Analysis
-
max time kernel
153s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 19:31
Static task
static1
Behavioral task
behavioral1
Sample
09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe
Resource
win10v2004-20220414-en
General
-
Target
09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe
-
Size
608KB
-
MD5
4d1568dc2f14ef934ea59473ac196d06
-
SHA1
623c624e9d62bf311bd2ff851d64f735e470773a
-
SHA256
09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad
-
SHA512
64f2ac98d7055900d6958f655a46a717a19d81014c70e4f77aa7eaea9550dd3dbebdb3fb2cddbc2ded5bca547f534fcfe4e886370f62ea2d8c4b5143124e0f6e
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1081944012-3634099177-1681222835-1000\RECOVER+afqal.TXT
http://akdfrefdkm45tf33fsdfsdf.yamenswash.com/33BBAF92BAEC991
http://p4fhmjnsdfbm4w4fdsc.avowvoice.com/33BBAF92BAEC991
http://nn54djhfnrnm4dnjnerfsd.replylaten.at/33BBAF92BAEC991
http://fwgrhsao3aoml7ej.onion/33BBAF92BAEC991
Signatures
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 3 IoCs
pid Process 4592 deqrywpca.exe 536 deqrywpca.exe 1040 kgwgi.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation kgwgi.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\addon_v57 = "C:\\Windows\\deqrywpca.exe" deqrywpca.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows\CurrentVersion\Run deqrywpca.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 360 set thread context of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 4592 set thread context of 536 4592 deqrywpca.exe 90 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\vi\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\he.pak deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\et\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\tr\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_globalstyle.css deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\th-TH\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ko\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Common Files\System\de-DE\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-BR.pak deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\th.pak deqrywpca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoCanary.png deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.XLS deqrywpca.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\images\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nb-NO\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ro-RO\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\StartMenu_Win7_RTL.wmv deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\ffjcext.zip deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\hu\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\en-us\RECOVER+afqal.TXT deqrywpca.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\RECOVER+afqal.HTM deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-black_scale-180.png deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ro\RECOVER+afqal.PNG deqrywpca.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\notice.txt deqrywpca.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\deqrywpca.exe 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe File opened for modification C:\Windows\deqrywpca.exe 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4864 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe 536 deqrywpca.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3704 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe Token: SeDebugPrivilege 536 deqrywpca.exe Token: SeBackupPrivilege 3360 vssvc.exe Token: SeRestorePrivilege 3360 vssvc.exe Token: SeAuditPrivilege 3360 vssvc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 4592 deqrywpca.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 360 wrote to memory of 3704 360 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 86 PID 3704 wrote to memory of 4592 3704 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 87 PID 3704 wrote to memory of 4592 3704 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 87 PID 3704 wrote to memory of 4592 3704 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 87 PID 3704 wrote to memory of 1340 3704 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 88 PID 3704 wrote to memory of 1340 3704 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 88 PID 3704 wrote to memory of 1340 3704 09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe 88 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 4592 wrote to memory of 536 4592 deqrywpca.exe 90 PID 536 wrote to memory of 1040 536 deqrywpca.exe 91 PID 536 wrote to memory of 1040 536 deqrywpca.exe 91 PID 536 wrote to memory of 1040 536 deqrywpca.exe 91 PID 1040 wrote to memory of 4864 1040 kgwgi.exe 92 PID 1040 wrote to memory of 4864 1040 kgwgi.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe"C:\Users\Admin\AppData\Local\Temp\09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe"C:\Users\Admin\AppData\Local\Temp\09265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\deqrywpca.exeC:\Windows\deqrywpca.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\deqrywpca.exeC:\Windows\deqrywpca.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\Documents\kgwgi.exeC:\Users\Admin\Documents\kgwgi.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet6⤵
- Interacts with shadow copies
PID:4864
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\09265D~1.EXE3⤵PID:1340
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59dfc75037c8deccc2f1840b249b17750
SHA1ee37e409cfe2b124e63f98f1797aec0330204b82
SHA256b5680fd682b7f64e577492c097c825e4a5a00baa82a8668f478640c5f8918da1
SHA51225e9f3546af040f3cf782b4d6c511517ac0c95cfff8b3afec407c5917427f3129c92495f95873fb67ad928a9c7ef234508ecc9ffd8835da260d8fd1e64ead16e
-
Filesize
3KB
MD59dfc75037c8deccc2f1840b249b17750
SHA1ee37e409cfe2b124e63f98f1797aec0330204b82
SHA256b5680fd682b7f64e577492c097c825e4a5a00baa82a8668f478640c5f8918da1
SHA51225e9f3546af040f3cf782b4d6c511517ac0c95cfff8b3afec407c5917427f3129c92495f95873fb67ad928a9c7ef234508ecc9ffd8835da260d8fd1e64ead16e
-
Filesize
608KB
MD54d1568dc2f14ef934ea59473ac196d06
SHA1623c624e9d62bf311bd2ff851d64f735e470773a
SHA25609265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad
SHA51264f2ac98d7055900d6958f655a46a717a19d81014c70e4f77aa7eaea9550dd3dbebdb3fb2cddbc2ded5bca547f534fcfe4e886370f62ea2d8c4b5143124e0f6e
-
Filesize
608KB
MD54d1568dc2f14ef934ea59473ac196d06
SHA1623c624e9d62bf311bd2ff851d64f735e470773a
SHA25609265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad
SHA51264f2ac98d7055900d6958f655a46a717a19d81014c70e4f77aa7eaea9550dd3dbebdb3fb2cddbc2ded5bca547f534fcfe4e886370f62ea2d8c4b5143124e0f6e
-
Filesize
608KB
MD54d1568dc2f14ef934ea59473ac196d06
SHA1623c624e9d62bf311bd2ff851d64f735e470773a
SHA25609265db038f95df5dcc7223732dc7802a4e56e2996a96e53fe5bc6f179b15fad
SHA51264f2ac98d7055900d6958f655a46a717a19d81014c70e4f77aa7eaea9550dd3dbebdb3fb2cddbc2ded5bca547f534fcfe4e886370f62ea2d8c4b5143124e0f6e