe Token: SeIncreaseQuotaPrivilege 1624 WMIC.exe Token: SeSecurityPrivilege 1624 WMIC.exe Token: SeTakeOwnershipPrivilege 1624 WMIC.exe Token: SeLoadDriverPrivilege 1624 WMIC.exe Token: SeSystemProfilePrivilege 1624 WMIC.exe Token: SeSystemtimePrivilege 1624 WMIC.exe Token: SeProfSingleProcessPrivilege 1624 WMIC.exe Token: SeIncBasePriorityPrivilege 1624 WMIC.exe Token: SeCreatePagefilePrivilege 1624 WMIC.exe Token: SeBackupPrivilege 1624 WMIC.exe Token: SeRestorePrivilege 1624 WMIC.exe Token: SeShutdownPrivilege 1624 WMIC.exe Token: SeDebugPrivilege 1624 WMIC.exe Token: SeSystemEnvironmentPrivilege 1624 WMIC.exe Token: SeRemoteShutdownPrivilege 1624 WMIC.exe Token: SeUndockPrivilege 1624 WMIC.exe Token: SeManageVolumePrivilege 1624 WMIC.exe Token: 33 1624 WMIC.exe Token: 34 1624 WMIC.exe Token: 35 1624 WMIC.exe Token: SeBackupPrivilege 868 vssvc.exe Token: SeRestorePrivilege 868 vssvc.exe Token: SeAuditPrivilege 868 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 2024 wrote to memory of 1404 2024 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 27 PID 1404 wrote to memory of 1748 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 28 PID 1404 wrote to memory of 1748 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 28 PID 1404 wrote to memory of 1748 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 28 PID 1404 wrote to memory of 1748 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 28 PID 1404 wrote to memory of 272 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 29 PID 1404 wrote to memory of 272 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 29 PID 1404 wrote to memory of 272 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 29 PID 1404 wrote to memory of 272 1404 37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe 29 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1748 wrote to memory of 1120 1748 tbeteuspyvbw.exe 31 PID 1120 wrote to memory of 1624 1120 tbeteuspyvbw.exe 32 PID 1120 wrote to memory of 1624 1120 tbeteuspyvbw.exe 32 PID 1120 wrote to memory of 1624 1120 tbeteuspyvbw.exe 32 PID 1120 wrote to memory of 1624 1120 tbeteuspyvbw.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tbeteuspyvbw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tbeteuspyvbw.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"C:\Users\Admin\AppData\Local\Temp\37327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\tbeteuspyvbw.exeC:\Windows\tbeteuspyvbw.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\tbeteuspyvbw.exeC:\Windows\tbeteuspyvbw.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1120 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\37327C~1.EXE3⤵
- Deletes itself
PID:272
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD554a1ca99363f3f777841416acc597cd5
SHA11f24ad129b53307b679d797145ab0f17b19927b4
SHA25637327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
SHA512a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
-
Filesize
344KB
MD554a1ca99363f3f777841416acc597cd5
SHA11f24ad129b53307b679d797145ab0f17b19927b4
SHA25637327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
SHA512a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155
-
Filesize
344KB
MD554a1ca99363f3f777841416acc597cd5
SHA11f24ad129b53307b679d797145ab0f17b19927b4
SHA25637327c1df4dd585c2213d12020449ac78ee1b53948e35fec7da18fc9e84cbd2b
SHA512a37b1bd104e2173e119b37e2c8090b9723dd24457412fedcf1f653754ba666e32121cb8530d63662b7cadb5c8410cbd087acda9bebdbfaff00769f9052506155