Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 08:06
Static task
static1
Behavioral task
behavioral1
Sample
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
Resource
win7-20240903-en
General
-
Target
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
-
Size
13.7MB
-
MD5
08c3de089c96b058b4a27a1604389e9e
-
SHA1
561a7dc77c3be91f472ec17fc6f85c33ad084c31
-
SHA256
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480
-
SHA512
83fc0a319f05aa28255fcdb9aadb5b1967a7b8b4d735053ee4c2317721d7e4fc963a0cf131bf5b2c4c793224a774af76a7ca6f1d628abdb303a78dfb6a2107b5
-
SSDEEP
393216:S7B5lJw4/UFtJkQnBvZkWvhg3JFwN/0rc:uBjWwUFntZZvhg3JC/Yc
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4984-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4984-12-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4984-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5080-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5080-26-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5080-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5080-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/4984-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4984-12-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4984-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5080-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4816-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5080-26-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5080-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5080-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4816-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4816-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4816-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
Processes:
RVN.exeTXPlatforn.exeTXPlatforn.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exemain.exepid Process 4984 RVN.exe 5080 TXPlatforn.exe 4816 TXPlatforn.exe 3676 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 1288 main.exe -
Loads dropped DLL 19 IoCs
Processes:
main.exepid Process 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe 1288 main.exe -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Processes:
resource yara_rule behavioral2/memory/4984-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4984-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4984-12-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4984-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5080-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5080-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5080-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5080-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5080-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeRVN.exeTXPlatforn.execmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEcmd.exepid Process 2320 PING.EXE 3504 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exepid Process 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid Process 4816 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid Process Token: SeIncBasePriorityPrivilege 4984 RVN.exe Token: SeLoadDriverPrivilege 4816 TXPlatforn.exe Token: 33 4816 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4816 TXPlatforn.exe Token: 33 4816 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4816 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exepid Process 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeRVN.exeTXPlatforn.execmd.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exemain.exedescription pid Process procid_target PID 1912 wrote to memory of 4984 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 83 PID 1912 wrote to memory of 4984 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 83 PID 1912 wrote to memory of 4984 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 83 PID 4984 wrote to memory of 3504 4984 RVN.exe 86 PID 4984 wrote to memory of 3504 4984 RVN.exe 86 PID 4984 wrote to memory of 3504 4984 RVN.exe 86 PID 5080 wrote to memory of 4816 5080 TXPlatforn.exe 87 PID 5080 wrote to memory of 4816 5080 TXPlatforn.exe 87 PID 5080 wrote to memory of 4816 5080 TXPlatforn.exe 87 PID 3504 wrote to memory of 2320 3504 cmd.exe 89 PID 3504 wrote to memory of 2320 3504 cmd.exe 89 PID 3504 wrote to memory of 2320 3504 cmd.exe 89 PID 1912 wrote to memory of 3676 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 84 PID 1912 wrote to memory of 3676 1912 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 84 PID 3676 wrote to memory of 1288 3676 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 91 PID 3676 wrote to memory of 1288 3676 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 91 PID 1288 wrote to memory of 2208 1288 main.exe 92 PID 1288 wrote to memory of 2208 1288 main.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe"C:\Users\Admin\AppData\Local\Temp\012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeC:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\onefile_3676_133772547875567675\main.exeC:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause4⤵PID:2208
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
Filesize13.0MB
MD5e0942fdbdc1192816a84cadefe807f71
SHA17c9d36c98c7130cff3e9969bfbc380bfec193662
SHA256a14fc5e9ba72a4be06f6d16b3f1dc2a07f83fff13f14fb5bac95b6cac6c0e095
SHA5128e5cdb8f527e51dec180722e91c5f965418c690888998cf1f001426559eba9697c9ced8ed090740cf23018714c163c787745d0d9dc386da87d17b39900b6f827
-
Filesize
756KB
MD5d399445b035b99c4de849127250658d0
SHA141c15a5f765b7c9df4cdc89c42e105ee71284bf4
SHA256b1b8e5f4c7dbddbb74e19d6dabdf093610e82b0eca11a07998ba7fe67b52378f
SHA51272574483a3984ba7a6fcabfe8331b54b9a5f500cc625bf098507101afef8631611ca9c1eb2baf577209ed926b87e2ed6d2403603fc0f7e55b5819a734ed6c23f
-
Filesize
63KB
MD507a6e6dcc30e1c4c7e0cdc41a457a887
SHA153bc820b63d88cbe889944e242b50662b4b2cb42
SHA256746bc8fa88282afe19dc60e426cc0a75bea3bd137cca06a0b57a30bd31459403
SHA512837f1e40db9bdf1bc73b2a700df6086a3acdb7d52afc903239410b2d226ffd1dd5e8b5f317401bcf58dd042bd56787af6cdc49af96fcb588bcf0127d536b6c6d
-
Filesize
31KB
MD57f52ef40b083f34fd5e723e97b13382f
SHA1626d47df812738f28bc87c7667344b92847fdf6a
SHA2563f8e7e6aa13b417acc78b63434fb1144e6319a010a9fc376c54d6e69b638fe4c
SHA51248f7723a8c039abd6ccb2906fbd310f0cfa170dcbdf89a6437dd02c8f77f20e6c7c402d29b922cdaabd357d3a33e34c3ad826127134f38d77a4d6d9c83371949
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
82KB
MD5aa1083bde6d21cabfc630a18f51b1926
SHA1e40e61dba19301817a48fd66ceeaade79a934389
SHA25600b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3
SHA5122df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c
-
Filesize
121KB
MD5565d011ce1cee4d48e722c7421300090
SHA19dc300e04e5e0075de4c0205be2e8aae2064ae19
SHA256c148292328f0aab7863af82f54f613961e7cb95b7215f7a81cafaf45bd4c42b7
SHA5125af370884b5f82903fd93b566791a22e5b0cded7f743e6524880ea0c41ee73037b71df0be9f07d3224c733b076bec3be756e7e77f9e7ed5c2dd9505f35b0e4f5
-
Filesize
249KB
MD5c88282908ba54510eda3887c488198eb
SHA194ed1b44f99642b689f5f3824d2e490252936899
SHA256980a63f2b39cf16910f44384398e25f24482346a482addb00de42555b17d4278
SHA512312b081a90a275465787a539e48412d07f1a4c32bab0f3aa024e6e3fe534ac9c07595238d51dc4d6f13c8d03c2441f788dff9fe3d7ca2aad3940609501d273bd
-
Filesize
155KB
MD5b86b9f292af12006187ebe6c606a377d
SHA1604224e12514c21ab6db4c285365b0996c7f2139
SHA256f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5
SHA512d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312
-
Filesize
50KB
MD578e8049e26df6fd3a4011562ff8e74a0
SHA1d5a91c720e4672c40e1dd6d54b3197b4a1f8b633
SHA256ca106e4dfdeafeabf9e98956d3d8d0cb73e109f1a96f1a7e35bc47dbd7c7e164
SHA512ea7a54d38cefed870cee65dd9460b6c51131ae5219933ddc998a86d12bb093784242cb5471c77bc324ccf59fa42c2914865dcf582f74c440fa52b7d15d9faeac
-
Filesize
77KB
MD5b77017baa2004833ef3847a3a3141280
SHA139666f74bd076015b376fc81250dff89dff4b0a6
SHA256a19e3c7c03ef1b5625790b1c9c42594909311ab6df540fbf43c6aa93300ab166
SHA5126b24d0e038c433b995bd05de7c8fe7dd7b0a11152937c189b8854c95780b0220a9435de0db7ac796a7de11a59c61d56b1aef9a8dbaba62d02325122ceb8b003d
-
Filesize
174KB
MD50f02eccd7933b7a7c2bdedca2a72aab6
SHA10b4c551d8fe34d8128e5cf97daa19eb4c97db06e
SHA256ba5388d6a6557d431e086734a3323621dc447f63ba299b0a815e5837cf869678
SHA51290a64082dab51380e05c76047ee40e259c719d7170fb4acb247b68a03b710461b350da3821b426fd13167895ded32f9c5ec0e07587ad4125683a18a3495f5ed5
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
24.4MB
MD552b9120d93d4a341c663144b07313d4d
SHA1a33006a2b2e9c4714b030f2aef8e5ca51bd7422b
SHA25644615bbdb677c2e7f7637fb7bcdadd750ebda5cde160007896a0d7e57294e80f
SHA512f2ce70930559a3732b5ce1bbd0abd0b051308d319f87c5564a423e1fa24e2331e7201ebbd7604c3787b342414be7e9ea08c95b920846f4cd9c6fdfaaef855dd2
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad
-
Filesize
29KB
MD5e4ab524f78a4cf31099b43b35d2faec3
SHA1a9702669ef49b3a043ca5550383826d075167291
SHA256bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90
SHA5125fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee
-
Filesize
68KB
MD58abec469a3806bae52f93bffe8ffe890
SHA1eb0314fb48df6fe03e4e58bd2d80b4c82a746656
SHA2564ed8e059a0b8f7d8cb96229beaaad7bee4a89d5ec5aa978e64b842acd470c180
SHA512a1069e47bd1fe10c707c40cd28f3532eb621db1f750814bced49f066d4e7b5ff2cde7098c744e45951ca027534ed80bb92d2bbe38e8e7371d652547f4c913b6c
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371