Analysis
-
max time kernel
45s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 11:50
Static task
static1
Behavioral task
behavioral1
Sample
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe
Resource
win10v2004-20220414-en
General
-
Target
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe
-
Size
655KB
-
MD5
cf12948c21f9411602f6ee1b2ea3eb7d
-
SHA1
e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
-
SHA256
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
-
SHA512
3049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
Malware Config
Extracted
quasar
2.1.0.0
Windows Security
vilvaraj-32652.portmap.io:32652
VNM_MUTEX_px0s48GfhAUBhjVpWU
-
encryption_key
yvDiKJ3lhd7v25pBa6mQ
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral2/memory/1644-137-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def -
Quasar Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1644-137-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar -
Executes dropped EXE 7 IoCs
Processes:
Windows Security.exeWindows Security.exeWindows Security.exeWindows Security.exeWindows Security.exeWindows Security.exeWindows Security.exepid Process 3712 Windows Security.exe 100 Windows Security.exe 216 Windows Security.exe 220 Windows Security.exe 3928 Windows Security.exe 4508 Windows Security.exe 4484 Windows Security.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Windows Security.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation Windows Security.exe -
Processes:
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\FmDbHBLHnX = "C:\\Users\\Admin\\AppData\\Roaming\\GpBWBmwTZQ\\DeLFBwWiZH.exe" 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\HzJbNMFEqt = "C:\\Users\\Admin\\AppData\\Roaming\\sQNEWfeLDF\\GgRNMizXTP.exe" 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com -
Suspicious use of SetThreadContext 4 IoCs
Processes:
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exeWindows Security.exeWindows Security.exedescription pid Process procid_target PID 1804 set thread context of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 2336 set thread context of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 3712 set thread context of 220 3712 Windows Security.exe 93 PID 220 set thread context of 4484 220 Windows Security.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1584 4484 WerFault.exe 96 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 548 schtasks.exe 1100 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
Windows Security.exeWindows Security.exepowershell.exepid Process 3712 Windows Security.exe 3712 Windows Security.exe 3712 Windows Security.exe 3712 Windows Security.exe 220 Windows Security.exe 220 Windows Security.exe 220 Windows Security.exe 220 Windows Security.exe 1728 powershell.exe 1728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exeWindows Security.exeWindows Security.exepowershell.exeWindows Security.exedescription pid Process Token: SeDebugPrivilege 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe Token: SeDebugPrivilege 3712 Windows Security.exe Token: SeDebugPrivilege 220 Windows Security.exe Token: SeDebugPrivilege 1728 powershell.exe Token: SeDebugPrivilege 4484 Windows Security.exe Token: SeDebugPrivilege 4484 Windows Security.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Security.exepid Process 4484 Windows Security.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exeWindows Security.exeWindows Security.exeWindows Security.execmd.exedescription pid Process procid_target PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 1804 wrote to memory of 2336 1804 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 81 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 2336 wrote to memory of 1644 2336 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 82 PID 1644 wrote to memory of 1100 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 86 PID 1644 wrote to memory of 1100 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 86 PID 1644 wrote to memory of 1100 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 86 PID 1644 wrote to memory of 3712 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 88 PID 1644 wrote to memory of 3712 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 88 PID 1644 wrote to memory of 3712 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 88 PID 1644 wrote to memory of 1728 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 89 PID 1644 wrote to memory of 1728 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 89 PID 1644 wrote to memory of 1728 1644 1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe 89 PID 3712 wrote to memory of 100 3712 Windows Security.exe 91 PID 3712 wrote to memory of 100 3712 Windows Security.exe 91 PID 3712 wrote to memory of 100 3712 Windows Security.exe 91 PID 3712 wrote to memory of 216 3712 Windows Security.exe 92 PID 3712 wrote to memory of 216 3712 Windows Security.exe 92 PID 3712 wrote to memory of 216 3712 Windows Security.exe 92 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 3712 wrote to memory of 220 3712 Windows Security.exe 93 PID 220 wrote to memory of 3928 220 Windows Security.exe 94 PID 220 wrote to memory of 3928 220 Windows Security.exe 94 PID 220 wrote to memory of 3928 220 Windows Security.exe 94 PID 220 wrote to memory of 4508 220 Windows Security.exe 95 PID 220 wrote to memory of 4508 220 Windows Security.exe 95 PID 220 wrote to memory of 4508 220 Windows Security.exe 95 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 220 wrote to memory of 4484 220 Windows Security.exe 96 PID 4484 wrote to memory of 548 4484 Windows Security.exe 97 PID 4484 wrote to memory of 548 4484 Windows Security.exe 97 PID 4484 wrote to memory of 548 4484 Windows Security.exe 97 PID 4484 wrote to memory of 752 4484 Windows Security.exe 99 PID 4484 wrote to memory of 752 4484 Windows Security.exe 99 PID 4484 wrote to memory of 752 4484 Windows Security.exe 99 PID 752 wrote to memory of 508 752 cmd.exe 101 PID 752 wrote to memory of 508 752 cmd.exe 101 PID 752 wrote to memory of 508 752 cmd.exe 101 PID 752 wrote to memory of 1372 752 cmd.exe 104 PID 752 wrote to memory of 1372 752 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe"C:\Users\Admin\AppData\Local\Temp\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe"C:\Users\Admin\AppData\Local\Temp\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe"C:\Users\Admin\AppData\Local\Temp\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe"3⤵
- Windows security modification
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1100
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"5⤵
- Executes dropped EXE
PID:100
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"5⤵
- Executes dropped EXE
PID:216
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"6⤵
- Executes dropped EXE
PID:3928
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"6⤵
- Executes dropped EXE
PID:4508
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Windows Security.exe" /rl HIGHEST /f7⤵
- Creates scheduled task(s)
PID:548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\R2qGNGzraw4Q.bat" "7⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\chcp.comchcp 650018⤵PID:508
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost8⤵
- Runs ping.exe
PID:1372
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 19767⤵
- Program crash
PID:1584
-
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4484 -ip 44841⤵PID:2112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e.exe.log
Filesize507B
MD576ffb2f33cb32ade8fc862a67599e9d8
SHA1920cc4ab75b36d2f9f6e979b74db568973c49130
SHA256f1a3724670e3379318ec9c73f6f39058cab0ab013ba3cd90c047c3d701362310
SHA512f33502c2e1bb30c05359bfc6819ca934642a1e01874e3060349127d792694d56ad22fccd6c9477b8ee50d66db35785779324273f509576b48b7f85577e001b4e
-
Filesize
507B
MD576ffb2f33cb32ade8fc862a67599e9d8
SHA1920cc4ab75b36d2f9f6e979b74db568973c49130
SHA256f1a3724670e3379318ec9c73f6f39058cab0ab013ba3cd90c047c3d701362310
SHA512f33502c2e1bb30c05359bfc6819ca934642a1e01874e3060349127d792694d56ad22fccd6c9477b8ee50d66db35785779324273f509576b48b7f85577e001b4e
-
Filesize
217B
MD5418463266f6697de04c6cf827a3c4ea2
SHA1efb4d8eb77fbc940b44e495ede59af44afc285b4
SHA25648b4617fcfb9d8518da16ac994e3d39e90cb516d84980874f9f780eed5e7725b
SHA5123de7e0ea6c557d57a1f5f68e918831ffba1e0fe25152bf88eb8913f3a726e0fdab4e2cb6c9b790f5c3fc44eb0df2e43e43cfa2b798d19a50549d5074825cd5f0
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef
-
Filesize
655KB
MD5cf12948c21f9411602f6ee1b2ea3eb7d
SHA1e8bbf3f9f04e2c428775b7d5b8801b66bd87e8a9
SHA2561cbd590173371cacf94c493b7a603eaf43f301174e86ae49534f2879cd5dd57e
SHA5123049fb6186c95bb9b03c0f6b70ce52c1b6e80b6d7162ca6655516dbd3ea58e9f621fd58460bb4bf0e6a9ef827cda1e4c890e94f3896d9aeedaed7c291c4d29ef