Analysis
-
max time kernel
150s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07/07/2022, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe
Resource
win10v2004-20220414-en
General
-
Target
43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe
-
Size
488KB
-
MD5
29fb36b28a122bd7f9b5a880948fad4f
-
SHA1
fdef9d431b817895c4786e9372e7e85c65001d16
-
SHA256
43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88
-
SHA512
2f5c98c41a196ac2e36ca6c60fb21f6b2edc475bfba3a67f67af92b985731275a685c02852af1c7eef08414e00a14ba86fef7bfd4a47a7ac0d85a589b10407d7
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+gqnft.txt
teslacrypt
http://sondr5344ygfweyjbfkw4fhsefv.heliofetch.at/725C64A21621480
http://gfkuwflbhsjdabnu4nfukerfqwlfwr4rw.ringbalor.com/725C64A21621480
http://oehknf74ohqlfnpq9rhfgcq93g.hateflux.com/725C64A21621480
http://xlowfznrg4wf7dli.ONION/725C64A21621480
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\_ReCoVeRy_+gqnft.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 2824 gvnnjtwyudkv.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation gvnnjtwyudkv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\srpyfjr = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\gvnnjtwyudkv.exe" gvnnjtwyudkv.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN gvnnjtwyudkv.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoDev.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\hu\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hr-HR\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-BR.pak gvnnjtwyudkv.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\management\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\Analysis\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\server\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\management\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\+Connect to New Data Source.odc gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\hr\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ja.pak gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ar\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\PersonaSpy.js gvnnjtwyudkv.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoBeta.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.XLS gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\es\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\LibCurl64.DllA\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bg.pak gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\StartMenu_Win10_RTL.mp4 gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Document Parts\1033\16\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-black_scale-100.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\META-INF\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\THIRDPARTYLICENSEREADME.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sl\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\LibCurl64.DllA\OpenSSL64.DllA\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\_ReCoVeRy_+gqnft.html gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\_ReCoVeRy_+gqnft.txt gvnnjtwyudkv.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\_ReCoVeRy_+gqnft.png gvnnjtwyudkv.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gvnnjtwyudkv.exe 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe File opened for modification C:\Windows\gvnnjtwyudkv.exe 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe 2824 gvnnjtwyudkv.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 2112 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe Token: SeDebugPrivilege 2824 gvnnjtwyudkv.exe Token: SeIncreaseQuotaPrivilege 1264 WMIC.exe Token: SeSecurityPrivilege 1264 WMIC.exe Token: SeTakeOwnershipPrivilege 1264 WMIC.exe Token: SeLoadDriverPrivilege 1264 WMIC.exe Token: SeSystemProfilePrivilege 1264 WMIC.exe Token: SeSystemtimePrivilege 1264 WMIC.exe Token: SeProfSingleProcessPrivilege 1264 WMIC.exe Token: SeIncBasePriorityPrivilege 1264 WMIC.exe Token: SeCreatePagefilePrivilege 1264 WMIC.exe Token: SeBackupPrivilege 1264 WMIC.exe Token: SeRestorePrivilege 1264 WMIC.exe Token: SeShutdownPrivilege 1264 WMIC.exe Token: SeDebugPrivilege 1264 WMIC.exe Token: SeSystemEnvironmentPrivilege 1264 WMIC.exe Token: SeRemoteShutdownPrivilege 1264 WMIC.exe Token: SeUndockPrivilege 1264 WMIC.exe Token: SeManageVolumePrivilege 1264 WMIC.exe Token: 33 1264 WMIC.exe Token: 34 1264 WMIC.exe Token: 35 1264 WMIC.exe Token: 36 1264 WMIC.exe Token: SeIncreaseQuotaPrivilege 1264 WMIC.exe Token: SeSecurityPrivilege 1264 WMIC.exe Token: SeTakeOwnershipPrivilege 1264 WMIC.exe Token: SeLoadDriverPrivilege 1264 WMIC.exe Token: SeSystemProfilePrivilege 1264 WMIC.exe Token: SeSystemtimePrivilege 1264 WMIC.exe Token: SeProfSingleProcessPrivilege 1264 WMIC.exe Token: SeIncBasePriorityPrivilege 1264 WMIC.exe Token: SeCreatePagefilePrivilege 1264 WMIC.exe Token: SeBackupPrivilege 1264 WMIC.exe Token: SeRestorePrivilege 1264 WMIC.exe Token: SeShutdownPrivilege 1264 WMIC.exe Token: SeDebugPrivilege 1264 WMIC.exe Token: SeSystemEnvironmentPrivilege 1264 WMIC.exe Token: SeRemoteShutdownPrivilege 1264 WMIC.exe Token: SeUndockPrivilege 1264 WMIC.exe Token: SeManageVolumePrivilege 1264 WMIC.exe Token: 33 1264 WMIC.exe Token: 34 1264 WMIC.exe Token: 35 1264 WMIC.exe Token: 36 1264 WMIC.exe Token: SeBackupPrivilege 3520 vssvc.exe Token: SeRestorePrivilege 3520 vssvc.exe Token: SeAuditPrivilege 3520 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2824 2112 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe 79 PID 2112 wrote to memory of 2824 2112 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe 79 PID 2112 wrote to memory of 2824 2112 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe 79 PID 2112 wrote to memory of 1904 2112 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe 80 PID 2112 wrote to memory of 1904 2112 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe 80 PID 2112 wrote to memory of 1904 2112 43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe 80 PID 2824 wrote to memory of 1264 2824 gvnnjtwyudkv.exe 82 PID 2824 wrote to memory of 1264 2824 gvnnjtwyudkv.exe 82 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System gvnnjtwyudkv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" gvnnjtwyudkv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe"C:\Users\Admin\AppData\Local\Temp\43ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\gvnnjtwyudkv.exeC:\Windows\gvnnjtwyudkv.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2824 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\43CE88~1.EXE2⤵PID:1904
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD529fb36b28a122bd7f9b5a880948fad4f
SHA1fdef9d431b817895c4786e9372e7e85c65001d16
SHA25643ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88
SHA5122f5c98c41a196ac2e36ca6c60fb21f6b2edc475bfba3a67f67af92b985731275a685c02852af1c7eef08414e00a14ba86fef7bfd4a47a7ac0d85a589b10407d7
-
Filesize
488KB
MD529fb36b28a122bd7f9b5a880948fad4f
SHA1fdef9d431b817895c4786e9372e7e85c65001d16
SHA25643ce8888defc43fb296483f98cfbfb700969a30805b0572dfcac759d3314db88
SHA5122f5c98c41a196ac2e36ca6c60fb21f6b2edc475bfba3a67f67af92b985731275a685c02852af1c7eef08414e00a14ba86fef7bfd4a47a7ac0d85a589b10407d7