Analysis
-
max time kernel
151s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 21:02
Static task
static1
Behavioral task
behavioral1
Sample
402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe
Resource
win10v2004-20220414-en
General
-
Target
402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe
-
Size
408KB
-
MD5
81eb1ba1a5b0289bab6fb45e54719df1
-
SHA1
e2c20fcf01e745ea6847f1a043e56f65343c72a7
-
SHA256
402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a
-
SHA512
3580308cc941245877fc09899d81d937bd7e5baa46460b07cb3a4a41271c8b85ae3d0aa6821863a2cf25a6b373cce6a8b89977322dfed3aa89398e1bc0decf08
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+tnsdk.txt
teslacrypt
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/DFFA6705E809984
http://u54bbnhf354fbkh254tbkhjbgy8258gnkwerg.tahaplap.com/DFFA6705E809984
http://w6bfg4hahn5bfnlsafgchkvg5fwsfvrt.hareuna.at/DFFA6705E809984
http://xlowfznrg4wf7dli.ONION/DFFA6705E809984
Extracted
C:\$Recycle.Bin\S-1-5-21-790309383-526510583-3802439154-1000\_ReCoVeRy_+tnsdk.html
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
fcnjqdrxijbb.exepid Process 644 fcnjqdrxijbb.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1804 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fcnjqdrxijbb.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\SOFTWARE\Microsoft\WINDOWS\CurrentVersion\RUN fcnjqdrxijbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\gjjcidd = "C:\\Windows\\system32\\CMD.EXE /c start C:\\Windows\\fcnjqdrxijbb.exe" fcnjqdrxijbb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
fcnjqdrxijbb.exedescription ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows NT\Accessories\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\localizedStrings.js fcnjqdrxijbb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\date-span-16.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Kentucky\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\36.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\fr-FR\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\te\LC_MESSAGES\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Reference Assemblies\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\am\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\modules\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\button-overlay.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\NavigationUp_ButtonGraphic.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows NT\TableTextService\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows NT\Accessories\ja-JP\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Photo Viewer\fr-FR\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_snow.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\cmm\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\js\library.js fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_hover.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\da\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\wa\LC_MESSAGES\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows NT\Accessories\es-ES\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\clock.css fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\square_settings.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\in_sidebar\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_ButtonGraphic.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jre7\lib\images\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\js\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_dot.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\en-US\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.rcp.zh_CN_5.5.0.165303\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access_output\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_ReCoVeRy_+tnsdk.html fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Common Files\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\Microsoft Office\_ReCoVeRy_+tnsdk.txt fcnjqdrxijbb.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\_ReCoVeRy_+tnsdk.png fcnjqdrxijbb.exe -
Drops file in Windows directory 2 IoCs
Processes:
402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exedescription ioc Process File created C:\Windows\fcnjqdrxijbb.exe 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe File opened for modification C:\Windows\fcnjqdrxijbb.exe 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fcnjqdrxijbb.exepid Process 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe 644 fcnjqdrxijbb.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exefcnjqdrxijbb.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe Token: SeDebugPrivilege 644 fcnjqdrxijbb.exe Token: SeIncreaseQuotaPrivilege 900 WMIC.exe Token: SeSecurityPrivilege 900 WMIC.exe Token: SeTakeOwnershipPrivilege 900 WMIC.exe Token: SeLoadDriverPrivilege 900 WMIC.exe Token: SeSystemProfilePrivilege 900 WMIC.exe Token: SeSystemtimePrivilege 900 WMIC.exe Token: SeProfSingleProcessPrivilege 900 WMIC.exe Token: SeIncBasePriorityPrivilege 900 WMIC.exe Token: SeCreatePagefilePrivilege 900 WMIC.exe Token: SeBackupPrivilege 900 WMIC.exe Token: SeRestorePrivilege 900 WMIC.exe Token: SeShutdownPrivilege 900 WMIC.exe Token: SeDebugPrivilege 900 WMIC.exe Token: SeSystemEnvironmentPrivilege 900 WMIC.exe Token: SeRemoteShutdownPrivilege 900 WMIC.exe Token: SeUndockPrivilege 900 WMIC.exe Token: SeManageVolumePrivilege 900 WMIC.exe Token: 33 900 WMIC.exe Token: 34 900 WMIC.exe Token: 35 900 WMIC.exe Token: SeIncreaseQuotaPrivilege 900 WMIC.exe Token: SeSecurityPrivilege 900 WMIC.exe Token: SeTakeOwnershipPrivilege 900 WMIC.exe Token: SeLoadDriverPrivilege 900 WMIC.exe Token: SeSystemProfilePrivilege 900 WMIC.exe Token: SeSystemtimePrivilege 900 WMIC.exe Token: SeProfSingleProcessPrivilege 900 WMIC.exe Token: SeIncBasePriorityPrivilege 900 WMIC.exe Token: SeCreatePagefilePrivilege 900 WMIC.exe Token: SeBackupPrivilege 900 WMIC.exe Token: SeRestorePrivilege 900 WMIC.exe Token: SeShutdownPrivilege 900 WMIC.exe Token: SeDebugPrivilege 900 WMIC.exe Token: SeSystemEnvironmentPrivilege 900 WMIC.exe Token: SeRemoteShutdownPrivilege 900 WMIC.exe Token: SeUndockPrivilege 900 WMIC.exe Token: SeManageVolumePrivilege 900 WMIC.exe Token: 33 900 WMIC.exe Token: 34 900 WMIC.exe Token: 35 900 WMIC.exe Token: SeBackupPrivilege 1552 vssvc.exe Token: SeRestorePrivilege 1552 vssvc.exe Token: SeAuditPrivilege 1552 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exefcnjqdrxijbb.exedescription pid Process procid_target PID 948 wrote to memory of 644 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 26 PID 948 wrote to memory of 644 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 26 PID 948 wrote to memory of 644 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 26 PID 948 wrote to memory of 644 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 26 PID 948 wrote to memory of 1804 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 27 PID 948 wrote to memory of 1804 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 27 PID 948 wrote to memory of 1804 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 27 PID 948 wrote to memory of 1804 948 402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe 27 PID 644 wrote to memory of 900 644 fcnjqdrxijbb.exe 29 PID 644 wrote to memory of 900 644 fcnjqdrxijbb.exe 29 PID 644 wrote to memory of 900 644 fcnjqdrxijbb.exe 29 PID 644 wrote to memory of 900 644 fcnjqdrxijbb.exe 29 -
System policy modification 1 TTPs 2 IoCs
Processes:
fcnjqdrxijbb.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fcnjqdrxijbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" fcnjqdrxijbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe"C:\Users\Admin\AppData\Local\Temp\402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\fcnjqdrxijbb.exeC:\Windows\fcnjqdrxijbb.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:644 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\402B79~1.EXE2⤵
- Deletes itself
PID:1804
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD581eb1ba1a5b0289bab6fb45e54719df1
SHA1e2c20fcf01e745ea6847f1a043e56f65343c72a7
SHA256402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a
SHA5123580308cc941245877fc09899d81d937bd7e5baa46460b07cb3a4a41271c8b85ae3d0aa6821863a2cf25a6b373cce6a8b89977322dfed3aa89398e1bc0decf08
-
Filesize
408KB
MD581eb1ba1a5b0289bab6fb45e54719df1
SHA1e2c20fcf01e745ea6847f1a043e56f65343c72a7
SHA256402b79b1b53604ec3c7a4e969d834df62c8cc7c7f2d876d8678c7c1f59eb1d7a
SHA5123580308cc941245877fc09899d81d937bd7e5baa46460b07cb3a4a41271c8b85ae3d0aa6821863a2cf25a6b373cce6a8b89977322dfed3aa89398e1bc0decf08