Overview
overview
10Static
static
BitcoinFak...1).zip
windows7-x64
1BitcoinFak...1).zip
windows10-2004-x64
1BitcoinFak...on.exe
windows7-x64
10BitcoinFak...on.exe
windows10-2004-x64
10BitcoinFak...eg.dll
windows7-x64
1BitcoinFak...eg.dll
windows10-2004-x64
1BitcoinFak...GL.dll
windows7-x64
3BitcoinFak...GL.dll
windows10-2004-x64
3Analysis
-
max time kernel
284s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2023 16:54
Static task
static1
Behavioral task
behavioral1
Sample
BitcoinFakeTransaction(1).zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
BitcoinFakeTransaction(1).zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
BitcoinFakeTransaction/BitcoinFakeTransaction.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
BitcoinFakeTransaction/BitcoinFakeTransaction.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
BitcoinFakeTransaction/ffmpeg.dll
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
BitcoinFakeTransaction/ffmpeg.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
BitcoinFakeTransaction/libEGL.dll
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
BitcoinFakeTransaction/libEGL.dll
Resource
win10v2004-20221111-en
General
-
Target
BitcoinFakeTransaction/BitcoinFakeTransaction.exe
-
Size
997KB
-
MD5
4fe10e794eb25820b63890cfa0abca42
-
SHA1
321ecd39644a864a47cc3d431be53c8035acf59f
-
SHA256
5cc80ef8d5cd9c1fffb5660dd739177ae9043cc13a022a8e8e2c696fa5fcf59e
-
SHA512
728e83d4782347f8959c528579e504ec38fb8c5c18ebacceb106c46d5462ed731a685be3db0450d0dc5eb08f3f9ead13d5080ce244408e3d371e760dd159d70e
-
SSDEEP
12288:1UTyp3ZXSXsy8p4pymXXOZ4z2im3eyOYZ/w4FGVIa9A30xT5uUPDP:1UTSo/Bpu4qim3nZ/wB9+wT5fP
Malware Config
Extracted
quasar
2.1.0.0
windows securityy
192.253.245.243:7812
VNM_MUTEX_Lwt9GYx0ZlES09069Z
-
encryption_key
AhFntNS40ejah7Nv2cWL
-
install_name
Window Security Health Service.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
window update
-
subdirectory
windows Service32
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral4/memory/4412-148-0x0000000000400000-0x000000000048C000-memory.dmp disable_win_def -
Processes:
Aimtxznnlqlhr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection Aimtxznnlqlhr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" Aimtxznnlqlhr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" Aimtxznnlqlhr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" Aimtxznnlqlhr.exe -
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/4412-148-0x0000000000400000-0x000000000048C000-memory.dmp family_quasar -
Executes dropped EXE 10 IoCs
Processes:
Mvjdejeez.exeAimtxznnlqlhr.exeMvjdejeez.exeAimtxznnlqlhr.exeMvjdejeez.exeMvjdejeez.exeMvjdejeez.exeMvjdejeez.exeWindow Security Health Service.exeWindow Security Health Service.exepid Process 1112 Mvjdejeez.exe 564 Aimtxznnlqlhr.exe 4268 Mvjdejeez.exe 4412 Aimtxznnlqlhr.exe 2148 Mvjdejeez.exe 4700 Mvjdejeez.exe 2344 Mvjdejeez.exe 1480 Mvjdejeez.exe 3584 Window Security Health Service.exe 4204 Window Security Health Service.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BitcoinFakeTransaction.exeAimtxznnlqlhr.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation BitcoinFakeTransaction.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Aimtxznnlqlhr.exe -
Processes:
Aimtxznnlqlhr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features Aimtxznnlqlhr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" Aimtxznnlqlhr.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Mvjdejeez.exeAimtxznnlqlhr.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\dSHXtPBWwq = "C:\\Users\\Admin\\AppData\\Roaming\\yMRJBwKnFT\\iYAZWtRxTK.exe" Mvjdejeez.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tSSBpQMZcW = "C:\\Users\\Admin\\AppData\\Roaming\\eWTPJijJLE\\WbFBTiQzDg.exe" Aimtxznnlqlhr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ip-api.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Aimtxznnlqlhr.exeMvjdejeez.exeWindow Security Health Service.exedescription pid Process procid_target PID 564 set thread context of 4412 564 Aimtxznnlqlhr.exe 86 PID 1112 set thread context of 1480 1112 Mvjdejeez.exe 90 PID 3584 set thread context of 4204 3584 Window Security Health Service.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1908 4412 WerFault.exe 86 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3548 schtasks.exe 4832 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
Mvjdejeez.exepowershell.exeAimtxznnlqlhr.exepid Process 1112 Mvjdejeez.exe 1112 Mvjdejeez.exe 1112 Mvjdejeez.exe 1112 Mvjdejeez.exe 1112 Mvjdejeez.exe 1112 Mvjdejeez.exe 1112 Mvjdejeez.exe 1112 Mvjdejeez.exe 3632 powershell.exe 3632 powershell.exe 4412 Aimtxznnlqlhr.exe 4412 Aimtxznnlqlhr.exe 4412 Aimtxznnlqlhr.exe 4412 Aimtxznnlqlhr.exe 4412 Aimtxznnlqlhr.exe 4412 Aimtxznnlqlhr.exe 4412 Aimtxznnlqlhr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Mvjdejeez.exeAimtxznnlqlhr.exepowershell.exeWindow Security Health Service.exedescription pid Process Token: SeDebugPrivilege 1112 Mvjdejeez.exe Token: SeDebugPrivilege 4412 Aimtxznnlqlhr.exe Token: SeDebugPrivilege 3632 powershell.exe Token: SeDebugPrivilege 4204 Window Security Health Service.exe Token: SeDebugPrivilege 4204 Window Security Health Service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Window Security Health Service.exepid Process 4204 Window Security Health Service.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
BitcoinFakeTransaction.exeAimtxznnlqlhr.exeMvjdejeez.exeAimtxznnlqlhr.exeWindow Security Health Service.exeWindow Security Health Service.execmd.exedescription pid Process procid_target PID 4732 wrote to memory of 1112 4732 BitcoinFakeTransaction.exe 84 PID 4732 wrote to memory of 1112 4732 BitcoinFakeTransaction.exe 84 PID 4732 wrote to memory of 1112 4732 BitcoinFakeTransaction.exe 84 PID 4732 wrote to memory of 564 4732 BitcoinFakeTransaction.exe 85 PID 4732 wrote to memory of 564 4732 BitcoinFakeTransaction.exe 85 PID 4732 wrote to memory of 564 4732 BitcoinFakeTransaction.exe 85 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 1112 wrote to memory of 4268 1112 Mvjdejeez.exe 87 PID 1112 wrote to memory of 4268 1112 Mvjdejeez.exe 87 PID 1112 wrote to memory of 4268 1112 Mvjdejeez.exe 87 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 564 wrote to memory of 4412 564 Aimtxznnlqlhr.exe 86 PID 1112 wrote to memory of 2148 1112 Mvjdejeez.exe 88 PID 1112 wrote to memory of 2148 1112 Mvjdejeez.exe 88 PID 1112 wrote to memory of 2148 1112 Mvjdejeez.exe 88 PID 1112 wrote to memory of 4700 1112 Mvjdejeez.exe 91 PID 1112 wrote to memory of 4700 1112 Mvjdejeez.exe 91 PID 1112 wrote to memory of 4700 1112 Mvjdejeez.exe 91 PID 1112 wrote to memory of 2344 1112 Mvjdejeez.exe 89 PID 1112 wrote to memory of 2344 1112 Mvjdejeez.exe 89 PID 1112 wrote to memory of 2344 1112 Mvjdejeez.exe 89 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 1112 wrote to memory of 1480 1112 Mvjdejeez.exe 90 PID 4412 wrote to memory of 3548 4412 Aimtxznnlqlhr.exe 95 PID 4412 wrote to memory of 3548 4412 Aimtxznnlqlhr.exe 95 PID 4412 wrote to memory of 3548 4412 Aimtxznnlqlhr.exe 95 PID 4412 wrote to memory of 3584 4412 Aimtxznnlqlhr.exe 97 PID 4412 wrote to memory of 3584 4412 Aimtxznnlqlhr.exe 97 PID 4412 wrote to memory of 3584 4412 Aimtxznnlqlhr.exe 97 PID 4412 wrote to memory of 3632 4412 Aimtxznnlqlhr.exe 98 PID 4412 wrote to memory of 3632 4412 Aimtxznnlqlhr.exe 98 PID 4412 wrote to memory of 3632 4412 Aimtxznnlqlhr.exe 98 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 3584 wrote to memory of 4204 3584 Window Security Health Service.exe 100 PID 4204 wrote to memory of 4832 4204 Window Security Health Service.exe 101 PID 4204 wrote to memory of 4832 4204 Window Security Health Service.exe 101 PID 4204 wrote to memory of 4832 4204 Window Security Health Service.exe 101 PID 4412 wrote to memory of 1340 4412 Aimtxznnlqlhr.exe 106 PID 4412 wrote to memory of 1340 4412 Aimtxznnlqlhr.exe 106 PID 4412 wrote to memory of 1340 4412 Aimtxznnlqlhr.exe 106 PID 1340 wrote to memory of 4580 1340 cmd.exe 108 PID 1340 wrote to memory of 4580 1340 cmd.exe 108 PID 1340 wrote to memory of 4580 1340 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\BitcoinFakeTransaction\BitcoinFakeTransaction.exe"C:\Users\Admin\AppData\Local\Temp\BitcoinFakeTransaction\BitcoinFakeTransaction.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"3⤵
- Executes dropped EXE
PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"3⤵
- Executes dropped EXE
PID:2148
-
-
C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"3⤵
- Executes dropped EXE
PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"3⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"C:\Users\Admin\AppData\Local\Temp\Mvjdejeez.exe"3⤵
- Executes dropped EXE
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\Aimtxznnlqlhr.exe"C:\Users\Admin\AppData\Local\Temp\Aimtxznnlqlhr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\Aimtxznnlqlhr.exe"C:\Users\Admin\AppData\Local\Temp\Aimtxznnlqlhr.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "window update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Aimtxznnlqlhr.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:3548
-
-
C:\Users\Admin\AppData\Roaming\windows Service32\Window Security Health Service.exe"C:\Users\Admin\AppData\Roaming\windows Service32\Window Security Health Service.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Roaming\windows Service32\Window Security Health Service.exe"C:\Users\Admin\AppData\Roaming\windows Service32\Window Security Health Service.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "window update" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\windows Service32\Window Security Health Service.exe" /rl HIGHEST /f6⤵
- Creates scheduled task(s)
PID:4832
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*5⤵PID:4580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 25124⤵
- Program crash
PID:1908
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4412 -ip 44121⤵PID:5112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507B
MD58cf94b5356be60247d331660005941ec
SHA1fdedb361f40f22cb6a086c808fc0056d4e421131
SHA25652a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0
SHA512b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651
-
Filesize
665KB
MD5a9a1e7fecf84681f351d9d84c9a0b93d
SHA1b82971b2c422e29a3062d42d38151926a84b2d50
SHA2568172ce0605bb35ab5d7e2fab3f9dd3918e246e782797f9e7439527fd197623da
SHA512ad1c5efac370054da119f85d4aae453df26673fe4b28a8e0157166d233659ce5690270731ac482a8948b82c908dbf7dfde3d46cf3c547272567063379531a435
-
Filesize
665KB
MD5a9a1e7fecf84681f351d9d84c9a0b93d
SHA1b82971b2c422e29a3062d42d38151926a84b2d50
SHA2568172ce0605bb35ab5d7e2fab3f9dd3918e246e782797f9e7439527fd197623da
SHA512ad1c5efac370054da119f85d4aae453df26673fe4b28a8e0157166d233659ce5690270731ac482a8948b82c908dbf7dfde3d46cf3c547272567063379531a435
-
Filesize
665KB
MD5a9a1e7fecf84681f351d9d84c9a0b93d
SHA1b82971b2c422e29a3062d42d38151926a84b2d50
SHA2568172ce0605bb35ab5d7e2fab3f9dd3918e246e782797f9e7439527fd197623da
SHA512ad1c5efac370054da119f85d4aae453df26673fe4b28a8e0157166d233659ce5690270731ac482a8948b82c908dbf7dfde3d46cf3c547272567063379531a435
-
Filesize
210B
MD5090e285f5635127637fd2897b84be199
SHA162aa00c1215cc454dd48efefe46eb566b5fdb9c4
SHA256ceefef8ab462a7766e99776d5b96562d63d03c0a508e977348e5069a145bfe7a
SHA5122e00ed063dd2238f4f297931abc56d8631b5d774137ef46c074bfb9abd7b9fa3dd08e0b46676aa369d4170a5715d6ba06d8fe597f15da42f40ac0f46fb20adb5
-
Filesize
206KB
MD501af6f42da188981c1a00494199fdfbc
SHA13147729b4e4df80628e658ae173bb6b8c7fd4479
SHA2564b128169df80bba5f09ca7fb7aefdc03ccca3b7c4ef3f5af5af582af217f3b50
SHA512d73233fde28540b5203484e5303453322cdeaadfec1373745d3c6d9569d511387ddcb882f261f76825673ce5608d628432ea5066da384bac8d2c2e4a067222e0
-
Filesize
206KB
MD501af6f42da188981c1a00494199fdfbc
SHA13147729b4e4df80628e658ae173bb6b8c7fd4479
SHA2564b128169df80bba5f09ca7fb7aefdc03ccca3b7c4ef3f5af5af582af217f3b50
SHA512d73233fde28540b5203484e5303453322cdeaadfec1373745d3c6d9569d511387ddcb882f261f76825673ce5608d628432ea5066da384bac8d2c2e4a067222e0
-
Filesize
206KB
MD501af6f42da188981c1a00494199fdfbc
SHA13147729b4e4df80628e658ae173bb6b8c7fd4479
SHA2564b128169df80bba5f09ca7fb7aefdc03ccca3b7c4ef3f5af5af582af217f3b50
SHA512d73233fde28540b5203484e5303453322cdeaadfec1373745d3c6d9569d511387ddcb882f261f76825673ce5608d628432ea5066da384bac8d2c2e4a067222e0
-
Filesize
206KB
MD501af6f42da188981c1a00494199fdfbc
SHA13147729b4e4df80628e658ae173bb6b8c7fd4479
SHA2564b128169df80bba5f09ca7fb7aefdc03ccca3b7c4ef3f5af5af582af217f3b50
SHA512d73233fde28540b5203484e5303453322cdeaadfec1373745d3c6d9569d511387ddcb882f261f76825673ce5608d628432ea5066da384bac8d2c2e4a067222e0
-
Filesize
206KB
MD501af6f42da188981c1a00494199fdfbc
SHA13147729b4e4df80628e658ae173bb6b8c7fd4479
SHA2564b128169df80bba5f09ca7fb7aefdc03ccca3b7c4ef3f5af5af582af217f3b50
SHA512d73233fde28540b5203484e5303453322cdeaadfec1373745d3c6d9569d511387ddcb882f261f76825673ce5608d628432ea5066da384bac8d2c2e4a067222e0
-
Filesize
206KB
MD501af6f42da188981c1a00494199fdfbc
SHA13147729b4e4df80628e658ae173bb6b8c7fd4479
SHA2564b128169df80bba5f09ca7fb7aefdc03ccca3b7c4ef3f5af5af582af217f3b50
SHA512d73233fde28540b5203484e5303453322cdeaadfec1373745d3c6d9569d511387ddcb882f261f76825673ce5608d628432ea5066da384bac8d2c2e4a067222e0
-
Filesize
206KB
MD501af6f42da188981c1a00494199fdfbc
SHA13147729b4e4df80628e658ae173bb6b8c7fd4479
SHA2564b128169df80bba5f09ca7fb7aefdc03ccca3b7c4ef3f5af5af582af217f3b50
SHA512d73233fde28540b5203484e5303453322cdeaadfec1373745d3c6d9569d511387ddcb882f261f76825673ce5608d628432ea5066da384bac8d2c2e4a067222e0
-
Filesize
665KB
MD5a9a1e7fecf84681f351d9d84c9a0b93d
SHA1b82971b2c422e29a3062d42d38151926a84b2d50
SHA2568172ce0605bb35ab5d7e2fab3f9dd3918e246e782797f9e7439527fd197623da
SHA512ad1c5efac370054da119f85d4aae453df26673fe4b28a8e0157166d233659ce5690270731ac482a8948b82c908dbf7dfde3d46cf3c547272567063379531a435
-
Filesize
665KB
MD5a9a1e7fecf84681f351d9d84c9a0b93d
SHA1b82971b2c422e29a3062d42d38151926a84b2d50
SHA2568172ce0605bb35ab5d7e2fab3f9dd3918e246e782797f9e7439527fd197623da
SHA512ad1c5efac370054da119f85d4aae453df26673fe4b28a8e0157166d233659ce5690270731ac482a8948b82c908dbf7dfde3d46cf3c547272567063379531a435
-
Filesize
665KB
MD5a9a1e7fecf84681f351d9d84c9a0b93d
SHA1b82971b2c422e29a3062d42d38151926a84b2d50
SHA2568172ce0605bb35ab5d7e2fab3f9dd3918e246e782797f9e7439527fd197623da
SHA512ad1c5efac370054da119f85d4aae453df26673fe4b28a8e0157166d233659ce5690270731ac482a8948b82c908dbf7dfde3d46cf3c547272567063379531a435