Overview
overview
7Static
static
7Privoxy.exe
windows7-x64
7Privoxy.exe
windows10-2004-x64
7x64/NTT.exe
windows7-x64
1x64/NTT.exe
windows10-2004-x64
1x64/NetchCore.dll
windows7-x64
1x64/NetchCore.dll
windows10-2004-x64
1x64/ShadowsocksR.exe
windows7-x64
1x64/ShadowsocksR.exe
windows10-2004-x64
1x64/Win-10.sys
windows7-x64
1x64/Win-10.sys
windows10-2004-x64
1x64/Win-7.sys
windows7-x64
1x64/Win-7.sys
windows10-2004-x64
1x64/Win-8.sys
windows7-x64
1x64/Win-8.sys
windows10-2004-x64
1x64/ck-client.exe
windows7-x64
x64/ck-client.exe
windows10-2004-x64
x64/dns2tcp.exe
windows7-x64
1x64/dns2tcp.exe
windows10-2004-x64
1x64/nfapi.dll
windows7-x64
1x64/nfapi.dll
windows10-2004-x64
1x64/nfapinet.dll
windows7-x64
7x64/nfapinet.dll
windows10-2004-x64
7x64/sysproxy.dll
windows7-x64
1x64/sysproxy.dll
windows10-2004-x64
1x64/tap-dr...ll.bat
windows7-x64
5x64/tap-dr...ll.bat
windows10-2004-x64
5x64/tap-dr...01.sys
windows7-x64
1x64/tap-dr...01.sys
windows10-2004-x64
1x64/tap-dr...ll.exe
windows7-x64
1x64/tap-dr...ll.exe
windows10-2004-x64
1x64/tun2socks.exe
windows7-x64
1x64/tun2socks.exe
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 12:18
Behavioral task
behavioral1
Sample
Privoxy.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Privoxy.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
x64/NTT.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
x64/NTT.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
x64/NetchCore.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
x64/NetchCore.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
x64/ShadowsocksR.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
x64/ShadowsocksR.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
x64/Win-10.sys
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
x64/Win-10.sys
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
x64/Win-7.sys
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
x64/Win-7.sys
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
x64/Win-8.sys
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
x64/Win-8.sys
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
x64/ck-client.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
x64/ck-client.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
x64/dns2tcp.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
x64/dns2tcp.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
x64/nfapi.dll
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
x64/nfapi.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
x64/nfapinet.dll
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
x64/nfapinet.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
x64/sysproxy.dll
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
x64/sysproxy.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
x64/tap-driver/install.bat
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
x64/tap-driver/install.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
x64/tap-driver/tap0901.sys
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
x64/tap-driver/tap0901.sys
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
x64/tap-driver/tapinstall.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
x64/tap-driver/tapinstall.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
x64/tun2socks.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
x64/tun2socks.exe
Resource
win10v2004-20230915-en
General
-
Target
x64/tap-driver/install.bat
-
Size
124B
-
MD5
8c131f20776352ecab095e66d122f6aa
-
SHA1
d8c25830df67b0b704ae753ee4e2d8d219f7f618
-
SHA256
c76be0a1160d03700c2dce2a67a4485c54d007819f596f5c12064da4c47123bc
-
SHA512
1745248472cf92dd1d1d80bc0e3549ad5686f287b18b612b68091173bce6b7b54f22ebd43c7bf53743602df8e5b34250e82554ec11656475735f59abe52202bb
Malware Config
Signatures
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\SET9CDC.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\SET9CDD.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\SET9CDC.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\SET9CDD.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\SET9CDB.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\SET9CDB.tmp DrvInst.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.app.log tapinstall.exe -
Modifies data under HKEY_USERS 51 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPublisher\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPublisher\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPublisher\Certificates DrvInst.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 2080 tapinstall.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 1976 DrvInst.exe Token: SeRestorePrivilege 2808 rundll32.exe Token: SeRestorePrivilege 2808 rundll32.exe Token: SeRestorePrivilege 2808 rundll32.exe Token: SeRestorePrivilege 2808 rundll32.exe Token: SeRestorePrivilege 2808 rundll32.exe Token: SeRestorePrivilege 2808 rundll32.exe Token: SeRestorePrivilege 2808 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2080 2672 cmd.exe 29 PID 2672 wrote to memory of 2080 2672 cmd.exe 29 PID 2672 wrote to memory of 2080 2672 cmd.exe 29 PID 1976 wrote to memory of 2808 1976 DrvInst.exe 31 PID 1976 wrote to memory of 2808 1976 DrvInst.exe 31 PID 1976 wrote to memory of 2808 1976 DrvInst.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\x64\tap-driver\install.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\x64\tap-driver\tapinstall.exetapinstall.exe install OemVista.inf tap09012⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{445d3a66-4af7-63d9-abb0-bf426dd07262}\oemvista.inf" "9" "6d14a44ff" "0000000000000328" "WinSta0\Default" "0000000000000560" "208" "c:\users\admin\appdata\local\temp\x64\tap-driver"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{63ec5193-a622-48d1-2a23-ea14745ce07e} Global\{284370a8-a4e7-34c9-5376-1e12bb65ba39} C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\oemvista.inf C:\Windows\System32\DriverStore\Temp\{41d08f1a-6ed7-18c5-8cc8-f84abb7e2575}\tap0901.cat2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
26KB
MD5d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2
-
Filesize
7KB
MD587868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
Filesize
19KB
MD5c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
Filesize
7KB
MD587868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
Filesize
19KB
MD5c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
Filesize
26KB
MD5d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2
-
Filesize
7KB
MD587868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
Filesize
19KB
MD5c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c