Analysis
-
max time kernel
151s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
16-07-2022 23:48
Static task
static1
Behavioral task
behavioral1
Sample
5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe
Resource
win10v2004-20220414-en
General
-
Target
5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe
-
Size
337KB
-
MD5
68a457cedcf7dc8ef24863d223ccece5
-
SHA1
8a6b62d84b00f8bf72e903c8591486dbea87b4ec
-
SHA256
5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12
-
SHA512
0fbef2de39466a9007c1a69827eb40ebf6ab78295155285955c37362e160ab8c7cd1ff5f5ee2132b9d26986b83f211eda1c03ffa0fab1e8806a445dba5329d25
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-1083475884-596052423-1669053738-1000\_RECoVERY_+cyewu.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/B3D9FD789D3A1B33
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/B3D9FD789D3A1B33
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/B3D9FD789D3A1B33
http://xlowfznrg4wf7dli.ONION/B3D9FD789D3A1B33
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
Processes:
facovsmgpvmj.exepid Process 1228 facovsmgpvmj.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1696 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
facovsmgpvmj.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run facovsmgpvmj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\rcflvsgbvdir = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\facovsmgpvmj.exe\"" facovsmgpvmj.exe -
Drops file in Program Files directory 64 IoCs
Processes:
facovsmgpvmj.exedescription ioc Process File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\chapters-static.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\it-IT\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_item.png facovsmgpvmj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Small_News.jpg facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIconSubpictur.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\title_trans_scene.wmv facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToNotesBackground.wmv facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\NavigationUp_ButtonGraphic.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\Notes_btn-back-static.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\de-DE\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\en-US\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\7-Zip\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\curtains.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\colorcycle.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\CircleSubpicture.png facovsmgpvmj.exe File opened for modification C:\Program Files\7-Zip\Lang\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Blue_Gradient.jpg facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\Title_Page_PAL.wmv facovsmgpvmj.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickAnimation.avi facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\babypink.png facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\_RECoVERY_+cyewu.txt facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\_RECoVERY_+cyewu.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport_mask_right.png facovsmgpvmj.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrome.7z facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\_RECoVERY_+cyewu.html facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\NavigationUp_SelectionSubpicture.png facovsmgpvmj.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationUp_ButtonGraphic.png facovsmgpvmj.exe -
Drops file in Windows directory 2 IoCs
Processes:
5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exedescription ioc Process File created C:\Windows\facovsmgpvmj.exe 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe File opened for modification C:\Windows\facovsmgpvmj.exe 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
facovsmgpvmj.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 facovsmgpvmj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 facovsmgpvmj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 facovsmgpvmj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 facovsmgpvmj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 facovsmgpvmj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 facovsmgpvmj.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
facovsmgpvmj.exepid Process 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe 1228 facovsmgpvmj.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exefacovsmgpvmj.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe Token: SeDebugPrivilege 1228 facovsmgpvmj.exe Token: SeIncreaseQuotaPrivilege 320 WMIC.exe Token: SeSecurityPrivilege 320 WMIC.exe Token: SeTakeOwnershipPrivilege 320 WMIC.exe Token: SeLoadDriverPrivilege 320 WMIC.exe Token: SeSystemProfilePrivilege 320 WMIC.exe Token: SeSystemtimePrivilege 320 WMIC.exe Token: SeProfSingleProcessPrivilege 320 WMIC.exe Token: SeIncBasePriorityPrivilege 320 WMIC.exe Token: SeCreatePagefilePrivilege 320 WMIC.exe Token: SeBackupPrivilege 320 WMIC.exe Token: SeRestorePrivilege 320 WMIC.exe Token: SeShutdownPrivilege 320 WMIC.exe Token: SeDebugPrivilege 320 WMIC.exe Token: SeSystemEnvironmentPrivilege 320 WMIC.exe Token: SeRemoteShutdownPrivilege 320 WMIC.exe Token: SeUndockPrivilege 320 WMIC.exe Token: SeManageVolumePrivilege 320 WMIC.exe Token: 33 320 WMIC.exe Token: 34 320 WMIC.exe Token: 35 320 WMIC.exe Token: SeIncreaseQuotaPrivilege 320 WMIC.exe Token: SeSecurityPrivilege 320 WMIC.exe Token: SeTakeOwnershipPrivilege 320 WMIC.exe Token: SeLoadDriverPrivilege 320 WMIC.exe Token: SeSystemProfilePrivilege 320 WMIC.exe Token: SeSystemtimePrivilege 320 WMIC.exe Token: SeProfSingleProcessPrivilege 320 WMIC.exe Token: SeIncBasePriorityPrivilege 320 WMIC.exe Token: SeCreatePagefilePrivilege 320 WMIC.exe Token: SeBackupPrivilege 320 WMIC.exe Token: SeRestorePrivilege 320 WMIC.exe Token: SeShutdownPrivilege 320 WMIC.exe Token: SeDebugPrivilege 320 WMIC.exe Token: SeSystemEnvironmentPrivilege 320 WMIC.exe Token: SeRemoteShutdownPrivilege 320 WMIC.exe Token: SeUndockPrivilege 320 WMIC.exe Token: SeManageVolumePrivilege 320 WMIC.exe Token: 33 320 WMIC.exe Token: 34 320 WMIC.exe Token: 35 320 WMIC.exe Token: SeBackupPrivilege 1212 vssvc.exe Token: SeRestorePrivilege 1212 vssvc.exe Token: SeAuditPrivilege 1212 vssvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exefacovsmgpvmj.exedescription pid Process procid_target PID 1864 wrote to memory of 1228 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 28 PID 1864 wrote to memory of 1228 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 28 PID 1864 wrote to memory of 1228 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 28 PID 1864 wrote to memory of 1228 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 28 PID 1864 wrote to memory of 1696 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 29 PID 1864 wrote to memory of 1696 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 29 PID 1864 wrote to memory of 1696 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 29 PID 1864 wrote to memory of 1696 1864 5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe 29 PID 1228 wrote to memory of 320 1228 facovsmgpvmj.exe 31 PID 1228 wrote to memory of 320 1228 facovsmgpvmj.exe 31 PID 1228 wrote to memory of 320 1228 facovsmgpvmj.exe 31 PID 1228 wrote to memory of 320 1228 facovsmgpvmj.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
facovsmgpvmj.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System facovsmgpvmj.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" facovsmgpvmj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe"C:\Users\Admin\AppData\Local\Temp\5375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\facovsmgpvmj.exeC:\Windows\facovsmgpvmj.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1228 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:320
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5375D6~1.EXE2⤵
- Deletes itself
PID:1696
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD568a457cedcf7dc8ef24863d223ccece5
SHA18a6b62d84b00f8bf72e903c8591486dbea87b4ec
SHA2565375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12
SHA5120fbef2de39466a9007c1a69827eb40ebf6ab78295155285955c37362e160ab8c7cd1ff5f5ee2132b9d26986b83f211eda1c03ffa0fab1e8806a445dba5329d25
-
Filesize
337KB
MD568a457cedcf7dc8ef24863d223ccece5
SHA18a6b62d84b00f8bf72e903c8591486dbea87b4ec
SHA2565375d680745593f96ad797fb29b770228dfc8169613a72928a67003f36a9ba12
SHA5120fbef2de39466a9007c1a69827eb40ebf6ab78295155285955c37362e160ab8c7cd1ff5f5ee2132b9d26986b83f211eda1c03ffa0fab1e8806a445dba5329d25