Analysis
-
max time kernel
12s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 05:10
Behavioral task
behavioral1
Sample
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe
Resource
win10v2004-20240709-en
General
-
Target
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe
-
Size
2.0MB
-
MD5
684e2cd598e427e983c43223dbf709f6
-
SHA1
d47e974309bced2c9b0986ffa4e33e24ddd3526c
-
SHA256
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240
-
SHA512
e7bc861bc3aaa23533cb1d97fa35095cffb95c21dd58c5d280c559d335f8f19b40743b42ea739600a0ab2e1ab42228c75c25218903bd03ced97ffb77b6c464fb
-
SSDEEP
24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY2:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yk
Malware Config
Extracted
azorult
http://0x21.in:8000/_az/
Extracted
quasar
1.3.0.0
EbayProfiles
5.8.88.191:443
sockartek.icu:443
QSR_MUTEX_0kBRNrRz5TDLEQouI0
-
encryption_key
MWhG6wsClMX8aJM2CVXT
-
install_name
winsock.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
win defender run
-
subdirectory
SubDir
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Quasar payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\windef.exe family_quasar behavioral2/memory/2996-31-0x0000000000D90000-0x0000000000DEE000-memory.dmp family_quasar C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe -
Executes dropped EXE 2 IoCs
Processes:
vnc.exewindef.exepid process 3484 vnc.exe 2996 windef.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exedescription ioc process File opened (read-only) \??\s: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\v: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\z: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\g: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\n: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\o: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\q: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\r: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\p: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\t: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\u: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\a: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\e: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\i: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\k: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\m: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\b: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\l: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\w: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\x: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\h: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\j: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe File opened (read-only) \??\y: decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 29 ip-api.com 56 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exedescription pid process target process PID 4720 set thread context of 5028 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4004 3484 WerFault.exe vnc.exe 4960 2492 WerFault.exe vnc.exe 2524 4588 WerFault.exe winsock.exe 3352 4924 WerFault.exe winsock.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exevnc.exewindef.exedecfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEpid process 2588 PING.EXE 4020 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2512 schtasks.exe 1508 schtasks.exe 3780 schtasks.exe 1012 schtasks.exe 4184 schtasks.exe 2456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exepid process 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exevnc.exedescription pid process target process PID 4720 wrote to memory of 3484 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe vnc.exe PID 4720 wrote to memory of 3484 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe vnc.exe PID 4720 wrote to memory of 3484 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe vnc.exe PID 4720 wrote to memory of 2996 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe windef.exe PID 4720 wrote to memory of 2996 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe windef.exe PID 4720 wrote to memory of 2996 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe windef.exe PID 3484 wrote to memory of 1484 3484 vnc.exe svchost.exe PID 3484 wrote to memory of 1484 3484 vnc.exe svchost.exe PID 4720 wrote to memory of 5028 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe PID 4720 wrote to memory of 5028 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe PID 4720 wrote to memory of 5028 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe PID 4720 wrote to memory of 5028 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe PID 4720 wrote to memory of 5028 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe PID 4720 wrote to memory of 2512 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe schtasks.exe PID 4720 wrote to memory of 2512 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe schtasks.exe PID 4720 wrote to memory of 2512 4720 decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe schtasks.exe PID 3484 wrote to memory of 1484 3484 vnc.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe"C:\Users\Admin\AppData\Local\Temp\decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 5403⤵
- Program crash
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1508 -
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"3⤵PID:4588
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nk2n4YQ59dai.bat" "4⤵PID:4092
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵PID:4408
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4020 -
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"5⤵PID:4924
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mL4XpbZH1f9F.bat" "6⤵PID:3832
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵PID:4752
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2588 -
C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"7⤵PID:4948
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 22486⤵
- Program crash
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 22964⤵
- Program crash
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe"C:\Users\Admin\AppData\Local\Temp\decfd015d1e4b9f614c7a17b56de0e66b709e45efabc188d701c979d8c3b5240.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3484 -ip 34841⤵PID:2316
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exeC:\Users\Admin\btpanui\SystemPropertiesPerformance.exe1⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\vnc.exe"C:\Users\Admin\AppData\Local\Temp\vnc.exe"2⤵PID:2492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k3⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 5203⤵
- Program crash
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\windef.exe"C:\Users\Admin\AppData\Local\Temp\windef.exe"2⤵PID:3936
-
C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"2⤵PID:208
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F2⤵
- Scheduled Task/Job: Scheduled Task
PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2492 -ip 24921⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4588 -ip 45881⤵PID:1236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4924 -ip 49241⤵PID:4572
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1536
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1180
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3008
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4184
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD510eab9c2684febb5327b6976f2047587
SHA1a12ed54146a7f5c4c580416aecb899549712449e
SHA256f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928
SHA5127e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50
-
Filesize
208B
MD5c5c18fd4ef71808451ff5ed42c37ee6f
SHA12d82771f097f313171d53055eb5044f9f7135382
SHA25677326ddfb48701f6c5c39118b5279029cb980124431d15008e7fdecbab9607ca
SHA512849aedd743ab12389b945f468642a94d87593e7454e49d279517f3f60550f70e99723117506ce8f5ad6341317c2acc637d421463f831ddf42ead418056f154fd
-
Filesize
208B
MD5b753973cffb975fb5c31dfdb288bf403
SHA1f0ea9f4411ab79825681233b0fcce90c60272589
SHA2567f32b2e7705b2d96837e6481c51969902ae5e4b42faef24529c7c46556eaa4fc
SHA5123da75687bb927030adc0438fb69ced40974b85dd58ad35a43533d4590cc4e8ac1ed113c34d68b93ee46d0213099a0eb1bcfc2c6a9ac14ccfcd77950274080387
-
Filesize
405KB
MD5b8ba87ee4c3fc085a2fed0d839aadce1
SHA1b3a2e3256406330e8b1779199bb2b9865122d766
SHA2564e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4
SHA5127a775a12cd5bcd182d64be0d31f800b456ca6d1b531189cea9c72e1940871cfe92ccd005938f67bfa4784ae44c54b3a7ea29a5bb59766e98c78bf53b680f2ab2
-
Filesize
349KB
MD5b4a202e03d4135484d0e730173abcc72
SHA101b30014545ea526c15a60931d676f9392ea0c70
SHA2567050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9
SHA512632a035a3b722ea29b02aad1f0da3df5bdc38abc7e6617223790955c6c0830f1070b528680416d5c63ea5e846074cdad87f06c21c35a77b1ccc4edc089d8b1fb
-
Filesize
224B
MD575e1f17dc3a8c7c4f0715ff1d2b4ff39
SHA12cc268598af530cdfd82d1c1f8a57350dce40952
SHA256c5fc1b84a38932c7017727dba0867efcadbf97946bed05775d201412ef149150
SHA512c57ec60aabedc7c5ad6cbf1a19c0289b9a07910b52aaaea1ff73824e38d597160358831c4ba8241ac8a0d7aba3c9cca45d787bf12faa727b4d8451ff1c592a46
-
Filesize
224B
MD5aca3fcb0772356d3a9d12555798db4ee
SHA1d8f1f3add10d3196dfdfc992418f50b660da55b2
SHA25671a5413fcfe3dc9b2bd4b26334187cb83e546a308a543dd2edbda8e849dc8f5d
SHA512ecbf95cef4338c6bb50cc4c32063b0253f9ac8fe41688bdf5197a1a08b0a0ab4a8d314e7f72e98850d7cdb10d40929f9f74ad854cfe2c33658c5ce066b042788
-
Filesize
2.0MB
MD50b169d0d49736796037a30d8100bcfe1
SHA16330ca55551f8436d4c64fd687a5a3983a0578f4
SHA25678b15f6a6c8879269048cd2a6789f11ca39fb5777fe94f2fc39911eb38069c21
SHA512d3c72073fd0cd14aa7a681015e56e3600b6e8548f466e9f6855eb3881f2e2afb3bb990380ba512fe4aa02e87e30743f0602716a083c454f75f35dc905b612c01