Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 23:55
Static task
static1
Behavioral task
behavioral1
Sample
4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06N.dll
Resource
win7-20240903-en
General
-
Target
4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06N.dll
-
Size
732KB
-
MD5
b404a3a28c2b06a9aac361193aa23b40
-
SHA1
a7690f6d786fe123414831548942220d6ee00251
-
SHA256
4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06
-
SHA512
8d98800d083733f62c3b87488016b7f2dcd79ee4bf7c2e72d441a72d81e43a651a9cc466e18fc118d22cf69489e7abeb1c52bbdbe0086a915548581f95d01553
-
SSDEEP
12288:SiLpl6Xh0e255QhoE4RLbtEpVUqw5O3brIbn:SiLpl6XhE56oE4RL5Ep+qw5O3br
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2576 rundll32Srv.exe 2580 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2136 rundll32.exe 2576 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/memory/2136-5-0x00000000001E0000-0x000000000020E000-memory.dmp upx behavioral1/files/0x0008000000012102-3.dat upx behavioral1/memory/2576-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2576-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2580-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2580-19-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxBC3D.tmp rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76BDA931-D9E5-11EF-8673-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443838371" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2580 DesktopLayer.exe 2580 DesktopLayer.exe 2580 DesktopLayer.exe 2580 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2924 wrote to memory of 2136 2924 rundll32.exe 30 PID 2136 wrote to memory of 2576 2136 rundll32.exe 31 PID 2136 wrote to memory of 2576 2136 rundll32.exe 31 PID 2136 wrote to memory of 2576 2136 rundll32.exe 31 PID 2136 wrote to memory of 2576 2136 rundll32.exe 31 PID 2576 wrote to memory of 2580 2576 rundll32Srv.exe 32 PID 2576 wrote to memory of 2580 2576 rundll32Srv.exe 32 PID 2576 wrote to memory of 2580 2576 rundll32Srv.exe 32 PID 2576 wrote to memory of 2580 2576 rundll32Srv.exe 32 PID 2580 wrote to memory of 2372 2580 DesktopLayer.exe 33 PID 2580 wrote to memory of 2372 2580 DesktopLayer.exe 33 PID 2580 wrote to memory of 2372 2580 DesktopLayer.exe 33 PID 2580 wrote to memory of 2372 2580 DesktopLayer.exe 33 PID 2372 wrote to memory of 2800 2372 iexplore.exe 34 PID 2372 wrote to memory of 2800 2372 iexplore.exe 34 PID 2372 wrote to memory of 2800 2372 iexplore.exe 34 PID 2372 wrote to memory of 2800 2372 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4d01ba440dc7afa1b5f66068429b2d7f8c330456f283988c87911e70c5868e06N.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847950212efa03217f50a02e00ae9cd5
SHA1636014d999f4b2a626ae004e2fe0c01620bc48ac
SHA2560f5535d5b12f1eb8e0e8539c0cda8fb7121dca66c3951c90214c5651d3a9368f
SHA512a5b760401223e505a0a090c713952288386c0777934a2af6a30812712f6a13d9d650b4ecb66c87806075ad89aca3857b214bed1cf90e4cf646b56ef59d6800f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d736661e3350ddf03d1cfc136c0a98f
SHA1190eb2e26b2e3f6b3b332771fc8256cc5bb07bd5
SHA256f90dda589c00a769f49820eab0deffd7c93ba1d1d15ffd1d6ca831fc910e50c6
SHA512f948c788fbb930cb7e0e24492a0d785b9856a0e3c4d4c448d0666815344882e61e058ae224aa6028e82a2ba61ba495ea713919cb27f006348ab8d5596724489e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512480108a0ed73a00d836c3dc6bd93f6
SHA1ba4adb90873b902f9be5191ad3152cffdd7060ff
SHA256dbea5cd8eb9f7a6f8d9eeda6480120a61623aee3862ef7283d50869a70cd0ff0
SHA51209b28c133caef4cd1223af86aed343bd5a0d4dde37004dfbcf650eec87efd2de8f526c881a52281e932e745f6c1fe8efad0969f7b5113b6181ed1dd829b9f05a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc9175cbd7aaad0bbac865317b1b393
SHA12e12f5dabd929e108844004a82b6888881c983ae
SHA2569abaac305f155a1f58c8e5777cfb2c57e9c41f1ec4e74742922d0b27c452f40f
SHA5128510e9d1032379aad89b92bf50d0d22098666b1652067699ea1e9e86411bdd76ea7a949922aff78f40402ccd72e763756c69c582d5ae260a73fb0ddbf4dda10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e604acdf86f990f856d38fa1faad098d
SHA10b863f266e0d2c4b2f846c324f6eb2da56efe679
SHA256050997141b9e8f0a78356fca30d6d93370469364d17bf7c95b157b34565774bf
SHA512ad6809acc351cae00727d4e53772fc52e4189cd287fd755d26c56d75357b0c2056e0a51c5c94dbe7d56ad1836ff59bae255838756ee13ee53cb8b7a9e4752d67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4da44341dca3e4180f05db6d945acd6
SHA148398b3f2069f81dfe169ce4cfbf8b8eb7f4cc36
SHA2562acea71fcc0a5d85c3264e517ecfabb49d0a071fbc41448ac73a57b8b8235b22
SHA51215737fd913ce79b876d17790446e9ce93175fa267553411c9534627a018e719a44aa53a5e46cd93ac6d7cb9833756625df75dfaa5c05b5236b3eef219c6e8b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303d14f903a53ded4870782bbd987d1d
SHA19ebf5826b166ce0073a507e32ceb5d2331d933f3
SHA25667f32d6aee60266f896485e02c7f6edee03e63314a20e0aaa5b8dd145e4d94f9
SHA512082f5fa40643e5d3a2794f5e7947cc5a3a8057301bb224fdcd500341561179ca646c2131468f4d5a99412a56e954e443c5922930e2851dbec60b85e6f41ef540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d3eb576d018226f0bf260f25b62ab09
SHA1a03f3ca9aa84a52920ec9c26f7fb9330746120bd
SHA25685d4bd30e231201eb727d2113d7d0ca48ffcb227a181972ed032ff3786f3b1fd
SHA512e2014d01c37a14451f1a04fe7ec5acc5d6e230749140a430f7cf4484f6af5bad1f74c552ae45e0f478c52e3cb1eaec70b790a0b13d81da7e3bbcbb009b01cd56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe7734f0ffec0d865bb07850da6072e
SHA180f7cc2e6c7a1e85644b04551f8ca70bf8c40654
SHA256221a304323573d0694687b6407d88d0b41729adf84f2a2d808f9c69d6f7833ef
SHA512b9e6cce3ddcbcade6a005bec4f3e9b8e719243a4faea3d7ff36b7ddcfe08c66b9dbc209dd69219b2e7b3ca3c836bc5999397b880fb3dceb7389091e4fd5e5577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a193e1497d86b2af680b87d41b982a42
SHA12ca6ea2f76d0dc10215a141dfdf8ce451a0ec84f
SHA256144716e86d132b6ecd8f1896dae2ffea787b3fae506de65d3fd2068239809ae2
SHA512803fab6dd0e69d47d3b48b9ab8cd6b0764c8c11e3c221fa18f05842188fb327181c10a49ecb05e224edd6a006ec5fa7ae47bdcdaeab75636d59293460b61fc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506bae78348ddfd371574e96c4a14c947
SHA1fd0ae1f7a9b4c617f1dab85a953f84ddcf7c3e07
SHA256f71a1ef61f3724fcb61bc1c5f68b51e0330819ae5cf8454ddc7abcc8c6bcac93
SHA512c0623a7c919b28a036ade53d2aaf206c4b0c645e3031e33b02fe189f4fe4633c0bc35419899f21bade1c0aad7d77ed3e856cbd5136992038f0ae8d5d8b665b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5b520e4749f8fd7772051cbf218a20
SHA1ca3630c24cbb7170e7b3d5b207c4c102702cfdc8
SHA2560dd2c711c07add3e94cd2db15d3aff1c2fc9691b2f85c8a4a64686866fc5dea6
SHA5120b9553dd978c81a2f2881042027d0a6d8e7e3fcc4ef82e3077bf2ece22254a4b4233a71f8fe3f021c4414122937b6e0d961c0ced30e2e273acde8ccaa19ee481
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee296ddf0a00d56297880c7189c3442
SHA1a51a9718ea6826e5d409df904dcfde9fe72904ee
SHA256ec6408a12e38c07c926c02cf471f6dd53e1a1c081f1b165bb6c09e6d3443d7c6
SHA5129ea2c3c50dc347463dc73b8afdbc05b580de24f93f10976f9ec88dc8d680edb96f29db1c8b5f441996c6a2a39193b7059f9f44c9374d52c345d93110a7a8a40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462c181a343c787c4616cac102c09f88
SHA19232836f746289a977f6a79f627614480e522d64
SHA2562477356d8c21b960eab56c7dfd725eec742f67b578f1d8c074e4a4b4cdf74ed3
SHA51261ebfe6a620b600cf5dfade09ccecce6c100942721f53470bc92917866fd0d0d96a09142b58ea63528d8807b88dd7784b69af306311612ad0d0e4ba65c2b9585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f71bad21c38eb29fd3365bbb30106fa
SHA14693d8db49bec594787bc81b3ff1a3a39e277c14
SHA256d34dc8616f9de65b9a291622bbe53d0b2470dc27bef73c266cff6bc318822d41
SHA512d8d1551438cd4f11e4157bb3f88d5e50f96d0ef63de2905976313be208fe1ce1a651031a6813028965ec211d84daf6d9cce45276ddedd1bc093d36df3109e6ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf5b1e1f98028292c585ad562a7ab0b
SHA1c0e6773eb90554b99efc19d625045fc83631e62a
SHA2562a5268e21b582a6ed9f96590d713b08e444f8b1997582acab10439058e58edee
SHA5120b0fc4857c9cd90a5816bb41a27532c7da4f61e90c0fee44b5b2ab8f1323d008caad4cb8a16717c4119628581917f935eab9bdb7ca81b6bc96c9cc51f982b8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19ab502f79a756ce3ce77e35a10ae2b
SHA100ce706668f8f8152b7c6c7fdb45aca0bb4886e8
SHA256193950abece7a9d88e9fa7a033ab8c6358940492491dcc98266c00f3654c1c00
SHA5122225d24e70ac72ce17b942905237812a818e54da863abcd8f80c03946a53c2406923f3d318a37e76643c923c697a92cdb3440133863d31878b762779fbbf9d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e2c32cd6d14ccbab3c4ae99cae74ed
SHA100e226ed0893115a81450f19294610519b18224d
SHA256c8bfcbf591ecc5d822b90da040f6afc6f2837f68bd4d2d253a5e11fe1a6e36c8
SHA512912888cd605da039e56ab03ca4e6190cef5309b2027dfd346a85e6ae4cece83fe03c4eea9aeb4459e21e2c1eda863dc6c40b00c430da9fc9c79655be98c2124b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cfe3f1ee9e3d2a2ef97517bccf4a09
SHA189df3160db2b2a338b1fefcc697e444dd0a39e0a
SHA25642e868754c9aaf924b3e3002b44715aa7a0a4289723f9590cce61554c2f5458e
SHA5120b9a270dbf6e40d44d1baea732469029705dc3ca99acf0c4caeb7182fc5d37da1fb90e5953268bc289a92b22334c6d83851d707cc092e3406e809d9d37791c44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a