Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 22:51
Static task
static1
Behavioral task
behavioral1
Sample
567fb69d76ea237159c02b5a4e4ebe4be9571d506cc8cf38637f055800055608N.dll
Resource
win7-20240903-en
General
-
Target
567fb69d76ea237159c02b5a4e4ebe4be9571d506cc8cf38637f055800055608N.dll
-
Size
140KB
-
MD5
cd75e2ac31727e8476ea3d45cc4b4f70
-
SHA1
2a9481617dd6ec0b1b61a047dfc5bc72cb1111e6
-
SHA256
567fb69d76ea237159c02b5a4e4ebe4be9571d506cc8cf38637f055800055608
-
SHA512
a2e11f6a5449dc9ce00e048c7fa2f8ce03d65d569404c9c888c03dd011d2e6cca4521348105e497aaed391cb124a247657a08d4c0e8671619974205cf779a591
-
SSDEEP
1536:rBC8cGhP4h1QlBR5szrAMty3KntgmaGSR1EbsQI1mhiMBUroMhF:rBC81V4Iz0r7ty3KlaPEbsQIxrDf
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1376 rundll32Srv.exe 2012 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2380 rundll32.exe 1376 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000c000000012280-2.dat upx behavioral1/memory/1376-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1376-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2012-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2012-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2012-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2012-19-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxB339.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438045766" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80A0FD51-A536-11EF-8C85-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2012 DesktopLayer.exe 2012 DesktopLayer.exe 2012 DesktopLayer.exe 2012 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2380 2396 rundll32.exe 30 PID 2396 wrote to memory of 2380 2396 rundll32.exe 30 PID 2396 wrote to memory of 2380 2396 rundll32.exe 30 PID 2396 wrote to memory of 2380 2396 rundll32.exe 30 PID 2396 wrote to memory of 2380 2396 rundll32.exe 30 PID 2396 wrote to memory of 2380 2396 rundll32.exe 30 PID 2396 wrote to memory of 2380 2396 rundll32.exe 30 PID 2380 wrote to memory of 1376 2380 rundll32.exe 31 PID 2380 wrote to memory of 1376 2380 rundll32.exe 31 PID 2380 wrote to memory of 1376 2380 rundll32.exe 31 PID 2380 wrote to memory of 1376 2380 rundll32.exe 31 PID 1376 wrote to memory of 2012 1376 rundll32Srv.exe 32 PID 1376 wrote to memory of 2012 1376 rundll32Srv.exe 32 PID 1376 wrote to memory of 2012 1376 rundll32Srv.exe 32 PID 1376 wrote to memory of 2012 1376 rundll32Srv.exe 32 PID 2012 wrote to memory of 2008 2012 DesktopLayer.exe 33 PID 2012 wrote to memory of 2008 2012 DesktopLayer.exe 33 PID 2012 wrote to memory of 2008 2012 DesktopLayer.exe 33 PID 2012 wrote to memory of 2008 2012 DesktopLayer.exe 33 PID 2008 wrote to memory of 2744 2008 iexplore.exe 34 PID 2008 wrote to memory of 2744 2008 iexplore.exe 34 PID 2008 wrote to memory of 2744 2008 iexplore.exe 34 PID 2008 wrote to memory of 2744 2008 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567fb69d76ea237159c02b5a4e4ebe4be9571d506cc8cf38637f055800055608N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567fb69d76ea237159c02b5a4e4ebe4be9571d506cc8cf38637f055800055608N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4438cb3c01b865cfb69a405197ec448
SHA11d9787b4c7277e228ef61ff96e35558455c5b62a
SHA2563523eaa8507c0718d47587e5f8f0def71a1c727ea58a91582747a3f589fda0ba
SHA512a4530564d5fc2628518241166e22da7e5602fe9cda4bf662264d9617e8b654e8d9637a90b4bd7551514f0cb90119f86d4caa98f94f5746e8e39855a418cf1255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd93f7e722a52d9263f94229285897b6
SHA1cf9a7c70072efa5680b5fedd250f37b13a0e9ea2
SHA2568ff8e9fa6c5b2ce56b749e3908e5c81ddb891bd1fe60488ee444ab54b5428a0b
SHA5124f3b3023ca0d3d130114140996c81462031b6999d0813248251a1b264f2348dcd8436632238127ba5c9932701d4b72a94722bdad903edb441810446a3bfb436a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc3a4d98429756d2428c108ef601dbf
SHA1e5fcaa1e580d8bc0ef95c683a42831984f9ee730
SHA256f657631ca332e5d6156c68073d709e2ec040b702151868fd128ad0d768ba8ced
SHA5128e7485187250158ba53ebc632b4b5fe8e8f8ee9ee24b8ff2337ba056eda729151b745a5d643768065d208de59400c8cdfac991215fe8f487529c654a2fd728af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ddfd5455c3801b8537404d59fc110a9
SHA17b89a230b74f274e73fc903607a7b6c39d99e9ae
SHA256bc83b9693b84096a5db705ad9021bd523232e01b6ca77329cafc0e6970860728
SHA512bc9e3fe4ea4edb97286240f2194437f68b94ee25909b407f8069e829bb1298874ef67687046013338a69183cc3f648e7d804feff7a0c7a22f189b7cafbbb4a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59fb655c613431b1da77e61be9bec33
SHA107a8fb715cfde98e55cf779a4749618fc824c7f8
SHA256104edc658747ada2b777ab2b1825717cb5537fe6630df802ea056e1cacbfd3d3
SHA51218554a82c21ccec704dbbdf2cffb4bd8bda85c29f1cbd148ebd5c40d14dd8cf3d22c13c7ffa5d65a06720347b40ae3a1b7431ea8b0e8a6d9ce973ca03910fc32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa13eb4738dbd55d37d2e48cb321f34
SHA17f45ebda7c8041d99dc3929432c60d994ff91492
SHA25652dac239d1c0d4bd508b4368900cd3916efbae7c471f04435b02e18e6b570208
SHA512454bb811ed90a0f7623c3dfad7098085994b994fd653c37b926b87d227abfd18846ae9dc959209e54db24e336c454830de51a0ffaf61b719e9bc88eeb78393a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c461486807f55ccf70a2654e2be4112e
SHA1b2dc953ba1a49aa8474a03d0ea845654868c845b
SHA256e3a88e14f339d0639ac364517dc3a1d79c297b08549f2be6aaab28e38c055f5a
SHA5128406bbc326ec4961f9731785375776d5e5bf5b0735c3b021c936f1d2feb78e6378493a8adab19a70a16fe3709ddedb24855c4e4c3fbbe749b32faf9500bc440d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4cce7288b49ccb1a25b25a41207b4a6
SHA16d3b3fa2f104d7eaff5f1573447cf1841dce921c
SHA256e10135687bc6198424b119b4592daf9730c02a53790ae9170e86f8397d9f1eda
SHA512586dc9a4eaafc82f6539c5855b81ddf69f0c92f086618eb92f4a5912d95aa861f43ab3e9ff4ec3771cf180886ec08edab267ecf99cbf7ef3627311235133ea06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8153a903187a594d8600b0f99c8dbde
SHA1ddaf0a9c1f52cc283994d2e380022b4438874f43
SHA2567e706e61d4c9f7ac44a97a6111347f967c7caf34cc235f5ffdbe0b8e34b8f78f
SHA512ccdb174d39a359300f15b9d2d7cf0110ca38d4fe3e2bb674673cae133d8403622de283846e1f251b47d61f1c14e5d17f3383882342a190c88f98f26b863e2d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8df3a6a054d9db8d0ca9e9bbf09b240
SHA108377df27b37da31d8b92934c2e83901691b1087
SHA256293f9bc44543356fbce9e0a78ebd22b84ce7f2e4ad14c36946e05504165c7b5b
SHA512023bddcf96d5a9fa592447b3e6e6bfc0501dfb1f4ef716d264cb021d0b6d6d54b21c4f1a7339bad06d2b5ed19aacd62d7fd59ce04952178093cabd62a30331e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7ee14de4f5eaf6770b8fc61264fae3
SHA12da05ff15e8a6072aeb47986564c11de42ed5d5d
SHA2562bb8e99fbb25cbb142836dd2f3685c3c8819fb187faa49aad6102f52c926e1f5
SHA512a26aee6e07d4fb0f6e55fc90b2837ac2c1fe624dcf19951fc143e38347cb291886b818728874a1f1b14a17a46cd163bc982b26449a208d9d4ce07233d18cde02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59770e697a91b09e8fe633a3445c380d0
SHA19ae5837b06fe1254ca61fdaf8fc0a51b1986a3e0
SHA25601a41ac599dc3f724c9b6ad5a31eaa0484cde2ae248ef801703ae99a1f6fcc66
SHA5125ce171f62097c7db92426c1d74d7bb0f063f0a9610c1d2357be1925a45e667c26c874ac657553ce897a6bc5b79dd803ccb9ca1e457caf73f906c21302be32a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c80a676f0bc11692e9cc0a9538da5932
SHA1770331dda527ecb4424a5d33d9dcf9a7ba938526
SHA2560fdfe1d7206f2aa10eb5bd9884e4042372e50ee4755dfbc42c16cb883e973a40
SHA5125b52071c7dc26db6ca921a0289f948b908bb71b4554d4f0ddbe2ddf34884551ee910a106d3e42e81028a33b8dad28b9baa5f4d16c1022f131ebb1cf6fca6b4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526bfeee0cc21eaca3d9992715ddea3f4
SHA1decbeac3070e576d6c7aa35fabd4919df0f8a41d
SHA256e60a6c35a7d9d14c138eae7428e38038597299ddf4afd8e51e50ce8aeccbd329
SHA51266802935eba32f85bf0604e8fdc5111e30c328164d2ef5f560645d3c4edf5f6921df6256038f346c4ddfb9cc87b7f843d3f350167d49092c2272895751567d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782e05f7a97a52abd123a4e2dd3fec22
SHA1fed2bb1903526aa645fc6f5b4402c14086cfc874
SHA256cbd718daccbca43b7f14d74ab8f978dbc3a1e13fe37f21f659fc4a718a6134dc
SHA512ee89e2fa718352d5a6e63ce9827be1522307c6a79cb322dd0f0363a3efec19b40fdf52f4bdc8b2b92a5ac3d67b89247e371b8db3ca331bc66bf6c8251bbe596e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56971ad11b914188ac2fff6d0160e82d2
SHA1914de494a8adf8904b5675c532ce5c4b5d89c77c
SHA2568babe696da76d5130b73d82ab2e4e5bb9853b123e9b2e63e36484b8222b72882
SHA51243f6d341993b8d75f2a5fbbebd8f3f794649fe90195fedb6863e477fd252aaf74fa8af4dd7fe7f75666cd954afebcaa61bc33411856fd0537b52362fb9cccae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b131f2600ba72a30612a2a0ba2184069
SHA115e47dfb3ec08eca41fa8688ddbf820b8705d156
SHA256072116784ee82c45655093dce645346d7fb9dca068dda04c758c56ec971dc67d
SHA512c927117e0cec6c0c1d1463b987572107c9e4efdb59b807dbbf87df85b53d007533ecdf2e8efa0677104eef667bc86db449683708d54db3eaba061ce29e1bf676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae5eb949bf85d47e7939ab087491637
SHA1603824f45e5fb4965ced030370e56f78db8b65ef
SHA25661ef4f23470be991188b1a718322e89b1de782517e4a46522292f97d5c2a7b68
SHA512e811cd0117d96dff00875d05628b614be2b3fb7c9dfa63eee72810e6832a276f673032048c6723c2e5a9d9be409ee1f43a84ebc93de7568cc8ab9e5bddc6787c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a