Analysis
-
max time kernel
41s -
max time network
97s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-04-2023 11:32
Static task
static1
Behavioral task
behavioral1
Sample
bby.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bby.exe
Resource
win10-20230220-en
General
-
Target
bby.exe
-
Size
16.0MB
-
MD5
d7e48e5a49efe9ed774546fa7d35d71a
-
SHA1
06212065ffe07d1321c8d85bf5c45871683fb197
-
SHA256
b4f6e6290b1e185bff0baf1b1f3a16291bb2ceb3528051a2aa9528c43231e710
-
SHA512
7dcfc267f527d27d6cb58bd950241b4a8a658b34bc4696f308fd5448b4111d64b93078fedf8d2c138eef83b6148372d8c887b74aae8291fc05c665fbe3d4eeb1
-
SSDEEP
393216:2U6K+uYp1UjvoWFd6vtcUyPaqIddvWiV3lbqSV6htNQcfzlRFGH:2zKnjvpK1cUhZWwbqM6htNQcffFGH
Malware Config
Extracted
quasar
2.1.0.0
Office04
cable-cp.at.playit.gg:21596
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
GDDG0qqm5dHuoT6GjWWz
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft one Drive
-
subdirectory
SubDir
Signatures
-
Contains code to disable Windows Defender 22 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule behavioral1/files/0x000a000000012314-61.dat disable_win_def behavioral1/files/0x000a000000012314-63.dat disable_win_def behavioral1/files/0x000a000000012314-70.dat disable_win_def behavioral1/files/0x000a000000012314-68.dat disable_win_def behavioral1/files/0x000a000000012314-65.dat disable_win_def behavioral1/files/0x000a000000012314-72.dat disable_win_def behavioral1/files/0x000a000000012314-76.dat disable_win_def behavioral1/memory/580-80-0x0000000000270000-0x000000000031E000-memory.dmp disable_win_def behavioral1/files/0x0008000000012342-83.dat disable_win_def behavioral1/files/0x0008000000012342-86.dat disable_win_def behavioral1/files/0x0008000000012342-87.dat disable_win_def behavioral1/memory/1328-88-0x0000000000820000-0x00000000008CE000-memory.dmp disable_win_def behavioral1/memory/1644-92-0x0000000002780000-0x00000000027C0000-memory.dmp disable_win_def behavioral1/files/0x0008000000012342-106.dat disable_win_def behavioral1/files/0x0008000000012342-107.dat disable_win_def behavioral1/files/0x0008000000012342-105.dat disable_win_def behavioral1/files/0x0008000000012342-104.dat disable_win_def behavioral1/files/0x0008000000012342-108.dat disable_win_def behavioral1/memory/580-109-0x0000000004BC0000-0x0000000004C00000-memory.dmp disable_win_def behavioral1/files/0x000a000000012314-121.dat disable_win_def behavioral1/files/0x000a000000012314-122.dat disable_win_def behavioral1/memory/1944-123-0x00000000002F0000-0x000000000039E000-memory.dmp disable_win_def -
Processes:
paypal.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection paypal.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" paypal.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" paypal.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" paypal.exe -
Quasar payload 21 IoCs
Processes:
resource yara_rule behavioral1/files/0x000a000000012314-61.dat family_quasar behavioral1/files/0x000a000000012314-63.dat family_quasar behavioral1/files/0x000a000000012314-70.dat family_quasar behavioral1/files/0x000a000000012314-68.dat family_quasar behavioral1/files/0x000a000000012314-65.dat family_quasar behavioral1/files/0x000a000000012314-72.dat family_quasar behavioral1/files/0x000a000000012314-76.dat family_quasar behavioral1/memory/580-80-0x0000000000270000-0x000000000031E000-memory.dmp family_quasar behavioral1/files/0x0008000000012342-83.dat family_quasar behavioral1/files/0x0008000000012342-86.dat family_quasar behavioral1/files/0x0008000000012342-87.dat family_quasar behavioral1/memory/1328-88-0x0000000000820000-0x00000000008CE000-memory.dmp family_quasar behavioral1/files/0x0008000000012342-106.dat family_quasar behavioral1/files/0x0008000000012342-107.dat family_quasar behavioral1/files/0x0008000000012342-105.dat family_quasar behavioral1/files/0x0008000000012342-104.dat family_quasar behavioral1/files/0x0008000000012342-108.dat family_quasar behavioral1/memory/580-109-0x0000000004BC0000-0x0000000004C00000-memory.dmp family_quasar behavioral1/files/0x000a000000012314-121.dat family_quasar behavioral1/files/0x000a000000012314-122.dat family_quasar behavioral1/memory/1944-123-0x00000000002F0000-0x000000000039E000-memory.dmp family_quasar -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 692 cmd.exe -
Executes dropped EXE 4 IoCs
Processes:
paypal.exeProxy Shifter.exeClient.exePaypal.exepid Process 580 paypal.exe 1052 Proxy Shifter.exe 1328 Client.exe 1944 Paypal.exe -
Loads dropped DLL 13 IoCs
Processes:
bby.exepaypal.exeWerFault.execmd.exepid Process 1492 bby.exe 1492 bby.exe 1492 bby.exe 1492 bby.exe 1492 bby.exe 1940 580 paypal.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 1600 WerFault.exe 272 cmd.exe -
Processes:
paypal.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features paypal.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" paypal.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Drops file in System32 directory 3 IoCs
Processes:
paypal.exedescription ioc Process File created C:\Windows\SysWOW64\SubDir\Client.exe paypal.exe File opened for modification C:\Windows\SysWOW64\SubDir\Client.exe paypal.exe File created C:\Windows\SysWOW64\SubDir\r77-x64.dll paypal.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1600 1328 WerFault.exe 33 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 1832 schtasks.exe 1560 schtasks.exe -
Processes:
paypal.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 paypal.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 paypal.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepaypal.exePaypal.exepid Process 1644 powershell.exe 580 paypal.exe 580 paypal.exe 580 paypal.exe 580 paypal.exe 580 paypal.exe 580 paypal.exe 580 paypal.exe 1944 Paypal.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
paypal.exeClient.exepowershell.exePaypal.exedescription pid Process Token: SeDebugPrivilege 580 paypal.exe Token: SeDebugPrivilege 1328 Client.exe Token: SeDebugPrivilege 1644 powershell.exe Token: SeDebugPrivilege 1328 Client.exe Token: SeDebugPrivilege 1944 Paypal.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Client.exepid Process 1328 Client.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bby.exepaypal.exeClient.execmd.execmd.execmd.exedescription pid Process procid_target PID 1492 wrote to memory of 580 1492 bby.exe 27 PID 1492 wrote to memory of 580 1492 bby.exe 27 PID 1492 wrote to memory of 580 1492 bby.exe 27 PID 1492 wrote to memory of 580 1492 bby.exe 27 PID 1492 wrote to memory of 1052 1492 bby.exe 28 PID 1492 wrote to memory of 1052 1492 bby.exe 28 PID 1492 wrote to memory of 1052 1492 bby.exe 28 PID 1492 wrote to memory of 1052 1492 bby.exe 28 PID 580 wrote to memory of 1832 580 paypal.exe 31 PID 580 wrote to memory of 1832 580 paypal.exe 31 PID 580 wrote to memory of 1832 580 paypal.exe 31 PID 580 wrote to memory of 1832 580 paypal.exe 31 PID 580 wrote to memory of 1328 580 paypal.exe 33 PID 580 wrote to memory of 1328 580 paypal.exe 33 PID 580 wrote to memory of 1328 580 paypal.exe 33 PID 580 wrote to memory of 1328 580 paypal.exe 33 PID 580 wrote to memory of 1644 580 paypal.exe 34 PID 580 wrote to memory of 1644 580 paypal.exe 34 PID 580 wrote to memory of 1644 580 paypal.exe 34 PID 580 wrote to memory of 1644 580 paypal.exe 34 PID 1328 wrote to memory of 1560 1328 Client.exe 36 PID 1328 wrote to memory of 1560 1328 Client.exe 36 PID 1328 wrote to memory of 1560 1328 Client.exe 36 PID 1328 wrote to memory of 1560 1328 Client.exe 36 PID 1328 wrote to memory of 1896 1328 Client.exe 38 PID 1328 wrote to memory of 1896 1328 Client.exe 38 PID 1328 wrote to memory of 1896 1328 Client.exe 38 PID 1328 wrote to memory of 1896 1328 Client.exe 38 PID 1896 wrote to memory of 936 1896 cmd.exe 40 PID 1896 wrote to memory of 936 1896 cmd.exe 40 PID 1896 wrote to memory of 936 1896 cmd.exe 40 PID 1896 wrote to memory of 936 1896 cmd.exe 40 PID 1328 wrote to memory of 1600 1328 Client.exe 41 PID 1328 wrote to memory of 1600 1328 Client.exe 41 PID 1328 wrote to memory of 1600 1328 Client.exe 41 PID 1328 wrote to memory of 1600 1328 Client.exe 41 PID 1896 wrote to memory of 1608 1896 cmd.exe 42 PID 1896 wrote to memory of 1608 1896 cmd.exe 42 PID 1896 wrote to memory of 1608 1896 cmd.exe 42 PID 1896 wrote to memory of 1608 1896 cmd.exe 42 PID 580 wrote to memory of 848 580 paypal.exe 43 PID 580 wrote to memory of 848 580 paypal.exe 43 PID 580 wrote to memory of 848 580 paypal.exe 43 PID 580 wrote to memory of 848 580 paypal.exe 43 PID 848 wrote to memory of 692 848 cmd.exe 45 PID 848 wrote to memory of 692 848 cmd.exe 45 PID 848 wrote to memory of 692 848 cmd.exe 45 PID 848 wrote to memory of 692 848 cmd.exe 45 PID 580 wrote to memory of 272 580 paypal.exe 46 PID 580 wrote to memory of 272 580 paypal.exe 46 PID 580 wrote to memory of 272 580 paypal.exe 46 PID 580 wrote to memory of 272 580 paypal.exe 46 PID 272 wrote to memory of 1892 272 cmd.exe 48 PID 272 wrote to memory of 1892 272 cmd.exe 48 PID 272 wrote to memory of 1892 272 cmd.exe 48 PID 272 wrote to memory of 1892 272 cmd.exe 48 PID 272 wrote to memory of 1064 272 cmd.exe 49 PID 272 wrote to memory of 1064 272 cmd.exe 49 PID 272 wrote to memory of 1064 272 cmd.exe 49 PID 272 wrote to memory of 1064 272 cmd.exe 49 PID 272 wrote to memory of 1944 272 cmd.exe 50 PID 272 wrote to memory of 1944 272 cmd.exe 50 PID 272 wrote to memory of 1944 272 cmd.exe 50 PID 272 wrote to memory of 1944 272 cmd.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\bby.exe"C:\Users\Admin\AppData\Local\Temp\bby.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\paypal.exe"C:\Users\Admin\AppData\Local\Temp\paypal.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft one Drive" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\paypal.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:1832
-
-
C:\Windows\SysWOW64\SubDir\Client.exe"C:\Windows\SysWOW64\SubDir\Client.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Microsoft one Drive" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\Client.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:1560
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\nQo2b0UuF8LD.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:936
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
PID:1608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 15084⤵
- Loads dropped DLL
- Program crash
PID:1600
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k start /b del /q/f/s %TEMP%\* & exit3⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K del /q/f/s C:\Users\Admin\AppData\Local\Temp\*4⤵
- Deletes itself
PID:692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\k3UDLI5lSBmC.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵PID:1892
-
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost4⤵
- Runs ping.exe
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\Paypal.exe"C:\Users\Admin\AppData\Local\Temp\paypal.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Proxy Shifter.exe"C:\Users\Admin\AppData\Local\Temp\Proxy Shifter.exe"2⤵
- Executes dropped EXE
PID:1052
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
36.8MB
MD57cbac120d865d4c4c218b06144580b0a
SHA119afc5f464e84dc362459ab53dd3b6947b708d2e
SHA25677f211fe4f26bbf491ee2a4eb6ac07a123a1ae40b59062d88c222e61b60c082b
SHA512439ffd9e287b9c7468c9f85b52f0734b8b98e4b917576b2e87a6775b0d65b3da3103341c743b93722726795eadf86148c1b2c573a6f4a7b1c2cf5f307cfca625
-
Filesize
36.8MB
MD57cbac120d865d4c4c218b06144580b0a
SHA119afc5f464e84dc362459ab53dd3b6947b708d2e
SHA25677f211fe4f26bbf491ee2a4eb6ac07a123a1ae40b59062d88c222e61b60c082b
SHA512439ffd9e287b9c7468c9f85b52f0734b8b98e4b917576b2e87a6775b0d65b3da3103341c743b93722726795eadf86148c1b2c573a6f4a7b1c2cf5f307cfca625
-
Filesize
36.8MB
MD57cbac120d865d4c4c218b06144580b0a
SHA119afc5f464e84dc362459ab53dd3b6947b708d2e
SHA25677f211fe4f26bbf491ee2a4eb6ac07a123a1ae40b59062d88c222e61b60c082b
SHA512439ffd9e287b9c7468c9f85b52f0734b8b98e4b917576b2e87a6775b0d65b3da3103341c743b93722726795eadf86148c1b2c573a6f4a7b1c2cf5f307cfca625
-
Filesize
7KB
MD5e266c8567fa86919495a208ad79ba615
SHA13c83f03a2df24ee8db840f09098d494fb98a1688
SHA256c938e4d9a5bfaf87a1d2975eb6e8defa7beba61fd74dd47c850576f205ba9c62
SHA51265370d923d7ac47bb6f212557318c51e60976de1a6136bd67321e28dcf6eba45b8d3f0cfe9723999c9a101b17f2c6ef1a11b6de77baff84cbfd5c71e707c6949
-
Filesize
203B
MD5989e40e960d79c02e3c2218df3d5a27c
SHA153139d15973ee2ceb1df5b291c28d47e52cd9291
SHA256fea7a3be0f9112c126aaa3e38a9df0b8954ae83e34dfdf0ab786f68e93ef3a41
SHA512eafdddc21316cd274377b771e1a0e621dae38769b03287eef74d6da97ab5bf6bc9453e2831bb12cb541bcfc3a78213193c2ff7a7a16dce1b88e4fcfe70ff7bd7
-
Filesize
203B
MD5989e40e960d79c02e3c2218df3d5a27c
SHA153139d15973ee2ceb1df5b291c28d47e52cd9291
SHA256fea7a3be0f9112c126aaa3e38a9df0b8954ae83e34dfdf0ab786f68e93ef3a41
SHA512eafdddc21316cd274377b771e1a0e621dae38769b03287eef74d6da97ab5bf6bc9453e2831bb12cb541bcfc3a78213193c2ff7a7a16dce1b88e4fcfe70ff7bd7
-
Filesize
196B
MD5e8bf709745470528d6641981ed9ff418
SHA1ca190c6d1335ba6eea019b3d0af9a3a4ecdc41b7
SHA25641fa64fdd012a3faf796f8f8becd673a1fe8658e9d8639cc91e5d4ceef35fee9
SHA512ea3cf468752a8689cfda19b5ab2f9bab3e3612843e4c215f7fbc500607bca892f1b57e32dddad707bbc7faeadfc3a166c150defc9f20084d09426115494fcc2f
-
Filesize
196B
MD5e8bf709745470528d6641981ed9ff418
SHA1ca190c6d1335ba6eea019b3d0af9a3a4ecdc41b7
SHA25641fa64fdd012a3faf796f8f8becd673a1fe8658e9d8639cc91e5d4ceef35fee9
SHA512ea3cf468752a8689cfda19b5ab2f9bab3e3612843e4c215f7fbc500607bca892f1b57e32dddad707bbc7faeadfc3a166c150defc9f20084d09426115494fcc2f
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
36.8MB
MD57cbac120d865d4c4c218b06144580b0a
SHA119afc5f464e84dc362459ab53dd3b6947b708d2e
SHA25677f211fe4f26bbf491ee2a4eb6ac07a123a1ae40b59062d88c222e61b60c082b
SHA512439ffd9e287b9c7468c9f85b52f0734b8b98e4b917576b2e87a6775b0d65b3da3103341c743b93722726795eadf86148c1b2c573a6f4a7b1c2cf5f307cfca625
-
Filesize
36.8MB
MD57cbac120d865d4c4c218b06144580b0a
SHA119afc5f464e84dc362459ab53dd3b6947b708d2e
SHA25677f211fe4f26bbf491ee2a4eb6ac07a123a1ae40b59062d88c222e61b60c082b
SHA512439ffd9e287b9c7468c9f85b52f0734b8b98e4b917576b2e87a6775b0d65b3da3103341c743b93722726795eadf86148c1b2c573a6f4a7b1c2cf5f307cfca625
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1
-
Filesize
672KB
MD5561a7ddda53177362dc0ac85ec84421e
SHA11d0f2a9dd397a6d435063fcdd76f02dd04ab1b7a
SHA256b3e2c9fbc435b5e2f552234b0e1c4ec7bb2ebe5f53413268b1089038cfe5748b
SHA5128dfcaf20f68e0c9ba7e768929e12e930a466d352ae8f5b452af0e603722e048b60fb4272c280a52f87eb3d3f25ce691ed6afd4285f440f18d68af22fe8d6f6d1