Analysis
-
max time kernel
155s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 21:49
Static task
static1
Behavioral task
behavioral1
Sample
5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe
Resource
win10v2004-20220722-en
General
-
Target
5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe
-
Size
388KB
-
MD5
726ef9ecbca2050a2495cef5ca9c8562
-
SHA1
ae03be4b1486880d1011802e4204569263a7d5f5
-
SHA256
5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50
-
SHA512
9ceffc6e18376ba6ac3514def4468feb63a16d6d675cf2d0c66463fc8612b025ac5074a210f4c180e71dd03897c21f574c53cbc0e15009fa28d3c498360e9958
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-3463845317-933582289-45817732-1000\Recovery+qspcn.txt
teslacrypt
http://gwe32fdr74bhfsyujb34gfszfv.zatcurr.com/BDA0BADDEAF3D69B
http://tes543berda73i48fsdfsd.keratadze.at/BDA0BADDEAF3D69B
http://tt54rfdjhb34rfbnknaerg.milerteddy.com/BDA0BADDEAF3D69B
http://xlowfznrg4wf7dli.ONION/BDA0BADDEAF3D69B
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
pid Process 784 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation bbyvndkuwyok.exe Key value queried \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Control Panel\International\Geo\Nation 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Microsoft\Windows\CurrentVersion\Run bbyvndkuwyok.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\exulasxjdpsv = "C:\\Windows\\system32\\cmd.exe /c start \"\" \"C:\\Windows\\bbyvndkuwyok.exe\"" bbyvndkuwyok.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3500 set thread context of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 784 set thread context of 4536 784 bbyvndkuwyok.exe 94 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ja.pak bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-PT\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\LogoBeta.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\te.pak bbyvndkuwyok.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\hu.pak bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\de-DE\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-TW\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lt-LT\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Internet Explorer\en-US\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\plugin2\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\Services\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\es-419.pak bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-TW\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\System\msadc\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-CN\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrome.7z bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\Recovery+qspcn.png bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\Recovery+qspcn.html bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\fa.pak bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\Recovery+qspcn.txt bbyvndkuwyok.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\kn.pak bbyvndkuwyok.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\Recovery+qspcn.html bbyvndkuwyok.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\bbyvndkuwyok.exe 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe File opened for modification C:\Windows\bbyvndkuwyok.exe 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe 4536 bbyvndkuwyok.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 3512 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe Token: SeDebugPrivilege 4536 bbyvndkuwyok.exe Token: SeIncreaseQuotaPrivilege 3080 WMIC.exe Token: SeSecurityPrivilege 3080 WMIC.exe Token: SeTakeOwnershipPrivilege 3080 WMIC.exe Token: SeLoadDriverPrivilege 3080 WMIC.exe Token: SeSystemProfilePrivilege 3080 WMIC.exe Token: SeSystemtimePrivilege 3080 WMIC.exe Token: SeProfSingleProcessPrivilege 3080 WMIC.exe Token: SeIncBasePriorityPrivilege 3080 WMIC.exe Token: SeCreatePagefilePrivilege 3080 WMIC.exe Token: SeBackupPrivilege 3080 WMIC.exe Token: SeRestorePrivilege 3080 WMIC.exe Token: SeShutdownPrivilege 3080 WMIC.exe Token: SeDebugPrivilege 3080 WMIC.exe Token: SeSystemEnvironmentPrivilege 3080 WMIC.exe Token: SeRemoteShutdownPrivilege 3080 WMIC.exe Token: SeUndockPrivilege 3080 WMIC.exe Token: SeManageVolumePrivilege 3080 WMIC.exe Token: 33 3080 WMIC.exe Token: 34 3080 WMIC.exe Token: 35 3080 WMIC.exe Token: 36 3080 WMIC.exe Token: SeIncreaseQuotaPrivilege 3080 WMIC.exe Token: SeSecurityPrivilege 3080 WMIC.exe Token: SeTakeOwnershipPrivilege 3080 WMIC.exe Token: SeLoadDriverPrivilege 3080 WMIC.exe Token: SeSystemProfilePrivilege 3080 WMIC.exe Token: SeSystemtimePrivilege 3080 WMIC.exe Token: SeProfSingleProcessPrivilege 3080 WMIC.exe Token: SeIncBasePriorityPrivilege 3080 WMIC.exe Token: SeCreatePagefilePrivilege 3080 WMIC.exe Token: SeBackupPrivilege 3080 WMIC.exe Token: SeRestorePrivilege 3080 WMIC.exe Token: SeShutdownPrivilege 3080 WMIC.exe Token: SeDebugPrivilege 3080 WMIC.exe Token: SeSystemEnvironmentPrivilege 3080 WMIC.exe Token: SeRemoteShutdownPrivilege 3080 WMIC.exe Token: SeUndockPrivilege 3080 WMIC.exe Token: SeManageVolumePrivilege 3080 WMIC.exe Token: 33 3080 WMIC.exe Token: 34 3080 WMIC.exe Token: 35 3080 WMIC.exe Token: 36 3080 WMIC.exe Token: SeBackupPrivilege 4308 vssvc.exe Token: SeRestorePrivilege 4308 vssvc.exe Token: SeAuditPrivilege 4308 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3500 wrote to memory of 3512 3500 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 89 PID 3512 wrote to memory of 784 3512 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 90 PID 3512 wrote to memory of 784 3512 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 90 PID 3512 wrote to memory of 784 3512 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 90 PID 3512 wrote to memory of 3896 3512 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 91 PID 3512 wrote to memory of 3896 3512 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 91 PID 3512 wrote to memory of 3896 3512 5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe 91 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 784 wrote to memory of 4536 784 bbyvndkuwyok.exe 94 PID 4536 wrote to memory of 3080 4536 bbyvndkuwyok.exe 95 PID 4536 wrote to memory of 3080 4536 bbyvndkuwyok.exe 95 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bbyvndkuwyok.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" bbyvndkuwyok.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe"C:\Users\Admin\AppData\Local\Temp\5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe"C:\Users\Admin\AppData\Local\Temp\5df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\bbyvndkuwyok.exeC:\Windows\bbyvndkuwyok.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\bbyvndkuwyok.exeC:\Windows\bbyvndkuwyok.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4536 -
C:\Windows\System32\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" shadowcopy delete /nointeractive5⤵
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\5DF9FC~1.EXE3⤵PID:3896
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5726ef9ecbca2050a2495cef5ca9c8562
SHA1ae03be4b1486880d1011802e4204569263a7d5f5
SHA2565df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50
SHA5129ceffc6e18376ba6ac3514def4468feb63a16d6d675cf2d0c66463fc8612b025ac5074a210f4c180e71dd03897c21f574c53cbc0e15009fa28d3c498360e9958
-
Filesize
388KB
MD5726ef9ecbca2050a2495cef5ca9c8562
SHA1ae03be4b1486880d1011802e4204569263a7d5f5
SHA2565df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50
SHA5129ceffc6e18376ba6ac3514def4468feb63a16d6d675cf2d0c66463fc8612b025ac5074a210f4c180e71dd03897c21f574c53cbc0e15009fa28d3c498360e9958
-
Filesize
388KB
MD5726ef9ecbca2050a2495cef5ca9c8562
SHA1ae03be4b1486880d1011802e4204569263a7d5f5
SHA2565df9fc49473625410126f85b33807aed8e0eccd2e0bee457249b93166902af50
SHA5129ceffc6e18376ba6ac3514def4468feb63a16d6d675cf2d0c66463fc8612b025ac5074a210f4c180e71dd03897c21f574c53cbc0e15009fa28d3c498360e9958