Analysis
-
max time kernel
67s -
max time network
69s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
b946240db5c9341fab1ce5b067f750288dd6032fa1d2b3f0e751e40f32a0ac7eN.dll
Resource
win7-20240903-en
General
-
Target
b946240db5c9341fab1ce5b067f750288dd6032fa1d2b3f0e751e40f32a0ac7eN.dll
-
Size
150KB
-
MD5
6b11b42094d790b2bd683bac405de5d0
-
SHA1
3bf0b2c7308139a6a0021f08fe2ddf0fc61353eb
-
SHA256
b946240db5c9341fab1ce5b067f750288dd6032fa1d2b3f0e751e40f32a0ac7e
-
SHA512
d2eaded193941084eae05c1853def369ac891e4e131cbf9593cf00b19ac76e89664622bc7aad278a92b5baa92f589bc27198569d485746cd928ec652c506cad2
-
SSDEEP
3072:o7LTNzNup4hAQHnLP+VXmwxCtkx5KRmVnBWf9/axwfF/:sLTfuCnj+VXmwxh/RnBWf9/ZfF/
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1544 rundll32Srv.exe 1960 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2516 rundll32.exe 1544 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/memory/1544-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x000b000000012029-11.dat upx behavioral1/memory/1544-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1960-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1544-10-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxA7A5.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22463871-A6ED-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438234156" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1960 DesktopLayer.exe 1960 DesktopLayer.exe 1960 DesktopLayer.exe 1960 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2516 2364 rundll32.exe 30 PID 2364 wrote to memory of 2516 2364 rundll32.exe 30 PID 2364 wrote to memory of 2516 2364 rundll32.exe 30 PID 2364 wrote to memory of 2516 2364 rundll32.exe 30 PID 2364 wrote to memory of 2516 2364 rundll32.exe 30 PID 2364 wrote to memory of 2516 2364 rundll32.exe 30 PID 2364 wrote to memory of 2516 2364 rundll32.exe 30 PID 2516 wrote to memory of 1544 2516 rundll32.exe 31 PID 2516 wrote to memory of 1544 2516 rundll32.exe 31 PID 2516 wrote to memory of 1544 2516 rundll32.exe 31 PID 2516 wrote to memory of 1544 2516 rundll32.exe 31 PID 1544 wrote to memory of 1960 1544 rundll32Srv.exe 32 PID 1544 wrote to memory of 1960 1544 rundll32Srv.exe 32 PID 1544 wrote to memory of 1960 1544 rundll32Srv.exe 32 PID 1544 wrote to memory of 1960 1544 rundll32Srv.exe 32 PID 1960 wrote to memory of 2564 1960 DesktopLayer.exe 33 PID 1960 wrote to memory of 2564 1960 DesktopLayer.exe 33 PID 1960 wrote to memory of 2564 1960 DesktopLayer.exe 33 PID 1960 wrote to memory of 2564 1960 DesktopLayer.exe 33 PID 2564 wrote to memory of 2540 2564 iexplore.exe 34 PID 2564 wrote to memory of 2540 2564 iexplore.exe 34 PID 2564 wrote to memory of 2540 2564 iexplore.exe 34 PID 2564 wrote to memory of 2540 2564 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b946240db5c9341fab1ce5b067f750288dd6032fa1d2b3f0e751e40f32a0ac7eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b946240db5c9341fab1ce5b067f750288dd6032fa1d2b3f0e751e40f32a0ac7eN.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aafa52799f30df8c51f6da3dad5c979
SHA1108156fdbf0d297dadaa531a65e461442dbccd92
SHA256e094755381c2740acdcb97dc157d45aaf3f7351fd47275b3aaa2d1928ed5f80d
SHA5129e792206e97863156bb0ed1e52e6ea3d35e5dadfa94173e243e5bdb9121614771d54f187afc0a923e1a10081db2d413ef9cddd57c3e5fd5948fec1c061a158e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe28ffd3be11432aff1f642b5c661b8
SHA187ebcf3c9ccf2f0226c42867983b9818bc0d1ddf
SHA25669efff520e54f9d983f050374baf413a0aa32e1fc714ab1c4d5370acf3b77f10
SHA512b5c77927ac32dce07a24a82358d67f274159206fc0a3247dc9e3e3bb380eea17f0ca5c910390ac1bb1a2f4687ceebb9a791b68e29e1a025dbcc1186c3df67207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd082e3710aaab626b395c46b282a06
SHA15501bea1d971c7362fbdd1390e1234c1198a00aa
SHA2563e45b49a45d87b16df05eff7b08cfa437f488faf4856ebd39c3c4966c4222100
SHA5120040c6c88961d94b6a581a5eede5eee9478a51a7c7cea5a3d558b1be89f2c8267399a9c2b734e8a14fe8488cf1232b0b7f52029ddddfdc815b29fe7589403933
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586882441e81c4aa9185544a126241a8f
SHA1e64be94673ab7369bbb6237496322bb4109978e2
SHA256325f92f93e5421f391d5ca323248945717870b766eb4748ef7000b7262386f9a
SHA51291b5cf4cc7cdef63472889535c472b16e670ab59bae5dcfa626009f63392a792054bb7089e0c3f26c26ee00d895067ae3678224eac8385da5b497e5458c68499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514bdd59ee0b670dd4455536b4264ad8a
SHA1e1b4ae750501057d507e4afa661ee0ec5e0824d6
SHA256e4f4eee25304ade3decf6db2e45b2ba9b8b6acc8195d5633dcd48bb9ed891766
SHA512f9c613d801794a9996b35436dd6abe9680eeb799738d1b90be5a8e6c4f4f83e2de9487f72a18d8d0e99d713c08c843f439e182f26dfdfe0149fd37f8ab24b1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487ba723bb5cb01564aaa2b1088a4b72
SHA17dec77469b093554f973ab4cc6fa115349a74006
SHA25694c5182ff5db04600b3171cbd348238b170d6311a6b84b268628a926ede3c9db
SHA512c28193b6e632742763b11836b0725a15bf1fe2bb1dc04576beef392596af22b7ada6c3ea28a2ca7d0d092b6e372725f190ce49e9c8909eee03d83b50ba8a391c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a98a4af12c92c40aa7fd6123c9fd6844
SHA1994f65b2990d280edcd50a6b81a15345927286c2
SHA256e0372bc48aee05542707a5fbe18528d29764da3a79e1e98f710cd4f5b0dab9f4
SHA5126030e1e0166428023c619eaef7671c2f5f260b51b4210324aa27cea2835e4df554101315df2db4899d37a8c9c11afe588892b5408fcfd8171eed7078fd3f3e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a60a7f6112332756464d342170d946
SHA1ffc8ac647f28b45f08283654721f76b93aeb827e
SHA25696e0e40134f5d918f49b1b7089a25420edadaa1256c4dc28200d041f23187117
SHA512384d7821d6e50792fb9a76826390487634cb6b8cea70559c8e2b262a75b7be9caa2811eb1eb93f60135a148f138e9c35f988625f729446b3e61c7353b04206e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d8ca68f1dee3122e330a7d1d2af9d5
SHA17402479d498dd832308991f5bd82ade52ab3c813
SHA2565228f5714e86d3016f21cffb650e0068ba9d9c3ba0508075d6b780fc39a643c7
SHA512deed2c2eff08f017907eec9396eeab54b2cd79a6642a0d407a7a72a588253cf86c2248faaad4414398c49580a358433e399fb3b790aecc8dda7303eec110a17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5142a2e67bac6ca9bb9a3c5da0b9a508e
SHA1d8f72b59726e72a732122088481c07ead8e7d79f
SHA256e87be6f516c1564d7875e27c6bd3bf0737a9a6dc3eb3d9a7795d9038f1af1f8e
SHA512045a2b8dba64630d854a6e665dea0038b0d87a6d72b61acb68caa185701a0508c5e25129ef5f482ff47349ca0d1fe78c6b84e1ee493284bfb4dac3fe296ab80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be02e98940ed434f7963f172fd0eda75
SHA1435e0ce802ee1b676966fcbf78cd1c315e189b69
SHA256de0cc987ca088db83b9bfc57beb8149adb5dc36b777b57629f2dea252e7def6a
SHA51206c95ff81ba5393c64c6d6f94736924c14fa27579e2918227d23bba5deb64eb9d9fa298972f564cf8b1c1a919927e3aa37ca8ca39b21209edeab48c47d834157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff916971d4b4f9a31f0294830f69e527
SHA1b4644ff901555bf2365d75e851df70f929f63b88
SHA256a9e616d03ba4dd8ecc7838521f7edfde5ba330bde29e2e9cf3efd364a2e9aa42
SHA512d39793504659d7fc7f3ac0a27271e29dc79708165b2b7f02e63dfabcea72614ae5113b1d58ce2679e6560b3e98421829eb443128a2b227a5e201f0ab2d5c2939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5537280a6a74f8bff5ea856cf9b8c4347
SHA1b12b9de4a5ee95a9a0cbbd7e6b246a738f21c01e
SHA2567855b79f0084801eb541664efd0e10660bf5290de1943ae81e1f9d7ef1f27341
SHA512b16659f92c1b459943c1ed16e5ceefaf7ecbbb42558c45bfb4b996f0261574346deab92a8f7c8159adb9fbcc83f23ffb7c5369a39f0077d339bad12268a3b14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b521bd1d5a96fb1bf2528ef6cbf1747
SHA1a33d7ddfe712675bcc9aa096ffda2716f053adfb
SHA25667c7614e9d8236d7c635c518183a53e0a609c3736fcd91ca18083ffade74315e
SHA5125c13325a1d2252f091ea29fca4aef752a0e0021931e0db66a8e91e6480ae9d75a823b38c5d7a9fef73ddc2b49a13ebe7bbef26749b02074a6beff48b91b1ff38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f6170332e2e5b923feb2c1ac09e22b
SHA13c8050b059b1d6ca0cc160026a310306ed3d3350
SHA25673b19f72a21671896473f370c913aa77488306033811d2b8ddf88fae1431c070
SHA5129c1cfd5291570f9efc81118e7958ae8e4450f15e6019a4ed32221b707db8ffc0dcc4415f6fdb411d654343ef12376a47e112e2f844a827aa4551076ce61c3314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6c2579d5860e5473701b15d9319c0d
SHA1267bd87078e1fd0c1965302cdbf47b99fe5b2a66
SHA25602bfb6f6dc41c111177000ac6d9471bff0abe0b0d42308578d323d3b95cdf0eb
SHA5123d9fa02713e9281119fecc82f0a1c4e0b8880f8e023fd4677c44bb9042c82ff400f546543a0ce86eff1616a827c668f609941c1890ec0126c43a08e60c4a93e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ae7ba87b6b267505bd5ecbeafb16c5
SHA14da0bb4ea853e801c94628f40d8fe466acf82fce
SHA256d4358670120dd101acc8175158a7ddbe532165abe6e4df9c5da371117294b68e
SHA512e0c4c0211e9f3ab6034984bf306a03c88ea23498cc9191d1186042fa341e2b4ecccabb4c2a8f86a4907363dc4123ec96a823aebc73d2f39806ae95fb877926df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a034c597a701aa60ee5cbfc606b0e29
SHA19866a00c508be61289e9267e1fa15dbab59a73ed
SHA256bf0976414cd3cfadd154458f231f258156b2d9c3cd17e1ce3053b4d1465ff08a
SHA5123e5c5b56c90a79cfa45ec5df29affc3846ce35a00ae4664880f857cfc5d851f01946795e6e1fe94774ef36e933a4f6e8fa9cdc2ec2517283307b7256dff24d68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a