Analysis
-
max time kernel
153s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2023, 08:27
Behavioral task
behavioral1
Sample
248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe
Resource
win10v2004-20230915-en
General
-
Target
248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe
-
Size
1.1MB
-
MD5
ad3bbd955c15dc9c0704c4830fab4392
-
SHA1
b82360e64607a92bf16ee0a543a324a3ce457a87
-
SHA256
248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f
-
SHA512
daf4cad977c8a7043819399f89b314ab45543c6aef383a34790254cc3eb0a11e67e5f14ad527e05fdfdcd25a46053a4c712905721ac9efd43ef3dd0bc8469c0a
-
SSDEEP
12288:xqXUHkUXe3GOkx2LIaKMgdBQGb1wyyy0/n:xjHPO2Okx2LFKMgdBQGpA
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3176 created 608 3176 Explorer.EXE 79 -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\qTSMDMP.sys BdeHdCfg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe -
Executes dropped EXE 2 IoCs
pid Process 3392 49be0da0 2672 BdeHdCfg.exe -
resource yara_rule behavioral2/memory/3048-0-0x0000000000580000-0x0000000000609000-memory.dmp upx behavioral2/files/0x001000000001e746-2.dat upx behavioral2/memory/3392-4-0x0000000000900000-0x0000000000989000-memory.dmp upx behavioral2/files/0x001000000001e746-3.dat upx behavioral2/memory/3048-29-0x0000000000580000-0x0000000000609000-memory.dmp upx behavioral2/memory/3048-31-0x0000000000580000-0x0000000000609000-memory.dmp upx behavioral2/memory/3392-38-0x0000000000900000-0x0000000000989000-memory.dmp upx behavioral2/memory/3392-46-0x0000000000900000-0x0000000000989000-memory.dmp upx behavioral2/memory/3392-71-0x0000000000900000-0x0000000000989000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 BdeHdCfg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft 49be0da0 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData 49be0da0 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 BdeHdCfg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 BdeHdCfg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DED9969D7ED2C6E555C5C9254A43EDE4 49be0da0 File created C:\Windows\SysWOW64\49be0da0 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 BdeHdCfg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 49be0da0 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 BdeHdCfg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C BdeHdCfg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE 49be0da0 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies 49be0da0 File created C:\Windows\system32\ \Windows\System32\WnJWiNBnT.sys BdeHdCfg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B BdeHdCfg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B BdeHdCfg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 49be0da0 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E 49be0da0 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 49be0da0 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 BdeHdCfg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_DD02D25E799024F48A93E8EE3BDDA41A 49be0da0 File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C BdeHdCfg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache 49be0da0 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content 49be0da0 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DED9969D7ED2C6E555C5C9254A43EDE4 49be0da0 File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 49be0da0 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\3a1280 49be0da0 File created C:\Windows\Help\BdeHdCfg.exe Explorer.EXE File opened for modification C:\Windows\Help\BdeHdCfg.exe Explorer.EXE File created C:\Windows\MeWmYff5I.sys BdeHdCfg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName BdeHdCfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 BdeHdCfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 BdeHdCfg.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1388 timeout.exe 4676 timeout.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing BdeHdCfg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 49be0da0 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" 49be0da0 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" BdeHdCfg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ BdeHdCfg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" BdeHdCfg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" 49be0da0 Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 49be0da0 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" BdeHdCfg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" 49be0da0 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" BdeHdCfg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix 49be0da0 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" 49be0da0 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" 49be0da0 Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" BdeHdCfg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 49be0da0 Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix BdeHdCfg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" BdeHdCfg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3392 49be0da0 3392 49be0da0 3392 49be0da0 3392 49be0da0 3392 49be0da0 3392 49be0da0 3392 49be0da0 3392 49be0da0 3392 49be0da0 3392 49be0da0 3176 Explorer.EXE 3176 Explorer.EXE 3176 Explorer.EXE 3176 Explorer.EXE 3392 49be0da0 3392 49be0da0 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe 2672 BdeHdCfg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3176 Explorer.EXE -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 3048 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe Token: SeTcbPrivilege 3048 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe Token: SeDebugPrivilege 3392 49be0da0 Token: SeTcbPrivilege 3392 49be0da0 Token: SeDebugPrivilege 3392 49be0da0 Token: SeDebugPrivilege 3176 Explorer.EXE Token: SeDebugPrivilege 3176 Explorer.EXE Token: SeIncBasePriorityPrivilege 3048 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe Token: SeDebugPrivilege 3392 49be0da0 Token: SeDebugPrivilege 2672 BdeHdCfg.exe Token: SeDebugPrivilege 2672 BdeHdCfg.exe Token: SeDebugPrivilege 2672 BdeHdCfg.exe Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeIncBasePriorityPrivilege 3392 49be0da0 Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE Token: SeShutdownPrivilege 3176 Explorer.EXE Token: SeCreatePagefilePrivilege 3176 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3176 Explorer.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 3392 wrote to memory of 3176 3392 49be0da0 37 PID 3392 wrote to memory of 3176 3392 49be0da0 37 PID 3392 wrote to memory of 3176 3392 49be0da0 37 PID 3392 wrote to memory of 3176 3392 49be0da0 37 PID 3392 wrote to memory of 3176 3392 49be0da0 37 PID 3176 wrote to memory of 2672 3176 Explorer.EXE 90 PID 3176 wrote to memory of 2672 3176 Explorer.EXE 90 PID 3176 wrote to memory of 2672 3176 Explorer.EXE 90 PID 3176 wrote to memory of 2672 3176 Explorer.EXE 90 PID 3176 wrote to memory of 2672 3176 Explorer.EXE 90 PID 3176 wrote to memory of 2672 3176 Explorer.EXE 90 PID 3176 wrote to memory of 2672 3176 Explorer.EXE 90 PID 3392 wrote to memory of 608 3392 49be0da0 79 PID 3392 wrote to memory of 608 3392 49be0da0 79 PID 3392 wrote to memory of 608 3392 49be0da0 79 PID 3392 wrote to memory of 608 3392 49be0da0 79 PID 3392 wrote to memory of 608 3392 49be0da0 79 PID 3048 wrote to memory of 5004 3048 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe 95 PID 3048 wrote to memory of 5004 3048 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe 95 PID 3048 wrote to memory of 5004 3048 248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe 95 PID 5004 wrote to memory of 1388 5004 cmd.exe 97 PID 5004 wrote to memory of 1388 5004 cmd.exe 97 PID 5004 wrote to memory of 1388 5004 cmd.exe 97 PID 3392 wrote to memory of 3628 3392 49be0da0 101 PID 3392 wrote to memory of 3628 3392 49be0da0 101 PID 3392 wrote to memory of 3628 3392 49be0da0 101 PID 3628 wrote to memory of 4676 3628 cmd.exe 104 PID 3628 wrote to memory of 4676 3628 cmd.exe 104 PID 3628 wrote to memory of 4676 3628 cmd.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe"C:\Users\Admin\AppData\Local\Temp\248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\248a5c1ef93baa512192d26f62dbb505628e874f61119b87793e16ef6764566f.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:1388
-
-
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\Help\BdeHdCfg.exe"C:\Windows\Help\BdeHdCfg.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\Syswow64\49be0da0C:\Windows\Syswow64\49be0da01⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\49be0da0"2⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.6MB
MD55244c87dbafa1f764b258766005dea73
SHA184cb8b4fb3e0910cfecfb31b6fa54c16d940e703
SHA256077035f93ddc3ac5a8b5631d43826baf7722256eb1c4716b3c2567f07379bc40
SHA51254d64d32e73e2752cdf9a110db17ad64574eb072df0ed0dc34a7e4bc469c03aa79ef7d45465e279ef85d5fc6b33a1b750b181476cdea7ea98898ddba9aa60438
-
Filesize
131KB
MD589d0572c9b53f34230c8514f6b11bd56
SHA1c8111fa4bb979386bd9c7923eb5e8ba3cb2947fb
SHA256a6797c873af8f7fefe1352876113cd912e329759e838cf2f49ecd7bdf4bf4f26
SHA512ec6199df2daca0de2bc279e891d5996ba4afc6ee1892aa878fb17c438f7c2ebc4e7678a582151acc56d7fb74e8787e3ec8d5aa0c370df0b5d0dea0dedfc30ea0
-
Filesize
131KB
MD589d0572c9b53f34230c8514f6b11bd56
SHA1c8111fa4bb979386bd9c7923eb5e8ba3cb2947fb
SHA256a6797c873af8f7fefe1352876113cd912e329759e838cf2f49ecd7bdf4bf4f26
SHA512ec6199df2daca0de2bc279e891d5996ba4afc6ee1892aa878fb17c438f7c2ebc4e7678a582151acc56d7fb74e8787e3ec8d5aa0c370df0b5d0dea0dedfc30ea0
-
Filesize
1.1MB
MD5c8369b435499765258632870612943e7
SHA13492ed1332f3339685ad9408ec87dbe572b46dc0
SHA256221be23b60fc23d65fbe4a169f988e61d8edd9e28d669bb783fc4b15edaea5c1
SHA512b8e3d060e398075cad005e0bf51539d1b965317d7a06b40f69378a3915c945ca8efcf01fbb3ccad46e68b0b9bcbc03cb007a846094378899e88b1c061ef93d44
-
Filesize
1.1MB
MD5c8369b435499765258632870612943e7
SHA13492ed1332f3339685ad9408ec87dbe572b46dc0
SHA256221be23b60fc23d65fbe4a169f988e61d8edd9e28d669bb783fc4b15edaea5c1
SHA512b8e3d060e398075cad005e0bf51539d1b965317d7a06b40f69378a3915c945ca8efcf01fbb3ccad46e68b0b9bcbc03cb007a846094378899e88b1c061ef93d44