Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 15:30
Behavioral task
behavioral1
Sample
5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe
Resource
win10v2004-20241007-en
General
-
Target
5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe
-
Size
3.2MB
-
MD5
3dc1d39a2ebeb5dc85da7e8c3d6e3aaa
-
SHA1
4cfcddc23cc0949ca620474edef6c82a2c2280d3
-
SHA256
5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4
-
SHA512
77dfdb50b408c3e88a18b0aae3eac9e2001f6041b406aef2d298e35cf49b51d921afeb5526930a44dc4e12294cd31c3f9fed74871c8bb0e9989e6a912131a65a
-
SSDEEP
49152:tkvXI22SsaNYfdPBldt698dBcjHIGRJ6ybR3LoGdJTHHB72eh2NTC:OvY22SsaNYfdPBldt6+dBcjHIGRJ6sZ
Malware Config
Extracted
quasar
1.4.1
hacked-fud1
192.168.100.10:1412
a685d3ed-d174-40b7-9655-c2bfab3ed130
-
encryption_key
2A5F3DAC380078962166175BD172DE2D4AA07E26
-
install_name
fud2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft Service
-
subdirectory
SubDir
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016ce8-6.dat family_quasar behavioral1/memory/2508-11-0x0000000000250000-0x0000000000574000-memory.dmp family_quasar behavioral1/files/0x0007000000016cf0-46.dat family_quasar -
Executes dropped EXE 8 IoCs
pid Process 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 2112 icsys.icn.exe 2936 explorer.exe 2456 spoolsv.exe 2660 fud2.exe 2844 explorer.exe 2764 svchost.exe 1864 spoolsv.exe -
Loads dropped DLL 6 IoCs
pid Process 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 2112 icsys.icn.exe 2936 explorer.exe 2456 spoolsv.exe 2764 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\system32\SubDir\fud2.exe 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe File opened for modification C:\Windows\system32\SubDir\fud2.exe 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe File opened for modification C:\Windows\system32\SubDir 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe File opened for modification C:\Windows\Resources\tjud.exe explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fud2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2320 schtasks.exe 3060 schtasks.exe 2416 schtasks.exe 1000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe 2660 fud2.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2764 svchost.exe 2936 explorer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 2112 icsys.icn.exe 2112 icsys.icn.exe 2936 explorer.exe 2936 explorer.exe 2456 spoolsv.exe 2456 spoolsv.exe 2660 fud2.exe 2660 fud2.exe 2844 explorer.exe 2844 explorer.exe 2764 svchost.exe 2764 svchost.exe 1864 spoolsv.exe 1864 spoolsv.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2508 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 30 PID 1960 wrote to memory of 2508 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 30 PID 1960 wrote to memory of 2508 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 30 PID 1960 wrote to memory of 2508 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 30 PID 2508 wrote to memory of 2320 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 31 PID 2508 wrote to memory of 2320 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 31 PID 2508 wrote to memory of 2320 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 31 PID 1960 wrote to memory of 2112 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 33 PID 1960 wrote to memory of 2112 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 33 PID 1960 wrote to memory of 2112 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 33 PID 1960 wrote to memory of 2112 1960 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 33 PID 2112 wrote to memory of 2936 2112 icsys.icn.exe 34 PID 2112 wrote to memory of 2936 2112 icsys.icn.exe 34 PID 2112 wrote to memory of 2936 2112 icsys.icn.exe 34 PID 2112 wrote to memory of 2936 2112 icsys.icn.exe 34 PID 2936 wrote to memory of 2456 2936 explorer.exe 35 PID 2936 wrote to memory of 2456 2936 explorer.exe 35 PID 2936 wrote to memory of 2456 2936 explorer.exe 35 PID 2936 wrote to memory of 2456 2936 explorer.exe 35 PID 2508 wrote to memory of 2660 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 36 PID 2508 wrote to memory of 2660 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 36 PID 2508 wrote to memory of 2660 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 36 PID 2508 wrote to memory of 2660 2508 5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe 36 PID 2660 wrote to memory of 2844 2660 fud2.exe 38 PID 2660 wrote to memory of 2844 2660 fud2.exe 38 PID 2660 wrote to memory of 2844 2660 fud2.exe 38 PID 2660 wrote to memory of 2844 2660 fud2.exe 38 PID 2456 wrote to memory of 2764 2456 spoolsv.exe 37 PID 2456 wrote to memory of 2764 2456 spoolsv.exe 37 PID 2456 wrote to memory of 2764 2456 spoolsv.exe 37 PID 2456 wrote to memory of 2764 2456 spoolsv.exe 37 PID 2764 wrote to memory of 1864 2764 svchost.exe 39 PID 2764 wrote to memory of 1864 2764 svchost.exe 39 PID 2764 wrote to memory of 1864 2764 svchost.exe 39 PID 2764 wrote to memory of 1864 2764 svchost.exe 39 PID 2936 wrote to memory of 1588 2936 explorer.exe 40 PID 2936 wrote to memory of 1588 2936 explorer.exe 40 PID 2936 wrote to memory of 1588 2936 explorer.exe 40 PID 2936 wrote to memory of 1588 2936 explorer.exe 40 PID 2764 wrote to memory of 3060 2764 svchost.exe 41 PID 2764 wrote to memory of 3060 2764 svchost.exe 41 PID 2764 wrote to memory of 3060 2764 svchost.exe 41 PID 2764 wrote to memory of 3060 2764 svchost.exe 41 PID 2764 wrote to memory of 2416 2764 svchost.exe 45 PID 2764 wrote to memory of 2416 2764 svchost.exe 45 PID 2764 wrote to memory of 2416 2764 svchost.exe 45 PID 2764 wrote to memory of 2416 2764 svchost.exe 45 PID 2764 wrote to memory of 1000 2764 svchost.exe 47 PID 2764 wrote to memory of 1000 2764 svchost.exe 47 PID 2764 wrote to memory of 1000 2764 svchost.exe 47 PID 2764 wrote to memory of 1000 2764 svchost.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe"C:\Users\Admin\AppData\Local\Temp\5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
\??\c:\users\admin\appdata\local\temp\5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exec:\users\admin\appdata\local\temp\5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "Microsoft Service" /sc ONLOGON /tr "C:\Windows\system32\SubDir\fud2.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2320
-
-
C:\Windows\system32\SubDir\fud2.exe"C:\Windows\system32\SubDir\fud2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 15:32 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 15:33 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 15:34 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1000
-
-
-
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe4⤵PID:1588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD58cae623d3839eacaad6392bbcd034ffd
SHA1dbd6969f37dc1a61a77a4328beb20e4029d32228
SHA256bb0a82993c5dd0ccb5952045364247277bfc8cbdcf78243e4a58febace257bfd
SHA512ea65642a70ee05857d4ce9fb10123b4a546c3c317305b79984a524ce6b5d7d4a1a3863d8aeb4097c097f5c512370b9437f5ea9d3c07609d4050873882af87ed0
-
Filesize
3.2MB
MD53dc1d39a2ebeb5dc85da7e8c3d6e3aaa
SHA14cfcddc23cc0949ca620474edef6c82a2c2280d3
SHA2565ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4
SHA51277dfdb50b408c3e88a18b0aae3eac9e2001f6041b406aef2d298e35cf49b51d921afeb5526930a44dc4e12294cd31c3f9fed74871c8bb0e9989e6a912131a65a
-
\Users\Admin\AppData\Local\Temp\5ee53e7e25a03aff5a92dd99804ecc38795f7513437e82be670b9e0b61a98ea4.exe
Filesize3.1MB
MD5f2fde7b36d929112d10c35f88597e643
SHA1ecfb40c3f75cbabf3787d7cc466f4ab3e0bfb59a
SHA2562a1b24e284eb329bcac58cfe90ef04e390aef10f4c0cc4eddf6077d113e5e591
SHA51299dda7073d391e3ada814df8bad4f3e817adb2d274e005cedcf378d2031a3695ddd8afeecfa8ceacf9569f400b08f1dc357d4d90d72b9ba0372f267668f399df
-
Filesize
135KB
MD5dba332c1832b99f7c7d078a0082874ed
SHA1f339233684c867e70ec06f09cae6f938ba7f6dd0
SHA256d14ca80e7ae57bfa56b7614372feb89b5c35397451dd2c38156558b3a577c397
SHA512410746bd8242436f4c8ea8700f9e4dd93270aab3dd494e539b877fcbefc76a5e9111e4de720ba3daeb21722ce568adffa347407b798fc8e87e8fa8b5b7b42482
-
Filesize
135KB
MD506f70e8dc0d4415e048d53e1dbb58d75
SHA17221e5ca46d99738b72a70c8318925f9509ea0bb
SHA2568b1f135f8dd424a81358f8a7115b5b085111b0fac77ba5126104fe2ac717c617
SHA512f2c0d7a636adf77f4d0c9c0905dac2118c5d4b2fc5c059bcaf694ae89b4654d0bcb60075603ed31106b27de0b3c85231fb260f2d699c5fc220ff4193a2a60f92
-
Filesize
135KB
MD58c763fbe02cd53b5cc6bda7031967ee1
SHA197c67c516a4ab71391516c4f82329bd911b77b2e
SHA2562e0b1a0c326ab3ca56bd4b94a60bc27c8367bb65bfc23e728496bc7520a18f90
SHA51260a105532e329a9189235c658d93e0072afa8aa7bde52654233fcb6d53671298247a49eccf269de7dcad74ae797afff8d908eded4774b930c3910c023f3eb730