Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 12:51
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe
-
Size
187KB
-
MD5
a1ed8c9a139119f7d68ee5baaff7ae61
-
SHA1
23579b61ed7cd2aaee529fe7ea161fdf5f83b538
-
SHA256
5bee821247b8594b552e8b7a45afd431250dd3a99bb6ecf8dcbb0a86cc5c5010
-
SHA512
b8e612a7cdde1de4d3415054a2c19a98899903a9001005927f38d1c8a16d59e8f58724e6c0c984a21d93fc5881f5b12b584b4123079e3a92bf4f40e0fec1ff83
-
SSDEEP
3072:7sPJu8eUE3QMTFucS9dagcCvkaWe3UIrt85oPatN92lQBV+UdE+rECWp7hK5n:oPJu8nE3QM/gRkaj9tWZBV+UdvrEFp7a
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x0005000000010300-1.dat floxif -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0005000000010300-1.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 2272 dismhost.exe -
Loads dropped DLL 35 IoCs
pid Process 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 2848 ocsetup.exe 2836 dism.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe 2272 dismhost.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe -
resource yara_rule behavioral1/files/0x0005000000010300-1.dat upx behavioral1/memory/2664-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2848-7-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2664-175-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2848-178-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2848-326-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2664-329-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe File created \??\c:\program files\common files\system\symsrv.dll.000 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\ocsetup_cbs_install_NetFx3.txt dism.exe File opened for modification C:\Windows\ocsetup_cbs_install_NetFx3.txt dismhost.exe File created C:\Windows\ocsetup.lock ocsetup.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ocsetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe Token: SeDebugPrivilege 2848 ocsetup.exe Token: SeBackupPrivilege 2836 dism.exe Token: SeRestorePrivilege 2836 dism.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2848 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 30 PID 2664 wrote to memory of 2848 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 30 PID 2664 wrote to memory of 2848 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 30 PID 2664 wrote to memory of 2848 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 30 PID 2664 wrote to memory of 2848 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 30 PID 2664 wrote to memory of 2848 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 30 PID 2664 wrote to memory of 2848 2664 2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe 30 PID 2848 wrote to memory of 2860 2848 ocsetup.exe 31 PID 2848 wrote to memory of 2860 2848 ocsetup.exe 31 PID 2848 wrote to memory of 2860 2848 ocsetup.exe 31 PID 2848 wrote to memory of 2860 2848 ocsetup.exe 31 PID 2860 wrote to memory of 2836 2860 ocsetup.exe 32 PID 2860 wrote to memory of 2836 2860 ocsetup.exe 32 PID 2860 wrote to memory of 2836 2860 ocsetup.exe 32 PID 2836 wrote to memory of 2272 2836 dism.exe 34 PID 2836 wrote to memory of 2272 2836 dism.exe 34 PID 2836 wrote to memory of 2272 2836 dism.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\ocsetup.exeocsetup.exe NetFx3 /quiet /norestart2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\ocsetup.exe"C:\Windows\system32\ocsetup.exe" NetFx3 /quiet /norestart3⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\dism.exe"C:\Windows\system32\dism.exe" /online /logpath:"C:\Windows\ocsetup_cbs_install_NetFx3.txt" /enable-feature /featurename:NetFx3 /quiet /norestart /ignorecheck4⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\F82F341B-0C11-4342-8926-00ACD4C62A3D\dismhost.exeC:\Users\Admin\AppData\Local\Temp\F82F341B-0C11-4342-8926-00ACD4C62A3D\dismhost.exe {B1BE7D7F-15E4-402F-93C1-677ACE82B560}5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2272
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5efcb002abc3529d71b61e6fb6434566c
SHA1a25aca0fc9a1139f44329b28dc13c526965d311f
SHA256b641d944428f5b8ffb2fefd4da31c6a15ba84d01130f2712d7b1e71c518805bd
SHA51210ee2b20f031ca5a131a9590599f13d3f0029352376705a2d7d2134fcd6535a3b54356d1b4d0b3fb53ac5ca4f034f9afb129a4f601159938680197ea39ea0687
-
Filesize
179KB
MD56a4bd682396f29fd7df5ab389509b950
SHA146f502bec487bd6112f333d1ada1ec98a416d35f
SHA256328e5fbb6f3088fd759d855e656cd4c477b59f6a43a247954d1fd9050815e6cb
SHA51235ced350482c94d22c85cd1b98890d01baed0da1c35a114d2cd6373d08969be764282f7a9d8ff0dd1dff3fae42e4ea20d3194c352364901b23ca2f375bd02751
-
Filesize
283KB
MD5f2b0771a7cd27f20689e0ab787b7eb7c
SHA1eb56e313cd23cb77524ef0db1309aebb0b36f7ef
SHA2567c675710ae52d5e8344465f1179ec4e03c882d5e5b16fc0ba9564b1ea121638f
SHA5125ebd4685e5b949d37c52bb1f2fe92accfa48dd4ef585c898f3982eb52f618064fc95c2f98532ca3e7007d0ef71c1fe91887ce3dc0a563f09bc2c5f59f3a3082a
-
Filesize
109KB
MD55488e381238ff19687fdd7ab2f44cfcc
SHA1b90fa27ef6a7fc6d543ba33d5c934180e17297d3
SHA256abaada27d682b0d7270827c0271ac04505800b11d04b764562e4baa2cbc306a0
SHA512933e99749c68b3e9fe290fe4a1d8c90732ba13092d8cd9cac64f8e6583c8dcfbf25a4bea122966bc5d7d92e3a21210365a03b52274d25d704de52631e1fb0412
-
Filesize
425KB
MD5fc2db5842190c6e78a40cd7da483b27c
SHA1e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0
SHA256e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82
SHA512d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6
-
Filesize
52KB
MD5c9d74156913061be6c51d8fc3acf8e93
SHA14a4c6473a478256e4c78b423e918191118e01093
SHA256af0a38b4e95a50427b215eebc185bb621187e066b8b7373fb960eac0551bec37
SHA512c12f75a6451881878a7a9ed5de61d157ea36f53aa41abf7660e1cc411b2ddd70ff048a307b1440cfdf1b269aeff77da8cc163ad19e9e3a294a5128f170f37047
-
Filesize
306KB
MD5bbb9e4fa2561f6a6e5ccf25da069ac1b
SHA12d353ec70c7a13ac5749d2205ac732213505082a
SHA256b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1
SHA51201f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e
-
Filesize
104KB
MD562de64dc805fd98af3ada9d93209f6a9
SHA1392ba504973d626aaf5c5b41b184670c58ec65a7
SHA25683c0f61cc8fc01c789c07dd25f58862e0710088e6887716b1be9ee9f149adefc
SHA5127db48f240df566be9a4b836807f97e8169d58edfa699de69be35b3977e442da3fea4f8b38d359d50f4d5afcf8547c8f66329e5ec855efbc5402ce88458d67e28
-
Filesize
211KB
MD545ff4fa5ca5432bfccded4433fe2a85b
SHA1858c42499dd9d2198a6489dd310dc5cbff1e8d6e
SHA2568a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd
SHA512abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589
-
Filesize
124KB
MD5e7caed467f80b29f4e63ba493614dbb1
SHA165a159bcdb68c7514e4f5b65413678c673d2d0c9
SHA2562c325e2647eb622983948cc26c509c832e1094639bb7af0fb712583947ad019c
SHA51234952d8a619eb46d8b7ec6463e1e99f1c641ce61c471997dd959911ae21d64e688d9aa8a78405faa49a652675caf40d8e9e5a07de30257f26da4c65f04e2181e
-
Filesize
265KB
MD5fe447d1cd38cecac2331fa932078d9a0
SHA1ebd99d5eb3403f547821ce51c193afc86ecf4bcf
SHA25605fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d
SHA512801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779
-
Filesize
434KB
MD5739968678548ba15f6b9372e8760c012
SHA1691b09af08b64b01c3db7ffe2aa625c9be375686
SHA2564ce7afb5c5a44c4c9d0119d7306134e3412467bddcbf5b7da2786e5d64528d11
SHA5128075d3ce9e462777b143fad03f25ddb6cc8b5e2512aa475850eba39a5ef3be3364e7704620b8c444449bbe143b6ffa307428b93bc5e7e0b5738cf36aaf0c969b
-
Filesize
295KB
MD58d3855b133e21143e8b4bfadb9fb14a3
SHA125d729e8455a1f19d0dc59c0962908a146a62935
SHA2563b3118cb4a65cb27a182d044c7b9cfc17581d3fabab094d174b5e54df4ddf5e4
SHA5124e67bcc6f6bd396350d550f5564dd9b1d939d8b6a48706280ee5c1b7205579355dfeb5425f99656455d958f6b61ceee3986488d27de824ed5b9ce14e43aea5f5
-
Filesize
460KB
MD5fc00a05639494779002682a9b965ef9c
SHA1521c93491aab9ab8523a2792c3add7cc49a2a09d
SHA2561a63e46f970c815b8612eeac07f79e909b6d8180d34549a338766b4623461bd3
SHA512cc6b8aeb20e1c71ca616dac7d989d0d41d3441f19851768bb9398bc930460378418fbec509dfe1b0e4c58943b260baf80a65e3964f8c9c5ccf9dce61f2d2d58e
-
Filesize
182KB
MD58ca117cb9338c0351236939717cb7084
SHA1baa145810d50fdb204c8482fda5cacaaf58cdad0
SHA256f351c3597c98ea9fe5271024fc2ccf895cc6a247fb3b02c1cdb68891dac29e54
SHA51235b4be68666d22f82d949ad9f0ce986779355e7d2d8fd99c0e2102cd364aba4a95b5805269261a9205c1130bdd1f5101d16146d9334c27796c7f41f2c3166c35
-
Filesize
32KB
MD5724ee7133b1822f7ff80891d773fde51
SHA1d10dff002b02c78e624bf83ae8a6f25d73761827
SHA256d13f068f42074b3104987bfed49fbf3a054be6093908ed5dea8901887dddb367
SHA5121dfd236537d6592a19b07b5e1624310c67adff9e776e6d2566b9e7db732588988f9ae7352df6c3b53c058807d8ed55fafc2004a2d6dc2f3f6c9e16445699f17b
-
Filesize
12KB
MD59085b83968e705a3be5cd7588545a955
SHA1f0a477b353ca3e20fa65dd86cb260777ff27e1dd
SHA256fe0719cf624e08b5d6695ee3887358141d11316489c4ea97d2f61a4d2b9060cd
SHA512b7f12f7ac1e6942f24f4bf35444f623cc93f8a047ebc754b9599d5df16cab4d3745729d11b4a3abfdc06a671e55ac52cac937badd808825906f52885f16f2c1c
-
Filesize
6KB
MD5f18044dec5b59c82c7f71ecffe2e89ab
SHA1731d44676a8f5b3b7ad1d402dfdbb7f08bdc40c6
SHA256a650578a4630e1a49280dc273d1d0bbdca81664a2199e5ab44ec7c5c54c0a35e
SHA51253c23acddab099508b1e01dcc0d5dc9d4da67bc1765087f4a46b9ac842de065a55bac4c6682da07f5a1d29a3d0c1d92a4310e6b0f838740d919f8285911fa714
-
Filesize
15KB
MD5ee8c06cd11b34a37579d118ac5d6fa1d
SHA1c62f7fb0c6f42321b33ea675c0dfd304b2eb4a15
SHA2566991fb4bfd6800385a32ac759dd21016421cb13dca81f04ddcaf6bf12a928ccc
SHA512091cfa7d9b80e92df13ba829372dfb211214f4221e52fbf3f558ebb7f18736ad9ad867ea0d0ddf8938def1b4db64a12d0df37c2eaf41727b997f4905dd41fed1
-
Filesize
2KB
MD5cab37f952682118bac4a3f824c80b6ac
SHA16e35b4289927e26e3c50c16cbf87eb3ac6f3b793
SHA25614bec7c4bb6cf1ee9049ef8820ec88bf78f2af75615f7a3fb265ef4b45c30e4d
SHA512de9089adaa85f37201526b8619f697be98a7d05353b21b6d835f4d56803732380316359ba8b3c8ca7c14a9bf7cf31a7eff3c866a8f303ef737eb63573e01aa19
-
Filesize
26KB
MD50bffb5e4345198dbf18aa0bc8f0d6da1
SHA1e2789081b7cf150b63bad62bac03b252283e9fe5
SHA256b7bcc0e99719f24c30e12269e33a8bf09978c55593900d51d5f8588e51730739
SHA512590e8016075871846efff8b539e4779a1a628de318c161292c7231ca964a310e0722e44816041786c8620bff5c29ff34c5f35733ee4eac74f3abfae6d3af854a
-
Filesize
5KB
MD5f909216cf932aeb4f2f9f02e8c56a815
SHA1c5cafe5f8dad60d3a1d7c75aa2cf575e35a634f2
SHA256f5c89ba078697cdb705383684af49e07cdd094db962f0649cad23008ae9d6ce2
SHA5125dca19d54f738486085f11b5a2522073894a97d67e67be0eadbe9dc8944e632ae39b24499d7ff16e88d18166031697a238ead877f12cbb7447acca49c32a184a
-
Filesize
15KB
MD517fac8ab2dfbaba2b049ec43204c1c2f
SHA1d484ea7c6f749debf92b132765d2fd56f228db73
SHA256f4d277aaa8d0bed0afcd1b703ee4c28c86313075e291b6addbdfd6202eb3777e
SHA512ff7969adbc53fd2f5dccd3842b46a2517904d524020e69bb21271cd8ddc0cfddfd3f791741589b17b740d5d013cf14ed28b5af50d37d960c955adfd6b99e50cc
-
Filesize
2KB
MD5f0588e200554aed003667c04819cce32
SHA1dacbdc53bd297cd818ea954f5a47de6e84212108
SHA25640fe7b6631d11b5519f051ff0a0ade1cb0de524fb4904114067e71b729c38eba
SHA51299d9372a452a1b908f55d204a2b85addaa11fe49bb0b9c0d36a131c1cad254e9fb8a3b952572111d68a78fdbf41782dbe78d8cb20165676aada496113e4899eb
-
Filesize
2KB
MD5f842303ef440381939fc34df425f8392
SHA192debf4ae2d86a123002a104d0e9ad4981ab6d59
SHA256b06daf95235bd8b87af3dd06cc0566d7b893fbeaa1d5b39b66566b567c24c51f
SHA512d72ccd42da7506cbfbe5db1af03f6d95f8a9c43e11e9f7f24abadd5e98907ad1f976c626a53ed96ad4b5aa24534f019a1ac7ec8ace9a785035dabc72ffc6e18b
-
C:\Users\Admin\AppData\Local\Temp\F82F341B-0C11-4342-8926-00ACD4C62A3D\en-US\TransmogProvider.dll.mui
Filesize11KB
MD599b5c7999e839ffd6c8ca930ceffee53
SHA1fd9bafc43010a3c58fa0d09da98842e314de0b28
SHA256b3e31abbb5626a81598e7adae0f3c9ad34057f96f88ee85b4e8829698385adba
SHA512a53a4eb2a4c55ce50d7b0a855f9ff82784462f96556457cea72c25afefd4e4ca6725ef279c9cbba85c6d620c70a3f1f511cab495982415fe24dbf07a46651855
-
C:\Users\Admin\AppData\Local\Temp\F82F341B-0C11-4342-8926-00ACD4C62A3D\en-US\UnattendProvider.dll.mui
Filesize4KB
MD52ee061d35f60f177c63a1f6710c7b5a4
SHA15205fcef37d9c3d1aff279aa66ed41b6376110f7
SHA256e53de2552a86c8f2aae033963b51bd2ff938dc176d1be3156db35ad89eac1e82
SHA512904ff78eed06688afe5c71d40ed832142879aee6a509b1de50274216de60549ecc40a4b89b70533904db2bb70156e79d9ab8c20cc851a559b1a59c35036f0592
-
Filesize
12KB
MD5d1f01a0d5d8761924a03e8ee3d3c068c
SHA1997f202bc2b91f97a998e8c9b2579c459f7cae58
SHA256547c11f2859fdc63afbdbfd80d9b9748730161ff6db2618ccd33b0ba543c63a6
SHA5121ba92eb28047917309989b17947c000333d820adc87100ce52e3ec8f6b9020d4953107fb527c5cddcbec864646e1abf830bf9826ce57ccbf85a381cf7f4cde65
-
Filesize
2KB
MD59bc5d6eb3e2d31bbdbffe127a1b3cdbf
SHA1b253025c442aefe338b4c7ebea2f7d808abc9618
SHA25655e9ae098def76e7388d7d069746dbd136ae243357ece23b77f2365f0b2ff76f
SHA512f9968554737d181d4b7d0366f40f0c9a2039b59796986964413fa08f031f5529411b2741eb8ea3d8c312112b2038e6a58d891d090a42672c3d1c782b859f2e08
-
Filesize
265KB
MD57b38d7916a7cd058c16a0a6ca5077901
SHA1f79d955a6eac2f0368c79f7ba8061e9c58ba99b2
SHA2563f6dd990e2da5d3bd6d65a72cbfb0fe79eb30b118a8ad71b6c9bb5581a622dce
SHA5122d22fe535f464f635d42e5b016741b9caf173da372e4563a565fa1e294581f44330c61e08edfe4c08a341ebd708e2ad08614161c0ee54e8dea99452b87d1e710
-
Filesize
6KB
MD5c0b6873088d3d00e89f119d6e4178b49
SHA1091bb4a13a02053aa9028956a224c1bfe6fc7f74
SHA25695a0a6a909e45cf61540b41ced386af25cf758c61ec434ab1b2faac91aa9185f
SHA5126a536fc737af8f17405b054218ffdc29f8fd0f2d9128b88d109af793b3a8c1b406c115acde04b41aa6d8456a169e2333f5a5d6c4ead4cdd463afc922c0438d44
-
Filesize
27KB
MD50ac63d0d8d2979cfdcc33abb9f7119b6
SHA10471e0b5618522b91f3e140bd59fb4db381d118c
SHA256262cc3881d513c3a6c6badc1d0280b71b28db3abb05b0cc18e16604336c21d74
SHA5123729059358c22d4975fbff3e63860251e89b1a328b6a9963dc6613d3c41bf9fcef51dfdb4fc6b934f8682b32cc2a6bc6cf02289629e997114d474b4380e86316
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
94KB
MD59a821d8d62f4c60232b856e98cba7e4f
SHA14ec5dcbd43ad3b0178b26a57b8a2f41e33a48df5
SHA256a5b3bf53bcd3c0296498383837e8f9eb7d610c535521315a96aa740cf769f525
SHA5121b5273a52973dac77ad0ef7aa1dda929a782d762ab8489eb90dff1062dd4cc01e4f7f4157266a2abcf8941e91cf4aa5603de1dd8ee871524748e0989ebaa37d3