Analysis
-
max time kernel
123s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2022, 16:51
Behavioral task
behavioral1
Sample
aa4b253d3237c02a17c7da57de94c434.exe
Resource
win7-20220812-en
General
-
Target
aa4b253d3237c02a17c7da57de94c434.exe
-
Size
186KB
-
MD5
aa4b253d3237c02a17c7da57de94c434
-
SHA1
90db2aa0ba4ba9e7b49c104550189dc88db2759e
-
SHA256
53b012f50264df3a5d5ba81f9db53c7e3fed433830300313631a56b1cd795e73
-
SHA512
2672bbfccd450a6992909f0a64079de785765351f47642c91d7b283567abc9addbdbb125892ad291ebb10c9e24129e2a58d000714a34fe39a063ad49f88b0a9a
-
SSDEEP
3072:IZx8gJscuAnU+JYoutueXl6BHfBGoVwqq29gvryVq98JD:m2AsnAnUJoScB4oVwh2qvryXD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa4b253d3237c02a17c7da57de94c434.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" aa4b253d3237c02a17c7da57de94c434.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe File opened for modification C:\WINDOWS\system32\drivers\etc\hosts MusaLLaT.exe -
Executes dropped EXE 5 IoCs
pid Process 4992 aa4b253d3237c02a17c7da57de94c434Srv.exe 5048 DesktopLayer.exe 832 MusaLLaT.exe 864 MusaLLaTSrv.exe 1416 DesktopLayer.exe -
resource yara_rule behavioral2/memory/5052-132-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral2/files/0x000a000000022f67-134.dat upx behavioral2/files/0x000a000000022f67-136.dat upx behavioral2/files/0x0007000000022f6c-138.dat upx behavioral2/files/0x0007000000022f6c-140.dat upx behavioral2/memory/4992-139-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/5048-142-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x0006000000022f6e-144.dat upx behavioral2/files/0x0006000000022f6e-145.dat upx behavioral2/files/0x0006000000022f6f-147.dat upx behavioral2/files/0x0006000000022f6f-149.dat upx behavioral2/files/0x0007000000022f6c-154.dat upx behavioral2/memory/864-153-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x0007000000022f6c-152.dat upx behavioral2/memory/5052-155-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral2/memory/832-156-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral2/memory/832-157-0x0000000000400000-0x00000000004AD000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" aa4b253d3237c02a17c7da57de94c434.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" MusaLLaT.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MusaLLaT.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MusaLLaT = "C:\\Users\\Admin\\AppData\\Roaming\\MusaLLaT.exe" MusaLLaT.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa4b253d3237c02a17c7da57de94c434.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe aa4b253d3237c02a17c7da57de94c434Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe aa4b253d3237c02a17c7da57de94c434Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxDF2A.tmp MusaLLaTSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe MusaLLaTSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\pxD6CD.tmp aa4b253d3237c02a17c7da57de94c434Srv.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "568460159" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985506" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30985506" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30985506" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370464894" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{4C795B42-3915-11ED-AECB-D2371B4A40BE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "601896946" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "568460159" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 5048 DesktopLayer.exe 5048 DesktopLayer.exe 5048 DesktopLayer.exe 5048 DesktopLayer.exe 5048 DesktopLayer.exe 5048 DesktopLayer.exe 5048 DesktopLayer.exe 5048 DesktopLayer.exe 1416 DesktopLayer.exe 1416 DesktopLayer.exe 1416 DesktopLayer.exe 1416 DesktopLayer.exe 1416 DesktopLayer.exe 1416 DesktopLayer.exe 1416 DesktopLayer.exe 1416 DesktopLayer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 5052 aa4b253d3237c02a17c7da57de94c434.exe Token: SeBackupPrivilege 832 MusaLLaT.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5052 aa4b253d3237c02a17c7da57de94c434.exe 832 MusaLLaT.exe 1704 iexplore.exe 1704 iexplore.exe 616 IEXPLORE.EXE 616 IEXPLORE.EXE 616 IEXPLORE.EXE 616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 5052 wrote to memory of 4992 5052 aa4b253d3237c02a17c7da57de94c434.exe 82 PID 5052 wrote to memory of 4992 5052 aa4b253d3237c02a17c7da57de94c434.exe 82 PID 5052 wrote to memory of 4992 5052 aa4b253d3237c02a17c7da57de94c434.exe 82 PID 4992 wrote to memory of 5048 4992 aa4b253d3237c02a17c7da57de94c434Srv.exe 83 PID 4992 wrote to memory of 5048 4992 aa4b253d3237c02a17c7da57de94c434Srv.exe 83 PID 4992 wrote to memory of 5048 4992 aa4b253d3237c02a17c7da57de94c434Srv.exe 83 PID 5048 wrote to memory of 1704 5048 DesktopLayer.exe 84 PID 5048 wrote to memory of 1704 5048 DesktopLayer.exe 84 PID 5052 wrote to memory of 832 5052 aa4b253d3237c02a17c7da57de94c434.exe 85 PID 5052 wrote to memory of 832 5052 aa4b253d3237c02a17c7da57de94c434.exe 85 PID 5052 wrote to memory of 832 5052 aa4b253d3237c02a17c7da57de94c434.exe 85 PID 832 wrote to memory of 864 832 MusaLLaT.exe 86 PID 832 wrote to memory of 864 832 MusaLLaT.exe 86 PID 832 wrote to memory of 864 832 MusaLLaT.exe 86 PID 864 wrote to memory of 1416 864 MusaLLaTSrv.exe 87 PID 864 wrote to memory of 1416 864 MusaLLaTSrv.exe 87 PID 864 wrote to memory of 1416 864 MusaLLaTSrv.exe 87 PID 1416 wrote to memory of 2844 1416 DesktopLayer.exe 88 PID 1416 wrote to memory of 2844 1416 DesktopLayer.exe 88 PID 1704 wrote to memory of 616 1704 iexplore.exe 89 PID 1704 wrote to memory of 616 1704 iexplore.exe 89 PID 1704 wrote to memory of 616 1704 iexplore.exe 89 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" MusaLLaT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aa4b253d3237c02a17c7da57de94c434.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa4b253d3237c02a17c7da57de94c434.exe"C:\Users\Admin\AppData\Local\Temp\aa4b253d3237c02a17c7da57de94c434.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\aa4b253d3237c02a17c7da57de94c434Srv.exeC:\Users\Admin\AppData\Local\Temp\aa4b253d3237c02a17c7da57de94c434Srv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:616
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\MusaLLaT.exeC:\Users\Admin\AppData\Roaming\MusaLLaT.exe2⤵
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:832 -
C:\Users\Admin\AppData\Roaming\MusaLLaTSrv.exeC:\Users\Admin\AppData\Roaming\MusaLLaTSrv.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
PID:2844
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD550ccb6305f667bc427d115125f962cac
SHA1b0d82ebe2f5cf5b520ba7edcf7b2734cf4f2d200
SHA256fd9644d82e1e00505eb4e716136b42befb20145a05057f0cb052d1793a853a58
SHA5129687b5fefe3505705846b3dfa22cbcbcf7c04fdfc1f386998f1a0c8e275ad67faa9976ed51638cfe0d219422fd93dc8ee037653b96bf1956b298b31eb35b507c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5dda5efff64545ce826e1df29bf89b280
SHA1c704b1ac74f06536d1c0da30f67eb518927f1163
SHA25606b715b7b9c17d2c47b1db2037b07e3182c60d4385729fdc1dbf7c90bfb4fd50
SHA512d5827b467c0356d54fb5dc2a5a0f4fc3ffb7df6b7b3e2d84c5adb4428ea7b48ab336b87a84088a1e9d4e0e4913c6fb413630e1a6c09aa82fb4eb1a9b16298dbe
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
186KB
MD5aa4b253d3237c02a17c7da57de94c434
SHA190db2aa0ba4ba9e7b49c104550189dc88db2759e
SHA25653b012f50264df3a5d5ba81f9db53c7e3fed433830300313631a56b1cd795e73
SHA5122672bbfccd450a6992909f0a64079de785765351f47642c91d7b283567abc9addbdbb125892ad291ebb10c9e24129e2a58d000714a34fe39a063ad49f88b0a9a
-
Filesize
186KB
MD5aa4b253d3237c02a17c7da57de94c434
SHA190db2aa0ba4ba9e7b49c104550189dc88db2759e
SHA25653b012f50264df3a5d5ba81f9db53c7e3fed433830300313631a56b1cd795e73
SHA5122672bbfccd450a6992909f0a64079de785765351f47642c91d7b283567abc9addbdbb125892ad291ebb10c9e24129e2a58d000714a34fe39a063ad49f88b0a9a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a