Analysis
-
max time kernel
76s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18/04/2022, 11:49
Static task
static1
Behavioral task
behavioral1
Sample
e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe
Resource
win10v2004-20220414-en
General
-
Target
e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe
-
Size
644KB
-
MD5
ba6403b11dfc7faf3eabf9a6c71c38e4
-
SHA1
19a7760b1bfa03b9a650462e4e9d8a08f1ce069f
-
SHA256
e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
-
SHA512
491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
Malware Config
Extracted
quasar
2.1.0.0
Windows Security
vilvaraj-32652.portmap.io:32652
VNM_MUTEX_px0s48GfhAUBhjVpWU
-
encryption_key
yvDiKJ3lhd7v25pBa6mQ
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 8 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/828-72-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/828-73-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/828-74-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/828-75-0x0000000000486C7E-mapping.dmp disable_win_def behavioral1/memory/828-77-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/828-79-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def behavioral1/memory/1428-108-0x0000000000486C7E-mapping.dmp disable_win_def behavioral1/memory/2044-152-0x0000000000486C7E-mapping.dmp disable_win_def -
Quasar Payload 8 IoCs
resource yara_rule behavioral1/memory/828-72-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/828-73-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/828-74-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/828-75-0x0000000000486C7E-mapping.dmp family_quasar behavioral1/memory/828-77-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/828-79-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar behavioral1/memory/1428-108-0x0000000000486C7E-mapping.dmp family_quasar behavioral1/memory/2044-152-0x0000000000486C7E-mapping.dmp family_quasar -
Executes dropped EXE 4 IoCs
pid Process 592 Windows Security.exe 1996 Windows Security.exe 1392 Windows Security.exe 1428 Windows Security.exe -
Loads dropped DLL 6 IoCs
pid Process 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe 1412 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\FmDbHBLHnX = "C:\\Users\\Admin\\AppData\\Roaming\\GpBWBmwTZQ\\DeLFBwWiZH.exe" e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\HzJbNMFEqt = "C:\\Users\\Admin\\AppData\\Roaming\\sQNEWfeLDF\\GgRNMizXTP.exe" e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 304 set thread context of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 1876 set thread context of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 592 set thread context of 1996 592 Windows Security.exe 32 PID 1996 set thread context of 1428 1996 Windows Security.exe 36 PID 972 set thread context of 1496 972 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 52 PID 1496 set thread context of 2044 1496 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 53 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1412 1428 WerFault.exe 36 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1564 schtasks.exe 1644 schtasks.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1224 PING.EXE 1480 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1996 Windows Security.exe 1996 Windows Security.exe 928 powershell.exe 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 2044 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe Token: SeDebugPrivilege 1996 Windows Security.exe Token: SeDebugPrivilege 1428 Windows Security.exe Token: SeDebugPrivilege 1428 Windows Security.exe Token: SeDebugPrivilege 928 powershell.exe Token: SeDebugPrivilege 2044 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1428 Windows Security.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 304 wrote to memory of 1876 304 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 26 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 1876 wrote to memory of 828 1876 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 27 PID 828 wrote to memory of 1564 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 29 PID 828 wrote to memory of 1564 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 29 PID 828 wrote to memory of 1564 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 29 PID 828 wrote to memory of 1564 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 29 PID 828 wrote to memory of 592 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 31 PID 828 wrote to memory of 592 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 31 PID 828 wrote to memory of 592 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 31 PID 828 wrote to memory of 592 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 31 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 592 wrote to memory of 1996 592 Windows Security.exe 32 PID 828 wrote to memory of 928 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 33 PID 828 wrote to memory of 928 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 33 PID 828 wrote to memory of 928 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 33 PID 828 wrote to memory of 928 828 e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe 33 PID 1996 wrote to memory of 1392 1996 Windows Security.exe 35 PID 1996 wrote to memory of 1392 1996 Windows Security.exe 35 PID 1996 wrote to memory of 1392 1996 Windows Security.exe 35 PID 1996 wrote to memory of 1392 1996 Windows Security.exe 35 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1996 wrote to memory of 1428 1996 Windows Security.exe 36 PID 1428 wrote to memory of 1644 1428 Windows Security.exe 37 PID 1428 wrote to memory of 1644 1428 Windows Security.exe 37 PID 1428 wrote to memory of 1644 1428 Windows Security.exe 37 PID 1428 wrote to memory of 1644 1428 Windows Security.exe 37 PID 1428 wrote to memory of 304 1428 Windows Security.exe 39 PID 1428 wrote to memory of 304 1428 Windows Security.exe 39 PID 1428 wrote to memory of 304 1428 Windows Security.exe 39 PID 1428 wrote to memory of 304 1428 Windows Security.exe 39 PID 304 wrote to memory of 2012 304 cmd.exe 41 PID 304 wrote to memory of 2012 304 cmd.exe 41 PID 304 wrote to memory of 2012 304 cmd.exe 41 PID 304 wrote to memory of 2012 304 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"3⤵
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1564
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"6⤵
- Executes dropped EXE
PID:1392
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:1644
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\BHJkJACO2EGy.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:2012
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
PID:1224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 14807⤵
- Loads dropped DLL
- Program crash
PID:1412
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:928
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit4⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*5⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\WyHJCv0MMlsP.bat" "4⤵PID:1520
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:832
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"5⤵
- Suspicious use of SetThreadContext
PID:972 -
C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"6⤵
- Suspicious use of SetThreadContext
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"C:\Users\Admin\AppData\Local\Temp\e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d.exe"7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD5ebf0391d36720686ed9bccff617ad0ae
SHA168f402cb7cca2f0813835ad47bc57da3b11c60f4
SHA256de95ff6cc65eaaf3275c8204bfc2e48db202233e4023de2f37648dd3da784912
SHA51241b63e1b31a9e877c24b9da4f4792370e6cba26b63dd9b9185ad6f5483d3acc90ea106230cd1a964fb71b0a9c7875ed3e488533f46dd40532d3eceb6b0346634
-
Filesize
261B
MD530960b6348f867a7fc4a4aa2ad94e133
SHA102b350139188381b8b8ede6a57da40d33b74a148
SHA25655b0c019cc508011f2948448fad577869ce35766027c7073009b1847599e1621
SHA5120d33420bb6ac8027385ae632f6780ea673e3bfbeaf54569f07f3644b85a0c5f1f17c4f3f8a4fac75d37f3d93ef8832868e591543e32f3984eb2324ba8588ec48
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807
-
Filesize
644KB
MD5ba6403b11dfc7faf3eabf9a6c71c38e4
SHA119a7760b1bfa03b9a650462e4e9d8a08f1ce069f
SHA256e0e76e89c5a7be76558559d83051f927f308a269d26f1c73d82df13c8afc834d
SHA512491e26588db0033dfcd1580aaeb1ddd8a23d19b71dea6a0b2f50b3175b2b758ffd310b978dd38a2ba8e40c6692d1adfc6f753a99abe9e5a09b891beb051a0807