Analysis
-
max time kernel
456s -
max time network
459s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-03-2023 13:50
Static task
static1
Behavioral task
behavioral1
Sample
Factura-Digital.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Factura-Digital.7z
Resource
win10v2004-20230220-en
General
-
Target
Factura-Digital.7z
-
Size
7.1MB
-
MD5
551db99ee591cc96a7eb9cb2d90ce3e5
-
SHA1
625b7ed0d937fc5fc4a03433104ed326facc7074
-
SHA256
630bc7e23cc99472759d6c778c0ff57f07f5b5e0af4806c0e4fced953166eb60
-
SHA512
f1afe7c69e5344b60339556f9d4062494828125cc7a1e5b87cb6df6f9cf779ab2df59c5d3f9214a8321a7c953376e42b458a3b2b652a0e93943d2f1a1982a3f6
-
SSDEEP
196608:Ny6qg/nmMEduyQPanOZamIkVDlKQt9ajUYhen8:HjgduyyaWF1YGBae8
Malware Config
Extracted
amadey
3.68
213.226.123.14/jd93d22Cb1/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1580 Factura-Electronica.exe 1612 footsimvov.exe -
Loads dropped DLL 19 IoCs
pid Process 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Factura-Electronica.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Factura-Electronica.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1496 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1312 7zG.exe Token: 35 1312 7zG.exe Token: SeSecurityPrivilege 1312 7zG.exe Token: SeSecurityPrivilege 1312 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 7zG.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1220 wrote to memory of 832 1220 cmd.exe 29 PID 1220 wrote to memory of 832 1220 cmd.exe 29 PID 1220 wrote to memory of 832 1220 cmd.exe 29 PID 1580 wrote to memory of 1612 1580 Factura-Electronica.exe 36 PID 1580 wrote to memory of 1612 1580 Factura-Electronica.exe 36 PID 1580 wrote to memory of 1612 1580 Factura-Electronica.exe 36 PID 1580 wrote to memory of 1612 1580 Factura-Electronica.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Factura-Digital.7z1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Factura-Digital.7z2⤵
- Modifies registry class
PID:832
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:1524
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Factura-Digital\" -spe -an -ai#7zMap20876:86:7zEvent278151⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1312
-
C:\Users\Admin\Desktop\Factura-Digital\Factura-Electronica.exe"C:\Users\Admin\Desktop\Factura-Digital\Factura-Electronica.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\footsimvov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\footsimvov.exe2⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==3⤵PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\footsimvov.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\footsimvov.exe3⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\fc24331a33\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\fc24331a33\oneetx.exe"4⤵PID:1972
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==5⤵PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\fc24331a33\oneetx.exeC:\Users\Admin\AppData\Local\Temp\fc24331a33\oneetx.exe5⤵PID:1636
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fc24331a33" /P "Admin:N"&&CACLS "..\fc24331a33" /P "Admin:R" /E&&Exit6⤵PID:1528
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵PID:588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1596
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\fc24331a33\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:1496
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\b47fe11f8b12c7\clip64.dll, Main6⤵PID:1872
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {30CAD6DA-0308-49E7-AE52-B5AFA7FBF347} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]1⤵PID:1620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD55205f76f74468fa36c963d3806dbe76f
SHA109aa1495e68a7a5985f40cc725bb81a0662fd15f
SHA256c3a14c705d67517956954acf550a289af7c397b9ad7d5e5bdf03ec9fb3a8b591
SHA512bda0ea072f932e435e49738ddb3242938cdd21acbbff3c86882ea37fefe7f1d0da45c9aa853d0ae77282d5b56622652abcf239a654eb19f30b3ee4dedf48a1f8
-
Filesize
123.7MB
MD5b407aeec294a1837f0c89b7a14912930
SHA1a9a563ac6753d95c98a0d6355b4d32970569ef7e
SHA2566092e7ccbec3b910a8662c85c117427371824aa8c84d145cd99eb0ae45f74776
SHA51207fbca246826af1f3e9665ba85c4eb05488c81a93b6a68e9405ac7caa86330a11f590c2beabba30667a6a486ff08f3c1708b3002e9fef3966452884f94b5aa73
-
Filesize
124.7MB
MD5d064ca9f6a3fcc7b273953baa1caaeae
SHA14a7a5b40fb81be5168aad9473c5e399d2df0cf3b
SHA2560990d30e1934253556260593ebd4438d3de38aacc215ce9f349b1ad5a2da8057
SHA512a7bd5bba413118911b7e5b7049a31c40a9f3327cef0898756aa300664ab2d25af61b235ffe519aa8e7b25585e3bb8d955c3a2b62d1d05afb57b210440d52c8f4
-
Filesize
133.3MB
MD517c32fbb3b1bad2d0b0b6737b5a76650
SHA1b2a9ab70debf6883b63f6aa66e8ba6fdcb00e085
SHA256d3f21285503d74d6fa07ed3fdaa0290c8f4e34e9dd95a4e48797dcfc02049afe
SHA512bc5f7d8cb7b1b11dc68970eec218d8de123df1d55898d46ca4328859f04db3e83cbeab4db19122dbdbf6bf73c5716393cb6f78d021e40c5793a1369da8cf87f1
-
Filesize
132.1MB
MD5d665e1332f02d987ddef297a7251afdb
SHA11878921bbda699a8197bbbc461ebdbb4371c5125
SHA256725d905ccb361bf8bc81339d5be547a90d9510dcbe020c7ebd97cdb98f09342a
SHA512482c14cb5e43bf4f965f87fec77f8132ab3a1ea8c670a75c4451f4f1095c6a6ea3e345fbfdc32e7c2ba9d3ba11f81204c9e1ca9050a1d4bebbe0a5fa03b6aac5
-
Filesize
45.9MB
MD516875116dfa854a3a84a710c065c7490
SHA1815318674616cb54e57c77cad5730bc1282b25ca
SHA25633d0d539e6ce269f52f3a1b964fb11f9defc37fcf1b01eb67a77089c9442b8de
SHA512db2baaeabc6c66219ed280216bf9a5d32736828bf6d3d075e943f0dbdffc96605c5665de479a6783551094410570a727ab3bf367edb393c0c48567bba106793c
-
Filesize
45.8MB
MD57568e835cd9ab5c036ba8077d8a52e16
SHA173bdd4d42309a083ac7492610a09a6638e32c758
SHA25674685393960afe8086a7596a8d1a6c919536f7b1abc80227e3e8d8b80ca2c5da
SHA512e0eeaf7938f4a771797fee8f16f80fee9959ddfe32506a8a3515bcf9150b36c65c2246e4a4188239771c9969eff1777bb8b4046267425f64c0673e25f70e2ebe
-
Filesize
27.2MB
MD559b36d84fbdbc15f33c920ee71329226
SHA11836eb1555deb1dd1b01786229ab6f35df5683f1
SHA2564797b83abb9b59ae0fe4226cc574fc367e6c8536c2be5e468adb129f4dc69209
SHA512d022111ec14b3ac9b082afed66e3884ce7fbe2e581e78ae1927d5430f581434ee518b2604c1b35c2815128a1004837614b3f9754e77c65e0a066ee0762e82136
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NXGWT8T0F02SQ39QICPV.temp
Filesize7KB
MD5c489b34c90cfc13e1ac35a4e9b920333
SHA1c1c2f1accc2bd8e912fbf14d5c512b9351198ec0
SHA2564131a77c4abe4562a062076742b3b375ce0220273112cc065b570db60551ff83
SHA51216dba4200e15c6ab42af535d7c4ade39a35cb6717dabc1845d293a8c34ebc1613339f4e5c75a51b1ae04af601a2143b93b4ea39130f072a785985f9799606e81
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c489b34c90cfc13e1ac35a4e9b920333
SHA1c1c2f1accc2bd8e912fbf14d5c512b9351198ec0
SHA2564131a77c4abe4562a062076742b3b375ce0220273112cc065b570db60551ff83
SHA51216dba4200e15c6ab42af535d7c4ade39a35cb6717dabc1845d293a8c34ebc1613339f4e5c75a51b1ae04af601a2143b93b4ea39130f072a785985f9799606e81
-
Filesize
8KB
MD53562e7d267f1a3765c460c7f9baf7230
SHA17fbfa4ac5b48cd41768097abe0b3c0eeec4f2a6d
SHA256fc096866d7a86a302a1978fe3a01c3341bd140e97790394350c3c7045c0151c0
SHA512de07f9f61bed63fee4ba79e665a9cdcb06948399e7e34c32bd63dec21bffc2072f96070210ddde2cb623387ec8ff00a7aa5d5437d5da17644b4e565e7b279636
-
Filesize
254.6MB
MD535620391aeabb7616b34d1605a555f8d
SHA1ef2a0d5aa3e220aba5ce20b10134f0bfe234d342
SHA25696ddbcb8aadd2fea244296f6e6bcd59c2051abdd99d1e72d59dc63793e128218
SHA5122e7bf9c59010fea6cee569cc5fbf46e2e6d646c19fb8d526e7420a12a1caf965e1c050601f3b370076119e3d5b449dcca9724afeb9a62a093c68d25fed28fd5f
-
Filesize
133.8MB
MD5f4f68bab01c0a0e895b95959032e154d
SHA17623ac3ace4a6d0ab697948bd0b6fd96730d6291
SHA256d4653b1dc2d95bef82cd2d8aed9bea378fb1fb71f21374ca9229d970c10a4588
SHA5122a41d988e014e2536920d8d3e0e2dfe78df84edab7e81f1a1123e1f2365b8e8a9d714dddc7f5d40a3d73877e54fd65ede6a4d6a1a5eb585ac8044b7054c430a6
-
Filesize
45.8MB
MD5f02d89dae9323af3b2ee4e0b5d052387
SHA1a3e9a455aadb36bc25718a549414ee2652ef6829
SHA2563de6a5d6b551fa901d73d0b8709d439c896c7beb6931ed20b0c80eb8716adc37
SHA512d9a7c2197290c08ffdf7cc3c7dbdab51079558581e78d6e6339c3ab2c9191e4953b15125d6d40f2262d467d33877a1d9d8952ddacb8f112499b03341e0cb406f
-
Filesize
27.7MB
MD5729c919dcb97e14b5eeeb0ca296adabd
SHA15e87c1d4251fa92cf42becd53cb72bdcf1e34d89
SHA25636976a3804a2d82af080dd1f947131d08fe4193b3a890f88be494586ae4d65f8
SHA512dbddf1d506372f77f855d097ad42def7b3baed65d83ca78ea43ef002575a081b3f459afb8c8d7ef184af076991142322abf4f66d851d67016c7b59c9a92a5b61
-
Filesize
280.6MB
MD55dcf8d36a56c22c72f1a874c21d4c6f7
SHA12add047a85909f1f56f246496a4d140a48b2752d
SHA2561c61c2ef37fa9ee6e80363886400cf17cdbe28c8bcba9dc27068eec5a916197b
SHA51240f9f227daf17ed6dfab2cf488a058f8e72422cb44fab34950eb354453e503dffdbe6606ef328b1d73ea33ba238eb2d32076919a621d561c65b7567c7c8f674f
-
Filesize
280.4MB
MD52c670c972c5749bd8d88b93a0c37e0fa
SHA12e0dfdc4c9e04936579553783d73e1ef68a3f439
SHA25613d37b49395c129f4c8f11faa6e6eaa93dbce84374d111919b901c70ae467c0e
SHA512361c3f82ccba23421bf7c345afac7a1a91c6e36f43fc2de1eff6328c5304482b061bbfe4e9038b977442862b312d978a17d8671ba76d651e79bf68e6968f8166
-
Filesize
161.7MB
MD502c3be19e018680e1d5d5559331480ea
SHA1c7535514cd9ceb637f2eb5e665e4a353b4490bc9
SHA256bef73bd530b6563822c1030862d066ac5cba64e91b7b54edfa63af37bdf7058d
SHA512e319b4b24c5a19511b9e22016d74f93032b4dfad3ce63bf944e22bc9d4b4836828ea2bd9ed55d3d1e08df4d5e1517bb5ea177aa32b2c1e8ec8a13d2054f6c78f
-
Filesize
150.4MB
MD5dcb6d7d087cb5b6eddeb205e4e08a3f4
SHA13dab2d3a45ed6a269786b0d2dd0e9b010c6c31ab
SHA256f504a81b42948e9a47581980e7744e38976b3b8b384adbea7c858db8b85d0c20
SHA512fcbe3cd1a1e81ef3f081c6260c8bd07ee06577c3c1adb43141204d3b53f2c7431ffd96d3b212a96905cae552dac39099681e04ac49e92e6b9af6618bf2f37cd2
-
Filesize
162.2MB
MD52e80dccab3d2a297eae0837e14ddd283
SHA1c6e5f76d658d5dabf8f5b6589de51a48b9e9fb39
SHA256ca4be30d47006e8822db37110c48ad4feab9f4f89a7ba34c9923b8ee4b87b3f3
SHA5123ca96f38ad375b9d49c65406e3d941d1ce53ba47e6552f4aa0c2674cfb193f8eeb5afe870ec39630a43799ce6b54e840a288802985fb7de32b2580d8b7dca2c6
-
Filesize
133.5MB
MD5165fa1212d047a6f3cae17b143917208
SHA1e767e157acb6bd11465f409dbb098e8a4d5ba371
SHA256dd9830a1edef89d9dc62f57dd99d0e049d08f8cfeb49dd24a60461959e59ed8e
SHA51208fcbb9b1d14a21ee541224169cc80bee7b92555bb402228530346f1c7a01231a4fe24e8f81f4d7d34f364c43fb4708c6f22c47e1f097d45fd3cc1a7167e515a
-
Filesize
254.6MB
MD542f9ab503a91b8b3900a7e05d21f6eee
SHA14f8aa6b675d6b7b7f550d5251d0ddea0a87b67d2
SHA256a0e9dc4902b8f964c2fd1306c11a0d812997973e89307085efcdd2224faa2258
SHA512de3d7ddce1ad8312288de42fc0eee5f243e8257c7975436d956085349d1d3116820e84525229c482f8df5769cf9308560ab92e7c02eb56045b677cf4ae60ba02
-
Filesize
254.5MB
MD53e4cdbd5b06fda254cc8ad36d0cba6ba
SHA1fc5aa8d5b199871687f91b24aca1c5f5b03a74e0
SHA2564a564afc956983cc537c8456216b9f9d46cce02e96777417bb64d1599df7a7c6
SHA512dc6acfd6df6e566672f08da48a0d79d9c737038471d7ecf29ed13bb51630eef5301111211add0d4a0b5f9ed6fd37e622a42f25892654c50588fa3bf75a2abc5f
-
Filesize
212.5MB
MD5f06e84c1d5bb3224e59fc7ffd9f0bd8c
SHA1ae2a711995e2e9e8acc2c345fa5262afb753a1d4
SHA2567e1244aa60258df5153f18b9d9fc6877faf840805482d2e9cb6dc2d612ae8138
SHA5121ea1b5cc4197027da55824409ea8a49108e1b7f0b7a75052ba32dbf102a4d67dd20c5696393a782008a74e9c00b1f2d3571f7e87b6c7edf31c3f6bcb90b7c2ca
-
Filesize
212.0MB
MD5b866c54992978bbfc331aecf2ad40b9e
SHA17b4c3191743a4f58f9797ac2d42210a9830ec80a
SHA256a3fca6bf2e20677470278a2ef201e0682666561c8bdd3be38d2f4e0d6ffeb5c6
SHA5122cb6b56c8fbf50e9e1b7f76874f62feaf02f9097fb96ef36edd48d49781113c59875197342445c5c26d8ed19793bf9559d78da08cf88ad1bdc649295e77f289a
-
Filesize
211.9MB
MD5380dd65ffc40b9d42e08682073f3f6f0
SHA1163de0018de6a47deeb4cda1065747b9c64a53aa
SHA2566bfea1d0659128af0db6cba258cc37779cb2a6162ecc54f79c3e51422da4626e
SHA512fb3a5b0559750413d715370ede777222cef6bb4c96ed378b4efc99f2139a909ff8dff57daa2505bbfabcc30d5684a3eb9556e77c9ffb603eac531aee96f1ca35
-
Filesize
211.9MB
MD59a33f09d545bdd0f67eb8417b2825153
SHA1398a376aaa64e59ef474dc7ce83a657f891ea9e6
SHA256808d5fd2f6c48a1e5ae23645533f4c569c7b9846b281fbe4075d169f8a98faee
SHA51221c205a5289271a0ce7fc1e3a57ae11f58a46de5300833b12d7eede53f3d42d66049bb6837ac4ce8f36a5e9be975d9e61abddadab76ddd2542c9390bf3f7fe77
-
Filesize
211.9MB
MD5380dd65ffc40b9d42e08682073f3f6f0
SHA1163de0018de6a47deeb4cda1065747b9c64a53aa
SHA2566bfea1d0659128af0db6cba258cc37779cb2a6162ecc54f79c3e51422da4626e
SHA512fb3a5b0559750413d715370ede777222cef6bb4c96ed378b4efc99f2139a909ff8dff57daa2505bbfabcc30d5684a3eb9556e77c9ffb603eac531aee96f1ca35
-
Filesize
211.6MB
MD5559792369d0f32d5e6250617e03aa68a
SHA1cad0e03347f5ba38d8c0ad746b0bad9afcfbecb3
SHA2567847220d67a9247b57d2de29301acbf574a02349bdc60fe6097a6fcc84c49ce3
SHA5120a4d2668ac1ad920cb885b1bdc001b8b0bbda27cce193a5ee53d1397fff2264a09183209df9f2a4075293b79818e86e90f2a90a4fe6afe1b2da0f8cf95efcd39
-
Filesize
211.6MB
MD5559792369d0f32d5e6250617e03aa68a
SHA1cad0e03347f5ba38d8c0ad746b0bad9afcfbecb3
SHA2567847220d67a9247b57d2de29301acbf574a02349bdc60fe6097a6fcc84c49ce3
SHA5120a4d2668ac1ad920cb885b1bdc001b8b0bbda27cce193a5ee53d1397fff2264a09183209df9f2a4075293b79818e86e90f2a90a4fe6afe1b2da0f8cf95efcd39
-
Filesize
103.8MB
MD5b5323982d49f3d9f7511200cadc70411
SHA1b0d8c398fd94d2d748697603a940da4550a4cd41
SHA25652427787f8065e09afc728e9e973c58ce6e6d5a7a60b92fb0fb1e1802f19d226
SHA5124f4126fb8b43c862cbef9225f0df81c452f18143c838a5d92121fa25c147f6f7a7555027ff28f09362449d34177b1ab1a9bf7f45901aeb5c941bc71f6b6460db
-
Filesize
102.7MB
MD5d59b15242a5e19ef0f08096c03634c8b
SHA1a007c58310f4dfd7bbd0fc7e02f7262987663a9b
SHA256fc722ed37dc9b392433e69864bda182a216f9ad79fc7e3f029d97f6e64fec995
SHA5122cfb128159016c8b94c4a827a9086db85d77efd2d4b5d07965984cd49e6333a27f78507926e301db971a0c7d33113c44060ce1c7c0f47b95f726466a5bb4813a
-
Filesize
103.4MB
MD557749849c2488227b0214d36e55adf9e
SHA13de03bdbd233ed20f43c4c460540771586739fd4
SHA25604d1175ecdff0470fbdff30352311ed72b47af4c9f380d1f29e3c15273189fac
SHA512c2cecabac173b03f0d87fb9629e093a78d8da0d03980de90beb2f05672ae6c2a69f0f73f7911c95afdd44bc38db66c5d5160e5b0d24e343aaa7134b07451871f
-
Filesize
103.8MB
MD5b5323982d49f3d9f7511200cadc70411
SHA1b0d8c398fd94d2d748697603a940da4550a4cd41
SHA25652427787f8065e09afc728e9e973c58ce6e6d5a7a60b92fb0fb1e1802f19d226
SHA5124f4126fb8b43c862cbef9225f0df81c452f18143c838a5d92121fa25c147f6f7a7555027ff28f09362449d34177b1ab1a9bf7f45901aeb5c941bc71f6b6460db