Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/12/2024, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999N.dll
Resource
win7-20240903-en
General
-
Target
1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999N.dll
-
Size
400KB
-
MD5
9af9640d3f6cb20a41f1a54b75cc5750
-
SHA1
5cb3ca3cac330086463379aa74b77bcea1d31a65
-
SHA256
1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999
-
SHA512
a5b6e45b61d76e12ba8a926e532c870c94dde204e22ab5d06a2062498dd54be25cb0ca8cd118e142d8132ef07c28ca92b9ed4361684d184b462f8fdd31d8cdb9
-
SSDEEP
6144:ScV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE/99y:Soz83OtIEzW+/m/AyF7bCrO/E/n67
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1624 rundll32Srv.exe 1224 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1016 rundll32.exe 1624 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0008000000012117-7.dat upx behavioral1/memory/1224-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1224-15-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1624-13-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px868E.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2032 1016 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23126E51-B6E1-11EF-A3C4-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1224 DesktopLayer.exe 1224 DesktopLayer.exe 1224 DesktopLayer.exe 1224 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1016 2124 rundll32.exe 28 PID 2124 wrote to memory of 1016 2124 rundll32.exe 28 PID 2124 wrote to memory of 1016 2124 rundll32.exe 28 PID 2124 wrote to memory of 1016 2124 rundll32.exe 28 PID 2124 wrote to memory of 1016 2124 rundll32.exe 28 PID 2124 wrote to memory of 1016 2124 rundll32.exe 28 PID 2124 wrote to memory of 1016 2124 rundll32.exe 28 PID 1016 wrote to memory of 1624 1016 rundll32.exe 29 PID 1016 wrote to memory of 1624 1016 rundll32.exe 29 PID 1016 wrote to memory of 1624 1016 rundll32.exe 29 PID 1016 wrote to memory of 1624 1016 rundll32.exe 29 PID 1624 wrote to memory of 1224 1624 rundll32Srv.exe 31 PID 1624 wrote to memory of 1224 1624 rundll32Srv.exe 31 PID 1624 wrote to memory of 1224 1624 rundll32Srv.exe 31 PID 1624 wrote to memory of 1224 1624 rundll32Srv.exe 31 PID 1016 wrote to memory of 2032 1016 rundll32.exe 30 PID 1016 wrote to memory of 2032 1016 rundll32.exe 30 PID 1016 wrote to memory of 2032 1016 rundll32.exe 30 PID 1016 wrote to memory of 2032 1016 rundll32.exe 30 PID 1224 wrote to memory of 2256 1224 DesktopLayer.exe 32 PID 1224 wrote to memory of 2256 1224 DesktopLayer.exe 32 PID 1224 wrote to memory of 2256 1224 DesktopLayer.exe 32 PID 1224 wrote to memory of 2256 1224 DesktopLayer.exe 32 PID 2256 wrote to memory of 2928 2256 iexplore.exe 33 PID 2256 wrote to memory of 2928 2256 iexplore.exe 33 PID 2256 wrote to memory of 2928 2256 iexplore.exe 33 PID 2256 wrote to memory of 2928 2256 iexplore.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1420fd484ec6a64977a796034fb7e575a1970533135d6cc058c98719e4530999N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 2243⤵
- Program crash
PID:2032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51121a943bf1f3494f64cd03101bd197b
SHA194085cb5040228c051edec8d96d7fb4d521ef875
SHA256a2472e8bc7274f72511836bf33239917c07e47b6d80cae640e6306558ebad413
SHA5124257bac35c96114557f9f860ded2b87f95002a737f3e0febe5fdeb4ab9f03de6370209e8c45721ba37dc240d8db2c5abd014de4913109f896ea3aea119e4c95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8c3a216ba5865be9f1edc029541d8a
SHA150a74af5810eefeaebc7f7216066a02ae1cbc16c
SHA256573faaa8e2f36f072a0b9e0a59fcad7bfdfda10d2b85a42d233b3a6b9cfb203e
SHA512b8828222b718f5798f9ee2fbd413bc8a0f9568c480ccbf0d9b59698071066c41d2a68439edb3094521714417a4b554fc882cc9341ee446f214d5c92855094f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d3dd469281cfa89595097cc66f3788e
SHA1caadd9527d9f5cb8530a3fb276ff148c7b14147b
SHA25617761ea2ab7c87d1f1373763c0a20a60bdac45d300fe8111ec292b58602689cf
SHA5124d58ea741337945adcded9a27b193068fa761f3e1fd600a84365b05073823b3aab96a04c4ada9232ff1cfdb673251bffb1b3ab92991fb0942b84aa68fc1f20eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec72d43252e96fb619074e39ebda928
SHA1f1630428443f7fda159f86c83bd4c404ec44b16e
SHA2562273668718fbabd434619336b74dbf44f757cb9b7c1ef362d5e978762c8a6fd1
SHA512760c3b3791b8f8dd9e9d38f23e83a6fc987d84f27e1ea16c5afa406c3abcf590d854e173d8908dfcde0c926505c7cd4e17791cc64ae42713d3313b89ecb83b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e01e7c843ac7e59256e620e784e667d3
SHA1bc1aa455e3cd8321e7907713ebacfc68bd0bbfc3
SHA25677c8cef600dc1621af6749f60e06092f7be17427a9addf4148cd212055a21804
SHA512de373c59540a8b8a21aa2db76c3233a063498a1e5d973acc000c0d9b287508c12d1486b1159dca9fabe3bd0bbafee808d10ad74721937d364a5f7feefe22eb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fdf8219c6f9af962744a44cc9e8e17
SHA15bd0841b7bf39e3d07c6414b19b96e81f6d81212
SHA2563cdb30964e70fd75f6e8b9e95b235c8c2410e0bcebad029cfd355b1593695879
SHA512bdb34aaacce968d5739593312d020c9bef5e15a6c3f70407fa9df98aa26e8b564c4ee91084035d59eec0b3326b630871af7aa9e38b20017bb0aff17b7a1d6d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55489eb239904583bb74e56fb7c62b2fa
SHA139fa7d3770fb21bd43b1ab04329448441d5256b6
SHA256fb0e0fcc1f0b38de6367b6350b9b0da9237f5add5b5cc0054fad363006964b14
SHA5127561356a8e74213792c0bc7d3a4ae923c428841ae244eef2c8acdf93d0b64b9471bc29dece51fac920488cb2f9fecb889b7f0c9b1bba536f66186c294b2ffd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6a4053c8bd9df38bc73e7df1c124788
SHA1d3aef8b21e62ca317b90dd0ba92e57fcd25b5d50
SHA256787b014b4f10372616b0061e350ce9e69880f993d416df672dd8f47439b6617b
SHA5121c14b2550ad5fd29568bfe5bc6ce1f3f0f5db4a2168d871cd6e1ea9b5b5b6b09efe9df0b9995c22ec7b6cc384455e1c206186ee1625c4722720ee0b6a804bb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5374f1ecf199454d131f3e2eae3288c8e
SHA101a67de44868ed2f81166d780189dcd039f7b634
SHA2567a6c7067899dcf58ae66607376b9a11b0f045793c5734a442d19e2bcc3829c4d
SHA51220b9c3f8ca59265fe446db973de6b0fa18ea78359c8e2aa463024e2fbafb38a2596baa68c51409de3641f3aade395b2444b4ef7e4be9e391caea80d4e365386c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f74c9ae9fe058cd39fa9c74e677fb5
SHA1a0dc430473816085d175b87849215e52adccd681
SHA256000120635a163a09e90b46e2351d0473d75925767d1727191ddbb66cd286a800
SHA51248bb96d769b92e6d50e8dc3b2ebc539b68a17c2cd93282104186169e2a5462090ff5bd404a020ebde8663ad89468a139da769a5458e9d6ed13d3d81507442957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569ec28e3257a8832bf05f7faf6403b66
SHA1c8d5a37bd4b35b511bf1f30a11f6201353a24107
SHA256b109a23220356ac42ed574b94dca46414aa551762468329e17615703a89f6307
SHA51276b017bdd6f1d8091ebd52d98db473d12beff81baf5bf4a43978ee59ae3f4593d5e66909ddb46ecfa04cb814e08a294504f52bdabccc7a636ee166f7646b54ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301a7a764c9189f51e162246e5a6af77
SHA1768cf5a4eacbf3eaa2e5add3a1ea182704b3120f
SHA25681a6a89f27e718609cb4fc3268a64b4fed34805d12a269850bebb210d73a0fbb
SHA512936259b24703ed97bf3a829f0b644d89143ea3a9087471cc5a19675768e1e9efad4441378addf3acf2848831fb162eae847696cc264e0f348e9937a3bdd29a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532a66b140944a2ea2558b683f4f94c4
SHA175ebbb7f99b63cbb3667b4bf9a0c8550c2a9b02d
SHA256885cf9a95fbaac74aa95b21893b9ada7f80761e6d7e414feb532239638f34bb7
SHA5120577188567e4e4ce9f595031e07365fab4071ff56012a59b6ca7bbab23418ee7b58ca7a990d4a300dfe6837e826f84689d88186a31c925dce8af1cc3694b957d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55105e402d0764c4162e0e69e63678976
SHA185b305af303f25c24f27871853f9218149a2774e
SHA2560873daa29825de8b32fd9260991b8a0f09ac9a7acc8369c456fedae0157e94ad
SHA512c41fc515606c8529b2230ac8550e041b3ac30d8d42259c45e77010cc107af6a3c7b012edbf4dda55da4d7fcb46fcf2f6c492a081e51aa671837a68cdc545f119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa971fee72b12816d5d494517d658fc8
SHA1e07e4fa77eb782546e30eed84bd57e34cbfb6893
SHA2569ec084c6df60e1516198874a8850272398ad68a8e8e66cb06dffaff8e3b00232
SHA5126695f3c4b40d724954e67359b2ebff16dad6639026a1b5fd61f074fe518185d1d3cc30813630e00a0e58324f70e8b50e8c36fd280032cadcaa19b18705d73619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567e6cf230a2d7c861d023349a80425ae
SHA1c5bd0ba6ebf6f1fad4615607b1e2b74c680543a2
SHA256f53f761cb5aa9de527d19bffd26a41a5de138df425a870c0a32ffbd5b0af3135
SHA512269d32872606507edbb3938601140e87c9c41bd1f1d5b6f5af287787d2a6a26849c03b1efbdd10b35c21e818cd6ebf35e8ddb6e9a90c7448310fff1046506056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553a539f0bd53940c7bab68c135f542a1
SHA19b0c51082871c13ae533ea2bd4cc813e5e6c653e
SHA25668af93fb276c49ef562c996c63ff2954696c27656c4fff64bb6ac62858e5fe47
SHA51223d065cebbfb9517d70eeb7215df03339e2377c80922b1f865127531ce968016cf5032e17a3c4f01becafe1765351b22e6917bb89b2d0b1b7f81b4b72bb5812c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5122e3f1d32c2ab852a2fc1eddb00b02c
SHA19e6b21ec5ca7fa942282529d702855684575f39e
SHA256acf985e190cc1429e77664ab1e7cb25357dce912d879cda53693dddb0a5c0dbb
SHA512149afd0b5b712143521322e4f2dbfbba36915c3a03329af3db886da104a75fd5d0c12aad7030c3ef01136570aeb2a1f2d0d47386e4f38331103e2f6fa5045a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdfc46754504fd0216a876415cb88a7
SHA1c4a8f7808415521f9e3db6f6ce69f0e430310de2
SHA2565a831624ac1fe8bb5ff0f3fd7a01b17470e6d900334ae24305418d49f39402df
SHA51236dc08563eb6973ec49a294cb16d1ada00e18e3f310778a883522f30efffe6418555cea78c99215ea1c46fb71d09c0124532c2beda99047e96924c7d657a250c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a