Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/01/2025, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd.dll
Resource
win7-20240903-en
General
-
Target
a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd.dll
-
Size
142KB
-
MD5
751f6dc2dcfa872395b986b569ecb689
-
SHA1
d84298500638597c3b57dcd9180d70c8e8f13372
-
SHA256
a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd
-
SHA512
fb61ce4f53d01b5b9b29b68dc825bbeb96ebe8dd2505d3b43d7d7e35cddb36186c48ab4a49cd1864e1fbe728c3c84bad962b682f34989dc307d5dc158ad3d0e4
-
SSDEEP
1536:gdNnc17YONNIvz1JjEPYB894U3L7NceM54iMfoyV2um0uqcqh2SZN0H7o4eOC4V9:gSYxaYs37M54iMxeVhSzK7o43Cij
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1600 rundll32Srv.exe 2880 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2548 rundll32.exe 1600 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000b000000012029-4.dat upx behavioral1/memory/1600-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2880-17-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2880-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2880-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2880-22-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxA5E0.tmp rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443858534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68D271F1-DA14-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2880 DesktopLayer.exe 2880 DesktopLayer.exe 2880 DesktopLayer.exe 2880 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2548 1972 rundll32.exe 30 PID 1972 wrote to memory of 2548 1972 rundll32.exe 30 PID 1972 wrote to memory of 2548 1972 rundll32.exe 30 PID 1972 wrote to memory of 2548 1972 rundll32.exe 30 PID 1972 wrote to memory of 2548 1972 rundll32.exe 30 PID 1972 wrote to memory of 2548 1972 rundll32.exe 30 PID 1972 wrote to memory of 2548 1972 rundll32.exe 30 PID 2548 wrote to memory of 1600 2548 rundll32.exe 31 PID 2548 wrote to memory of 1600 2548 rundll32.exe 31 PID 2548 wrote to memory of 1600 2548 rundll32.exe 31 PID 2548 wrote to memory of 1600 2548 rundll32.exe 31 PID 1600 wrote to memory of 2880 1600 rundll32Srv.exe 32 PID 1600 wrote to memory of 2880 1600 rundll32Srv.exe 32 PID 1600 wrote to memory of 2880 1600 rundll32Srv.exe 32 PID 1600 wrote to memory of 2880 1600 rundll32Srv.exe 32 PID 2880 wrote to memory of 2452 2880 DesktopLayer.exe 33 PID 2880 wrote to memory of 2452 2880 DesktopLayer.exe 33 PID 2880 wrote to memory of 2452 2880 DesktopLayer.exe 33 PID 2880 wrote to memory of 2452 2880 DesktopLayer.exe 33 PID 2452 wrote to memory of 2832 2452 iexplore.exe 34 PID 2452 wrote to memory of 2832 2452 iexplore.exe 34 PID 2452 wrote to memory of 2832 2452 iexplore.exe 34 PID 2452 wrote to memory of 2832 2452 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a02f884fea807941e42dfa56d531604c4b810e07ead520009fb1aa628c16a3fd.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b3cd8a5313d56a5c934540d19b917b
SHA149196fa2277452b9702ad8ec9a83afb73cde362f
SHA25654480b6796f9a3e31c07bf0d03c75ba78612c82e08fa8f09766827debac8b325
SHA512c01ef3b27f161d26059e9626e73f66a26935cf9fd451e412067293bd4a1be5ad2a401470846ebd223ed5815d72aa4b6fa3e2bba50004189b4bac64715d4be54e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0c1880009ad3d98d93804f94b4c0c7
SHA17132e7b656a61fb077ab8734021901b532c7cc1d
SHA25649219b2fd4d8f835902fb6727b066f8e9dc29f5a3f0cfff8c5c1c7c0ce206df0
SHA512f8ce8d223377dfd57c5902b0513ecdf6d1179e2ede9eca6320e399d8f57db1e755661e18e0e07597a0bfed547cb10ac61d0c283b4068d40f2455b9d98b905eeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f594399a925f4839d6629d04327b4b7
SHA1f33ef9e6d55c2ee2a6c2c84dbf9513ea9bcf7fa0
SHA256c46af1356f898f07efa30b0be5b3571805046dd9894795f8566ad0d715e110ed
SHA5126b207b2db0213f7be3593fc38c1786b38cbabc6ea5de07af1ff7eebd408d1a173ca005b451c95664776a981e613bf83f8b2dbb7bc937697e114d7c87952fa367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50151d0a6922bc343cee68bdb3b179ca8
SHA16ffa8524eee0dd787264cd92315a7a24c7ea12d9
SHA256bdcb3822364dc09be4926e103a5bcd9d118f8d36f58c3fe067b5f78bbf5ed315
SHA512df96101adbae63d448abe53251ecb2303bf38fe89a0caa7f187edea13bdc983335249f47227a2a0a912ae2251ff0f4293e0066dd076c6bb82f0ccc5a5c3cd3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591e77ba0366f54ac70b0dc94aa8c13b
SHA11f5568c24deb7e845cac0104d2d2048088d55867
SHA25671c08325d64c4aa3b699d6d129160ff230da3ae63a3934176876e8c0f81a67df
SHA512b678a9c201b255f9d56c4e77559ed2f122506d76224e73a760e9e7a9da79048ae8117aa122a8af95399da0a75a08ae242c3549e4b7d67b720f3b5ffcd198fd4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9beaad236550898fa0681257ddc7690
SHA10067b4b1d9e502fe0ad28ad8ec061b4f0e2b9c28
SHA2565ed5e0bfbe0a52c060f538ceabcfd288f9d909e968e39dbe02e52d464836f438
SHA5129d05ce90d840a34140a2109f4917030ee80c2154ee9b7f4ddc2cc23ff8ec4ca2ef272029077b7a0a0a9eceecb0eb25dea6ccf51c3689bb23ebf15c1cfa14f042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d31119baa51df059bc66f109c97cfb4
SHA1a214399dcef944cf866c6d7076cee042d57bbd21
SHA256453332659357daf90907b6cf2801a3b229bcc5e8ba52483938c84faa05978eda
SHA51275f974431f30d574f713b652c456fed08fec15910949050839f914a513cfa5a126975cfa3158154eafb8e498dd0bf318a0955bb2bbb5a8beb46d2f64932bc1d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51814c3c0c9b1429abe5bc5232c48f9b7
SHA187672c681c77386fc9bf44bb9e75fbb009480fc4
SHA256a1a47b61f97e39c2c7da51534e89f778302d7ec3876f4a86a3f140f37fbfe890
SHA512271789785dfe6042d0d34e4ba84b4fedbeabd6b8b0a817dccab98f1fdb442b44b405ada0430c37b355bff5adfd00c8fbf07995500895dc2d1579ee7274e9b56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a8b6bd0bdb09d003f02809a0bbfb4de
SHA10a1dd7437aeef4914a60d597312eaa0690510cc0
SHA256fb2b3a6ab025c996bc0612d5b15c087e0cc5b3aad748498de2d528320cf6f281
SHA512c5c39a8c054ada581ac853fb8c9dbc18dce15f2e965a91702cc4cc6bd4beeee33b98f267b7f6e027fc8e887d64e1269b62dfff8b17ebdd246ec6f7885d0d6154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f769e4cf6d59304680d5df2b69a51161
SHA1141c724c230b516201c2b44d25a2e30849849bf8
SHA256bfb915dbe2d4ebbae6901ea01d89e84103ccb7518019009de8529cb438b6eec8
SHA5129c6860d2c7f089d0c2a7e99a61e168e07a51bcb92dbfb9ca756971dba34db903cc52f96f27bac76996ac152599cb00e7d64ca3f3ce6dd8131bc94fbfce9b046a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521bd7ddd8bdd00b9dc7a29901df771c0
SHA18aaf6db57c6a808abcc0021d701ecf1f05e085d2
SHA256d2f70b5afbba893662cf9a03e897ced9bb1daa197819f05294b4d6e12480dcf5
SHA512d77f1e0af48e811bbc0bf54dfb02e56082d3665e6c4f82ab0097081b60ebd721669f5798f8f48204af91a81d8136dcef7d6949f83d65ee3a7639782aa3339752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a254366a26ca932636400d6ff2938bf
SHA1ff53f06c3938f10324a20d0de07848e32224e1c9
SHA2561184c41ee913ebe8dd649192d89ae17eb5245b015c4cdd4466992a5b96744db1
SHA5124174fc12dd0e790d45d641501c61eada4dcc0464df17b8011bd12d5d34e2d71bc205209de5471a02cc47e72142a52bd9d81da19318066eae540a4ffbd34e720c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff35210789e0b785505aed683761bcc4
SHA196f3f6f6f2907ad77676e1d8134308994b13592a
SHA256e913e38655ce8b90e8da36f602ecc1687e58753719d4a9c097ac9519870d2a0e
SHA512d62d64a93eb366f5f772b506fe0be47239f2692a72ab89df3892555023598dbe38da6a5fe662de6e17ba81c5654854661db719843302499d97428077df84a63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ca16e60d2ac3153f7505901e1190562
SHA1e52f87525644c126d5a19bd8450ab3e85c0d7acd
SHA256a3a9a34814870f29a0a7f33f1dbc09b42449e92db168308818b6be82fb5a3f71
SHA512f8f13f42b6fdb9309a8bb13bc117e0ee1405d20dd7b31717fe8ca80b37feb3dee5c49b321376b47f0adab22442d8f39b84b1a6f6fe844298bcab5fad29df28ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a1d63f83ce60d73ff63698634422f7
SHA10f67a49e42016eb24c4a3b23899de5835d3037f6
SHA2560c70869deef59551421a71f1223d2d49ca5de68d3923ce65449a08b3cac4179b
SHA5123abb77002ca62e4dc98d68d12c1fc4ed75d65e17e7f339043176054bd12fe86e6639ed2c007f928227b323708f52d413b3d57ad4920c8ffb87f099a5e3854d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7080cb47d3fa40b1872233d4f10739
SHA1b0ab1fcc543ac2f279454553c55ce4869ee2f606
SHA256e99261c6e1ebc418b51998856d45502f528517a8efdd21b0a6aec793a4f47f97
SHA512c9e1ac6c9470a67870d58bf4df01790fd436093459c7893e1218792f681755df3a3f52ad9c65e8d55191a83180264e7435d38d8a87e24a352f57a9101e6e4fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222e73c8ed376ab3721007bfdf998644
SHA15746d5f3915e8d6c3845f3c6d2cc1bbd6e17a9e8
SHA256f98167d6c47f296b1b5e592de6f7637566773653a0d1e0902318206e06e96646
SHA512e735ccc1853e5c6b6195409ca21bf367eab6942d38184028a55d0309d80b719b8acdc4c4843d3fc626d1ef02d4e4d9508964db640bc3a2db312072e8afe5256f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51be27ba208fe8ef1975c4c275bc49100
SHA1f4bd3a7a75edf2bed505f7b8f8ab434da9158db4
SHA256eea335b919fad160abe9dcc9a7e8b2b8b92d0770623952cfe6c881081f8d8cec
SHA5122072e6f704870a2630db08b6acc034d0d5c9d1e1e4b91227d179c2f98ac3bcff4e15dedb103ca5d94cb61cceb263ab33f377dbcd97a547b272dae9f8106dba63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6cc43f65d5aec30069022efbfcf950b
SHA1d3134892556cb5b18141f08ca3fc968a7a6305b7
SHA2563aa05e0ca916b3dc352cc8f977bf1efdcd7d41a0a812e367dc22562855426d4c
SHA5120cfdfc23c7140546a098485b4a6abbeaf2783547b5bd820112e9b5abb092322892b085b2635428e107188c12cb4477f8fb5193691982c35c028865d271d239d6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a