Analysis
-
max time kernel
186s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 21:59
Static task
static1
Behavioral task
behavioral1
Sample
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe
Resource
win10v2004-20220721-en
General
-
Target
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe
-
Size
369KB
-
MD5
9009f09c28c128032a54dd758c608fb0
-
SHA1
023c1cd36ae7eaf17824e08b70f32641f8b8098a
-
SHA256
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd
-
SHA512
606b5deaa9969ae04cf4a94e766d72eb295551ccd3fadd8c9a22c7e1be98a0f03c66116599c0a1518f35aa59685bd276c89499c300b3806ef7a0b0e2013e9347
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3762437355-3468409815-1164039494-1000\_RECoVERY_+urjue.txt
teslacrypt
http://yyre45dbvn2nhbefbmh.begumvelic.at/81FABDED4350C48D
http://uiredn4njfsa4234bafb32ygjdawfvs.frascuft.com/81FABDED4350C48D
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/81FABDED4350C48D
http://xlowfznrg4wf7dli.ONION/81FABDED4350C48D
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
botusgtjaoer.exebotusgtjaoer.exepid Process 1316 botusgtjaoer.exe 1776 botusgtjaoer.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 848 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
botusgtjaoer.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run\chaacpvbqiji = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\botusgtjaoer.exe\"" botusgtjaoer.exe Key created \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows\CurrentVersion\Run botusgtjaoer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exebotusgtjaoer.exedescription pid Process procid_target PID 2032 set thread context of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 1316 set thread context of 1776 1316 botusgtjaoer.exe 31 -
Drops file in Program Files directory 3 IoCs
Processes:
botusgtjaoer.exedescription ioc Process File opened for modification C:\Program Files\7-Zip\History.txt botusgtjaoer.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt botusgtjaoer.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt botusgtjaoer.exe -
Drops file in Windows directory 2 IoCs
Processes:
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exedescription ioc Process File created C:\Windows\botusgtjaoer.exe 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe File opened for modification C:\Windows\botusgtjaoer.exe 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
botusgtjaoer.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 botusgtjaoer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 1900000001000000100000006cf252fec3e8f20996de5d4dd9aef424030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131d00000001000000100000004558d512eecb27464920897de7b66053140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc41560858910090000000100000016000000301406082b0601050507030406082b060105050703010b000000010000001e000000440053005400200052006f006f00740020004300410020005800330000000f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d20000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 botusgtjaoer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 botusgtjaoer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 botusgtjaoer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 botusgtjaoer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 botusgtjaoer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
botusgtjaoer.exepid Process 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe 1776 botusgtjaoer.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exebotusgtjaoer.exeWMIC.exevssvc.exedescription pid Process Token: SeDebugPrivilege 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe Token: SeDebugPrivilege 1776 botusgtjaoer.exe Token: SeIncreaseQuotaPrivilege 684 WMIC.exe Token: SeSecurityPrivilege 684 WMIC.exe Token: SeTakeOwnershipPrivilege 684 WMIC.exe Token: SeLoadDriverPrivilege 684 WMIC.exe Token: SeSystemProfilePrivilege 684 WMIC.exe Token: SeSystemtimePrivilege 684 WMIC.exe Token: SeProfSingleProcessPrivilege 684 WMIC.exe Token: SeIncBasePriorityPrivilege 684 WMIC.exe Token: SeCreatePagefilePrivilege 684 WMIC.exe Token: SeBackupPrivilege 684 WMIC.exe Token: SeRestorePrivilege 684 WMIC.exe Token: SeShutdownPrivilege 684 WMIC.exe Token: SeDebugPrivilege 684 WMIC.exe Token: SeSystemEnvironmentPrivilege 684 WMIC.exe Token: SeRemoteShutdownPrivilege 684 WMIC.exe Token: SeUndockPrivilege 684 WMIC.exe Token: SeManageVolumePrivilege 684 WMIC.exe Token: 33 684 WMIC.exe Token: 34 684 WMIC.exe Token: 35 684 WMIC.exe Token: SeIncreaseQuotaPrivilege 684 WMIC.exe Token: SeSecurityPrivilege 684 WMIC.exe Token: SeTakeOwnershipPrivilege 684 WMIC.exe Token: SeLoadDriverPrivilege 684 WMIC.exe Token: SeSystemProfilePrivilege 684 WMIC.exe Token: SeSystemtimePrivilege 684 WMIC.exe Token: SeProfSingleProcessPrivilege 684 WMIC.exe Token: SeIncBasePriorityPrivilege 684 WMIC.exe Token: SeCreatePagefilePrivilege 684 WMIC.exe Token: SeBackupPrivilege 684 WMIC.exe Token: SeRestorePrivilege 684 WMIC.exe Token: SeShutdownPrivilege 684 WMIC.exe Token: SeDebugPrivilege 684 WMIC.exe Token: SeSystemEnvironmentPrivilege 684 WMIC.exe Token: SeRemoteShutdownPrivilege 684 WMIC.exe Token: SeUndockPrivilege 684 WMIC.exe Token: SeManageVolumePrivilege 684 WMIC.exe Token: 33 684 WMIC.exe Token: 34 684 WMIC.exe Token: 35 684 WMIC.exe Token: SeBackupPrivilege 544 vssvc.exe Token: SeRestorePrivilege 544 vssvc.exe Token: SeAuditPrivilege 544 vssvc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exebotusgtjaoer.exebotusgtjaoer.exedescription pid Process procid_target PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2032 wrote to memory of 2012 2032 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 27 PID 2012 wrote to memory of 1316 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 28 PID 2012 wrote to memory of 1316 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 28 PID 2012 wrote to memory of 1316 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 28 PID 2012 wrote to memory of 1316 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 28 PID 2012 wrote to memory of 848 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 29 PID 2012 wrote to memory of 848 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 29 PID 2012 wrote to memory of 848 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 29 PID 2012 wrote to memory of 848 2012 57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe 29 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1316 wrote to memory of 1776 1316 botusgtjaoer.exe 31 PID 1776 wrote to memory of 684 1776 botusgtjaoer.exe 32 PID 1776 wrote to memory of 684 1776 botusgtjaoer.exe 32 PID 1776 wrote to memory of 684 1776 botusgtjaoer.exe 32 PID 1776 wrote to memory of 684 1776 botusgtjaoer.exe 32 -
System policy modification 1 TTPs 2 IoCs
Processes:
botusgtjaoer.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System botusgtjaoer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" botusgtjaoer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe"C:\Users\Admin\AppData\Local\Temp\57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe"C:\Users\Admin\AppData\Local\Temp\57829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\botusgtjaoer.exeC:\Windows\botusgtjaoer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\botusgtjaoer.exeC:\Windows\botusgtjaoer.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1776 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\578295~1.EXE3⤵
- Deletes itself
PID:848
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
369KB
MD59009f09c28c128032a54dd758c608fb0
SHA1023c1cd36ae7eaf17824e08b70f32641f8b8098a
SHA25657829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd
SHA512606b5deaa9969ae04cf4a94e766d72eb295551ccd3fadd8c9a22c7e1be98a0f03c66116599c0a1518f35aa59685bd276c89499c300b3806ef7a0b0e2013e9347
-
Filesize
369KB
MD59009f09c28c128032a54dd758c608fb0
SHA1023c1cd36ae7eaf17824e08b70f32641f8b8098a
SHA25657829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd
SHA512606b5deaa9969ae04cf4a94e766d72eb295551ccd3fadd8c9a22c7e1be98a0f03c66116599c0a1518f35aa59685bd276c89499c300b3806ef7a0b0e2013e9347
-
Filesize
369KB
MD59009f09c28c128032a54dd758c608fb0
SHA1023c1cd36ae7eaf17824e08b70f32641f8b8098a
SHA25657829520d9161ecb5ccdbf320c40615bd13ec7a514f4d34d3f95534013ebcbfd
SHA512606b5deaa9969ae04cf4a94e766d72eb295551ccd3fadd8c9a22c7e1be98a0f03c66116599c0a1518f35aa59685bd276c89499c300b3806ef7a0b0e2013e9347