Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
0989c5dbbdccbb2e08fe7a29a62771f7f4e36813d59ddedc2d9af3342d5d7756.dll
Resource
win7-20241010-en
General
-
Target
0989c5dbbdccbb2e08fe7a29a62771f7f4e36813d59ddedc2d9af3342d5d7756.dll
-
Size
150KB
-
MD5
392f25e6871b4dc3f00bc031d36a8c15
-
SHA1
17444eaddb2dd694c94413df1b18f9382778b770
-
SHA256
0989c5dbbdccbb2e08fe7a29a62771f7f4e36813d59ddedc2d9af3342d5d7756
-
SHA512
8851dce5aba3b10170d99e8de7d953dd81b78add5d583757f0d29fb0f8cf580ebed41feb6a77b9bd775e25e80a23ff4ecb5d4754868bbf0d583ccecacaeca592
-
SSDEEP
3072:k7LTNzNup4hAQHnLP+VXmwxCtkNPG+XhZ0pi58GANtvgRoA:oLTfuCnj+VXmwxh8Eupi585NSb
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2484 rundll32Srv.exe 2952 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2376 rundll32.exe 2484 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000a000000012254-9.dat upx behavioral1/memory/2484-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2952-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2952-23-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxEB97.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440155117" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B78919F1-B865-11EF-96DD-F2BD923EC178} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2952 DesktopLayer.exe 2952 DesktopLayer.exe 2952 DesktopLayer.exe 2952 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2376 2916 rundll32.exe 29 PID 2916 wrote to memory of 2376 2916 rundll32.exe 29 PID 2916 wrote to memory of 2376 2916 rundll32.exe 29 PID 2916 wrote to memory of 2376 2916 rundll32.exe 29 PID 2916 wrote to memory of 2376 2916 rundll32.exe 29 PID 2916 wrote to memory of 2376 2916 rundll32.exe 29 PID 2916 wrote to memory of 2376 2916 rundll32.exe 29 PID 2376 wrote to memory of 2484 2376 rundll32.exe 30 PID 2376 wrote to memory of 2484 2376 rundll32.exe 30 PID 2376 wrote to memory of 2484 2376 rundll32.exe 30 PID 2376 wrote to memory of 2484 2376 rundll32.exe 30 PID 2484 wrote to memory of 2952 2484 rundll32Srv.exe 31 PID 2484 wrote to memory of 2952 2484 rundll32Srv.exe 31 PID 2484 wrote to memory of 2952 2484 rundll32Srv.exe 31 PID 2484 wrote to memory of 2952 2484 rundll32Srv.exe 31 PID 2952 wrote to memory of 3064 2952 DesktopLayer.exe 32 PID 2952 wrote to memory of 3064 2952 DesktopLayer.exe 32 PID 2952 wrote to memory of 3064 2952 DesktopLayer.exe 32 PID 2952 wrote to memory of 3064 2952 DesktopLayer.exe 32 PID 3064 wrote to memory of 2912 3064 iexplore.exe 33 PID 3064 wrote to memory of 2912 3064 iexplore.exe 33 PID 3064 wrote to memory of 2912 3064 iexplore.exe 33 PID 3064 wrote to memory of 2912 3064 iexplore.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0989c5dbbdccbb2e08fe7a29a62771f7f4e36813d59ddedc2d9af3342d5d7756.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0989c5dbbdccbb2e08fe7a29a62771f7f4e36813d59ddedc2d9af3342d5d7756.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b1b16878eb87f6902d4e2535a02e6d
SHA14e5686d1f97e29e2dd9919f8f984ce3d682fcfff
SHA25622f9fef6ff524aba3a45acc0d25acabe6fdd9f6c1bb6210f9201fe16907d9ea3
SHA5123643ee3984ab777a54996ccaf9731cc4c964eadffc3cadd6f0fe57242d05c96d8e8a7f8e143dadc2a200bdbfe9cd8104853e594edb9060bcedff207100c5cafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577eaba50bdc42c19fbe6b7e8c24ad385
SHA169627464a18cd763944f4465f1751fc26b4995a2
SHA256cd3eb69cff0e33f6e6eddbdf5ae0e0b393cb725313aaff658c7def5eb2942f8c
SHA512f6b47b3e7009cc1efb0cac461d45e810e8c5ec518a0253afb6318c92fa097c0767a34a97a4dbe54345de96c38ec5b1f0fe37b0f2a5193705e650fe1cf7d2ea45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50e5c71a61cf47ec0085e64b9d85d60
SHA1ea6bd6a3c93c46280ca90508fe768c74f3f9d2da
SHA256903ffd3b1b9c48e5f4c252739927768653df06b966159331aded330803bb9441
SHA512ea3ac04b23edd9077bf237c467e9b6127b3592c11241ff62e7827a917886c8bd44fdec84bde1c643098f8149e3aa896ea90235ffc80f4fd2664dfb66a5aa9eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd551ddf7a8acb12c811136fa5a0c69
SHA1d7e03887637b7c8a5ff34b6adbf4eee4e2365407
SHA256238ceb4dc23917021e62710bd4c3f2c85b6dcb623b019773809dae2d9b9b2a9a
SHA5120b6529e377b729a12573e6d32a3e2a2d5cb59889cb4d9b9567436efab151c5df761373135a3326371cc8e09e1d3a6376ead7d84c86c80cc965a8e849a9241e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c836843e297dbd942d507576067d7080
SHA1b6247ed295226ffdf43dd689e4787e96750d156d
SHA256d7f9108e98a820260ab889fb85a01106680030d318cfb9ee08dfa1b8e528e4ee
SHA5124035b360abbea625337c020f09535ab936b041eacd4af1fc51ca76d7cbb030324d6f52cbebb8774c4c69722bca5c279deffdc61dc82e9cd5c278389e5ca81c0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e6bd48a8bd273d5fe2937ea3700360
SHA111672daed855e817326b990df18e7d1680bb01d0
SHA256775ecab00173539be283e67d963ff1065c77ee2da462c0a946354ebb6df97759
SHA51252b64846797458ab9631f6161dc7f005f8e6584e537a84d341385c6ffb2c866630e9a7bdb0a53a692cf508239737c59ca57a9a9cdded32a14c6da928931a3a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c4702426b8482c74f13a8ee023f25f
SHA167eabfaa35f4a5acf2f4c5d1583b13f57aa97e35
SHA256bb0df6df5c8b22ac320f4c405fc563df589c20171126cd4a0f11a975079ed9fa
SHA51239dcaa5e27f5da5783095c18af964aa4441d8a97050fd6b5b9126eaee0c2a042a97288f34f3066ff78286ee5bf620f49f2e475e48709cff12358f12f0ba8ad16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126b20765ea18be661f642c46402ea55
SHA11314a6e9364d6b6352d431221ef2a6b57a24aa33
SHA2564c4f02d0bbfffd6b11b08d10db4ed827c79732f1bd0e80b945cb0195139b5d76
SHA5120fc1b7da4a8c7986757932045bc46b7727a35718d7b05350f451decdbe94974be88fb91893ffc029427e11887c662073adbec989313b9a46913ccfb28712fa9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518b8b2438386de5d8f4a6a9e27c2097a
SHA143908974eec75c3b61acbd149e75f23867ee6463
SHA2560dbf2b86710405a44a2412a0e033c1ae995f5407a5a276e83471aa018a5c33cb
SHA5122c76b4b3ee07bae2909d89a514cff38d4fa53b2ebb762e63382dc02f9a920b7c14482450f08d882156fcace20442d6f86eaedacd2dd21e21ba850e222955bc66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe83777b710021e86ea1e004c7f54ca
SHA10bfd32da240fb1bc23a23caf30c0c06fd15879fa
SHA256c4335e67b22b85d456e2607d384672215cb8c053d9f7103136f2d0ac2d163a77
SHA5129c12777e429ae644344077a694c4c0d5c7e20b820b871cf61557948ae2bff29d5b6485b22a0fe2dd7205fbd18410715ccfe41355fe658da6fa96856bf82db32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58732e5c2a8840f2905a83c5d8b294ffd
SHA1cdd4163a88e5cd9b817c14a780067962ddaa0d49
SHA2565e86970950603f8c92b2e868865c5ab5a332d50e741e7e43e4c67b739124c868
SHA512ab698bd544a964a1fc195429aeaffe2c47e27d66f1271bfd7f00ef277fb1b82f851eb9c12122645b7162c2b1a23ef303de93b5216861e3d045e446d42a6ac7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf06d69f19b16a76f150646ba41ab9bd
SHA1046e66022f56cd9e7e15217fb53f65197132e21e
SHA2562c87d02090899833f968a804c782054334c3aa256b740b7e1fe551b27b63c232
SHA51293b0330a7953b2c825568ba56bff41406fde53abf4b2c2d767a6de0cdc5627d1f1b8cb808a440f79156a8d63d697529818c8e0bc797a8dfc8de8204a1f141de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73269e04238f335c87d1133964178f9
SHA19cd6e992fd99c178b2c3bc593980f6796cb36129
SHA256e59055d45c63ff526542a2ae1ca55c3cd727d2ce5838f6ce4b1460da7a0812d0
SHA512d1f72d5716eea40da2ee4bb465b8e9d5f08a1b818aa8634c8d5e7f609d221f2d1443c5ab0e32b54913039756d3cc88299f5c2a23c413319da789ed9cc7ac7f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b29bf669eaa41cedac69c137b4f23c0
SHA1163d6a0bf47f818928e7e96541530bd79e522a5e
SHA256ab65eb3b8df3ffc868165bd11a19ff45d33649814416d615c5108a22cd19f00b
SHA512591062c732c70de1708ca58fc8e570eb7da55d2f2d99aaf947b22cb589df495c49528181b0effb53aa3da733c77868bf1da3a81deb63d5f0cc808dfae9a84d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9a5853e5e0cb943a6e474ed6c0cbb2
SHA1761f3d675ed71a19ac795f0c9edb8e9a0e0629ae
SHA256729fc5c94453bedfe9302645cdff7e3a200478f8d557a4fbab9f827100434c5e
SHA5125a5620443fd9ea12d2a79ba516c4ac455c82d84497d7464b2d0441aa2d0443e44a7d805063284cace2551107129bb98c367a01d8961c96ab4e652b08e38e95e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512f32d3451408d3cbef02007778eeaaf
SHA1eb455250e1afb4daab009328779e6b51e4da452c
SHA256685f0b0da54ba74761469289eda26f81e2999106e6076138777f722ff6764d59
SHA51249f30ce2ce9013899df66a9ae913fa2d2782554ca3ab671a49308d6ddf090109e1d509bbeaa3899d3241b486cb6f65be35db09655df1376543562f0639b8af03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53303ce18e7d02dec326513d3b6021cb8
SHA1f81db40239fcb19c0d0231c2412c77de0763b609
SHA2564ebebff88b3312d4dfc8093b093a6802468e54700a792281566c813811921e45
SHA512ed65e1c61afda61337215e94319b94d1d3027596459813a5a33eaacd8ba6f4215c9d0e72f2a09afa75a1868943f1c4bd34d202fab01c9d93cb0feb113f9d1ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58078b8e6dfaf4244bd3092d7d14a92e8
SHA14e0ccdfb8a111d19e0fefee0fa95f1f67f603f90
SHA2563da5e5677709d97b90aaa7ad06ab0ee935a4beb3f6c6078bf9a0f98f884e3388
SHA512d861affda802a601be48f3d4d8317b335f11630d480506cefaffcb1ce4e4bbcbd82ce53201ae3e0c1f37303997d3b3cebb09f254ae5ea4659c1ae5a35a9af3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5e76c1769197495855610106e1a5c1
SHA1ac9c9edd684a774df2a7822da4ef89b969048194
SHA2568c849a296162976ab9c267538b06200f1b83189b58da272a722f968c40f03c73
SHA512e7404c1a81fd722b02a0494aa062b799712efba111ee3f3f5dc0b15755a462f429c41078114a611c60a26536bcddca9d06e5a9c53253bbc2d6014017bd03818d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a