Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 05:01
Behavioral task
behavioral1
Sample
5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe
Resource
win7-20240903-en
General
-
Target
5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe
-
Size
3.2MB
-
MD5
189a348006367f0532cafbced6f4f7a0
-
SHA1
334fe5ea524c5a8e51ba8cb0ade6d894c9c8f94c
-
SHA256
5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641
-
SHA512
679706cf963b7ed251e61dc8d26b2fea1016ec72cf2596a4852c85d1ad5d4b8e43bd2d761f192e72cc5e5e39ecb6ce666366bdf2a0927f93186317ddc3bdca80
-
SSDEEP
49152:tivht62XlaSFNWPjljiFa2RoUYI4CZ1J5LoGdQPTHHB72eh2NTi:MvL62XlaSFNWPjljiFXRoUYI4CT4
Malware Config
Extracted
quasar
1.4.1
Office04
4.tcp.us-cal-1.ngrok.io:18092
11bbf22e-826e-486b-b024-adbd86228a9e
-
encryption_key
7A589EDBC6A581E125BF830EF0D05FC74BB75E30
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ctfmon
-
subdirectory
SubDir
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Quasar family
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/files/0x000800000001650a-6.dat family_quasar behavioral1/memory/2200-11-0x0000000000C60000-0x0000000000F84000-memory.dmp family_quasar behavioral1/files/0x00070000000167ea-45.dat family_quasar behavioral1/memory/776-81-0x00000000009A0000-0x0000000000CC4000-memory.dmp family_quasar -
Executes dropped EXE 8 IoCs
pid Process 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 2268 icsys.icn.exe 2756 explorer.exe 2308 spoolsv.exe 1372 Client.exe 2796 svchost.exe 2568 spoolsv.exe 776 client.exe -
Loads dropped DLL 7 IoCs
pid Process 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2268 icsys.icn.exe 2756 explorer.exe 2308 spoolsv.exe 2796 svchost.exe 1372 Client.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe Client.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1664 schtasks.exe 2860 schtasks.exe 556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 2756 explorer.exe 1372 Client.exe 2796 svchost.exe 2796 svchost.exe 2796 svchost.exe 2796 svchost.exe 2796 svchost.exe 1372 Client.exe 2796 svchost.exe 2796 svchost.exe 1372 Client.exe 2796 svchost.exe 1372 Client.exe 2796 svchost.exe 1372 Client.exe 2796 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2796 svchost.exe 2756 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe Token: SeDebugPrivilege 776 client.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 2268 icsys.icn.exe 2268 icsys.icn.exe 2756 explorer.exe 2756 explorer.exe 2308 spoolsv.exe 2308 spoolsv.exe 1372 Client.exe 1372 Client.exe 2796 svchost.exe 2796 svchost.exe 2568 spoolsv.exe 2568 spoolsv.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2200 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 31 PID 2340 wrote to memory of 2200 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 31 PID 2340 wrote to memory of 2200 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 31 PID 2340 wrote to memory of 2200 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 31 PID 2200 wrote to memory of 1664 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 32 PID 2200 wrote to memory of 1664 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 32 PID 2200 wrote to memory of 1664 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 32 PID 2340 wrote to memory of 2268 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 34 PID 2340 wrote to memory of 2268 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 34 PID 2340 wrote to memory of 2268 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 34 PID 2340 wrote to memory of 2268 2340 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe 34 PID 2268 wrote to memory of 2756 2268 icsys.icn.exe 35 PID 2268 wrote to memory of 2756 2268 icsys.icn.exe 35 PID 2268 wrote to memory of 2756 2268 icsys.icn.exe 35 PID 2268 wrote to memory of 2756 2268 icsys.icn.exe 35 PID 2756 wrote to memory of 2308 2756 explorer.exe 36 PID 2756 wrote to memory of 2308 2756 explorer.exe 36 PID 2756 wrote to memory of 2308 2756 explorer.exe 36 PID 2756 wrote to memory of 2308 2756 explorer.exe 36 PID 2200 wrote to memory of 1372 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 37 PID 2200 wrote to memory of 1372 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 37 PID 2200 wrote to memory of 1372 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 37 PID 2200 wrote to memory of 1372 2200 5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe 37 PID 2308 wrote to memory of 2796 2308 spoolsv.exe 38 PID 2308 wrote to memory of 2796 2308 spoolsv.exe 38 PID 2308 wrote to memory of 2796 2308 spoolsv.exe 38 PID 2308 wrote to memory of 2796 2308 spoolsv.exe 38 PID 2796 wrote to memory of 2568 2796 svchost.exe 39 PID 2796 wrote to memory of 2568 2796 svchost.exe 39 PID 2796 wrote to memory of 2568 2796 svchost.exe 39 PID 2796 wrote to memory of 2568 2796 svchost.exe 39 PID 2756 wrote to memory of 640 2756 explorer.exe 40 PID 2756 wrote to memory of 640 2756 explorer.exe 40 PID 2756 wrote to memory of 640 2756 explorer.exe 40 PID 2756 wrote to memory of 640 2756 explorer.exe 40 PID 2796 wrote to memory of 2860 2796 svchost.exe 41 PID 2796 wrote to memory of 2860 2796 svchost.exe 41 PID 2796 wrote to memory of 2860 2796 svchost.exe 41 PID 2796 wrote to memory of 2860 2796 svchost.exe 41 PID 1372 wrote to memory of 776 1372 Client.exe 43 PID 1372 wrote to memory of 776 1372 Client.exe 43 PID 1372 wrote to memory of 776 1372 Client.exe 43 PID 1372 wrote to memory of 776 1372 Client.exe 43 PID 2796 wrote to memory of 556 2796 svchost.exe 46 PID 2796 wrote to memory of 556 2796 svchost.exe 46 PID 2796 wrote to memory of 556 2796 svchost.exe 46 PID 2796 wrote to memory of 556 2796 svchost.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe"C:\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641N.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\users\admin\appdata\local\temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exec:\users\admin\appdata\local\temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "ctfmon" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1664
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\users\admin\appdata\roaming\subdir\client.exec:\users\admin\appdata\roaming\subdir\client.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe4⤵PID:1916
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:03 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 05:04 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:556
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:640
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5189a348006367f0532cafbced6f4f7a0
SHA1334fe5ea524c5a8e51ba8cb0ade6d894c9c8f94c
SHA2565eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641
SHA512679706cf963b7ed251e61dc8d26b2fea1016ec72cf2596a4852c85d1ad5d4b8e43bd2d761f192e72cc5e5e39ecb6ce666366bdf2a0927f93186317ddc3bdca80
-
Filesize
135KB
MD5ab00e119e81e07ac502834f62bc00bbc
SHA124a8e62358379e71f0ec53c67a783d107784d390
SHA2565b3748bfca201acc6c5824222661c9a8f73501d2af5091b8c4f16423b476a5da
SHA512eccf362ff37fa2dff85da8e6447ac950c102bd3d09e332c0b4b3e2d88b5bb018b99f0fc4665c96f4556fbd35aa63c34d352c1efdb937866b150b64198f2ef6cc
-
Filesize
135KB
MD575103a2b5a70d0c7b2dac8af8ec0f936
SHA11a4f760cac0f1ab3be43a161d8f01e17c7233e54
SHA2562ccbbe3621e201a7ad027003271adced99a6349ad0aac5cad8027319ced8e59e
SHA5128a39542db0f5c031d69d2999f1b2d235dc468a38682b161e5e9fce3fbbd3ce50b5c63a182a3656c30d3ffaa6678658663355234ef8d6b58bd9c0d3f1c7f4418e
-
Filesize
135KB
MD507a50a83048285452fede28659cf0dc2
SHA1a6e7cbf8fbddd08dddd7f2ff9a067b0a81bb1eda
SHA25683f30aad877c82fd6a4c96d506f98c2d2fe567f7dc1b06cbaaf33abca2b80cf2
SHA512722b7d7a535017b4e329d11098726f61836e6cf5be1cb87dcdb30fbdecf7f05a9a4be5ae7eaa90fdfa7064262bb09253fd1a6c767fd67336bb24f0aa7b23e428
-
\Users\Admin\AppData\Local\Temp\5eeaa9bcbf85412722f2bc78d1db1634d25f1f6c75c8d0134d775e489b0b6641n.exe
Filesize3.1MB
MD5942d7d99678d584c4481278378741d51
SHA197efb624cfa34da0c5583e61a5982fd496de8e2d
SHA2564119dedd1d6408f80505394a374cde76124a736913f958c878f54c16c98986e3
SHA5120c1798628d5c90eaa6cf54277ab917408b5921e4f39ece0505510d9b7241df6748a365bc2a0a1cdaa24771f4ac56a9973a6515a0e32a14a66a9ed98c2871dfba
-
Filesize
135KB
MD52267463b6598465742895e5600ada5e2
SHA1f4a11a40de4ab4e6d5c89ffe27e19b8df28f9b30
SHA256713cd146b309f11c8e5ea0118616fa6e1a4c8658d430b02d5d161b25fd3bfc8b
SHA512e2133190a324e55192dfd2d6b0e82605f9d41877dde26c1b547281168b6731d05a711649b1d3cad5c19f7193bef17cdf1507c2882c6695a9dd68a39804e8f3b1