Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd.dll
Resource
win7-20240903-en
General
-
Target
fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd.dll
-
Size
170KB
-
MD5
8d1a318e14221eddf86af0c50f6cb8e4
-
SHA1
162763d9debb02777701acceef260ee7fda347ff
-
SHA256
fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd
-
SHA512
18adafb8e7c14b101c7097e67d4c99da25d76a065893be945a81af03092cf025ef4940b21bc95eff7dea4d39dc014de783c30e8604378a56a0727a67ab3c0ce3
-
SSDEEP
3072:bcwO/iTOdgWtJ6LkHn/rkiENpYrvQaSISixCC/xwp2rrUDf:bDTOdgWtYCjkR/YrvQaSrcwptDf
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2664 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2760 rundll32.exe 2760 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000a00000001227e-10.dat upx behavioral1/memory/2664-22-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2664-20-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2664-18-0x0000000000400000-0x0000000000477000-memory.dmp upx behavioral1/memory/2664-15-0x0000000000400000-0x0000000000477000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438136549" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E00EF5C1-A609-11EF-B17F-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2664 rundll32mgr.exe 2664 rundll32mgr.exe 2664 rundll32mgr.exe 2664 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2760 rundll32.exe Token: SeDebugPrivilege 2664 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE 2608 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2760 2764 rundll32.exe 30 PID 2764 wrote to memory of 2760 2764 rundll32.exe 30 PID 2764 wrote to memory of 2760 2764 rundll32.exe 30 PID 2764 wrote to memory of 2760 2764 rundll32.exe 30 PID 2764 wrote to memory of 2760 2764 rundll32.exe 30 PID 2764 wrote to memory of 2760 2764 rundll32.exe 30 PID 2764 wrote to memory of 2760 2764 rundll32.exe 30 PID 2760 wrote to memory of 2664 2760 rundll32.exe 31 PID 2760 wrote to memory of 2664 2760 rundll32.exe 31 PID 2760 wrote to memory of 2664 2760 rundll32.exe 31 PID 2760 wrote to memory of 2664 2760 rundll32.exe 31 PID 2664 wrote to memory of 2668 2664 rundll32mgr.exe 32 PID 2664 wrote to memory of 2668 2664 rundll32mgr.exe 32 PID 2664 wrote to memory of 2668 2664 rundll32mgr.exe 32 PID 2664 wrote to memory of 2668 2664 rundll32mgr.exe 32 PID 2668 wrote to memory of 2608 2668 iexplore.exe 33 PID 2668 wrote to memory of 2608 2668 iexplore.exe 33 PID 2668 wrote to memory of 2608 2668 iexplore.exe 33 PID 2668 wrote to memory of 2608 2668 iexplore.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fac24a10c18cd8829429a366297abeb06956fc7dfb308b73fafbc42357adc1bd.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558c3c0cb2c1e96ac214bae1ec68a7d8d
SHA142cc26bfde169296234cb99dac1d98f26fa2f338
SHA256c637c9a468c68bfb3f5fce8de552096bbb11a428f9c17981006bf2130316ac72
SHA51200fc4d332e73871f813204db22e6f7e557f853d5b3b1c6dd3f93217de60c43458bd409d782d50b9faf6da5905ad0eee967ef0cb79e71e103a9945c65f76f4cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d0f81f1021abe4656ba65485cae989c
SHA10bdafdaa311d5009321bcf9aeadaf68cc654bf48
SHA256d5e3ab430aae8cb18f0899e71e3571f165031ce0e612cfa71403c87633713dc3
SHA512d926478d46a0fa8bfc6594cf020b829db3c0b8cca4b477c7399badd4ab0a2e267d0cdd9a34e73af1fba51de3d2cb8dbfc5175ed532a1e69e120519da5cd95e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56605c226d0e861caa8833e25d2f17d97
SHA11589458d61653f5bd17069febc087fe5f6cf57c8
SHA25624b66eb77d1c66a2dc6bebb2bedacb24d53e32d732343b6485d4363f44aa0c15
SHA512cadbd8d9e6d2015e3888ad993310cf7032c82173a15eb4b2abf771ac12005d2c2598876eca8333ff3fa4d432358834d50f30e388fc3ff3b487d4f592363b0b7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d1978ba93dd0d64a7a3f109a5811a4
SHA17b1f7a8d531bbf4194ea8bd792864e7cdc67fc7d
SHA256595605b582e187c5c5dccdd77580f4e07c763d7f8e75a8928b29c369a261bb0b
SHA5126c1bb130df56b1ca05a6d2d71fc70d4b18669bd08831ef84222649b9e991a88c447063f04f587f5ffcfe237358b5f885ad67b03593093a375aba21e2e08223c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bab6f0a3a7c887cf4928b128fa526ae5
SHA1aa7e0b35965b4a43313ae95ab7114e99bac7b83a
SHA256d9e73e6ae052182b339f14958fcc75d3c9d544a2e6f49de0e2233d565314145d
SHA512159ae958109829062d22f56531187b0668617c05ef77cca1849b0dbd00f857cff6b7f2cc550b1f8c0eba1659fba7c966301c38b68893aa0d644abca84a9b34e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b51282782b2bd602e0bebe0b98afa0f
SHA1931b0acf40aa3644cae122fdacf32a482ae76c6f
SHA256aa956d6bc275bf9fda198f0a4b9e3b6c41b9fedbb2e268820a1a2c601fad1540
SHA51229028006d8f99a002f65dae03891ccd4a83f7e99bbd4caa0d9cd734bd49771da342c037e0341d177bf10c31c94dc47a3f9229aafc8c8d621392f13cb1e34eef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece19184dfcd34a74228336f55fc30fb
SHA1c0460bcfa71c983d3e027038d90a5f41a720ad87
SHA256aa98384ca266a5b323271df4324df269891e3e96dbb6335d440bc8c42cb254b5
SHA512e3b0c849c60b4b72424f0ad34982b1754cf3f1118e54d3bdce0cba799f6c98d46dbc0732521f0b740fef45ef6dcee5fdabb20a462c2de480c95bf589f2e6ffc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7dbdac9bb0c8a2018179f047465081b
SHA14a4c37672af58be8cc140d184bc9e8eaca3cad3b
SHA256d46818864306b0aea444b52b548b62b74b86fdfc85d1de9e336db84abc2cec52
SHA512b31752c36c2abed6d237572b32761c7420cf30dd2945affb76b28fd76b4ea51fd1868e55ef59e0c36493cf86d1572cf3e3ac3375bb61eee05548bab7e9572a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5071f640a07cb198b7a91cc871d8d4478
SHA12d04d90b0f031bc020bb78a8d4cbcf361b8e0210
SHA256fd75b65837f1aa55456aac6b8f3390eb64e63d1c607ea024f09ecbfe9a2cf553
SHA5125c945207352f4715ed238367feaa8ad690df49c2df749f503ae91c2117a96466049e07ce303253c57070e787c857ce622b1405303a651b1d568ade069cdf1323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554dee55f7b70981bb7f9c243ffee62cd
SHA1e19499cf92daa97c80ad4ce34fa9f561ff47713b
SHA2562dd23c1c4071c5de702f2ba51eb1c56a1ecb3f9ffeda77f895fb5a5687f471f5
SHA5126534fd2719e8957db83c00935bba911bcd07df84e4d2ea18090029a602acac0429a1bb9305aca232e360a2bba9c4642537eb12a72565b26eb6aa1a5548038d8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb6be3b61b1b5a21cc4f7f1d7c07cb6
SHA1b083a55e362bee2b2a6d17401302e2f38dbacdab
SHA25608dcf23aa5663b5d16d4b6a50a5572dce6fd7f01a468f5e8eed1503039fa0e9a
SHA512d97b99bd5b1ac77ff65b15f91de947927dd82e7d9b4cbb9f414a1214cfc127e21630228ba77420e6b63a5ed441c159c88e8d1abac3f5c44a015a9be1c28f5dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522510421358b91bbf9f6124be39e5a2f
SHA1c26005b851f08306308426204e597ea7df255679
SHA256520304736afbd86f88ec2bee11b39af2386a80d13df346fd4fadcfb8192ffd88
SHA512b405badb5a05acbcd161cf41f8190d7f4603f2ee20125d7150fbcd5a5ac89afae356c3809bf234e99114cf2388cd6aab323ace853c53225f7b58c6e81df05942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a82f5250d6bd70e360ed3619dce1c97
SHA1dad9a59cefd058a818ec65a6756d28b36d02a3cf
SHA25624c6b81e636cb02c06700a5a53de18994a650140e835976283ec0d5ae1a6419f
SHA5120c31bd1275c99dccf56d8e8ec3678939d6e9b424c2343f95c9f382fcf3882a41e42e42a5293b61a7a10884110f7ca3c16cf98c4dd73b30cd93283055f52ed327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b517a7babf6e9ad362c431df13781159
SHA1319e8612e54a804d624bd61110d5c42c3bb3df50
SHA256e6e5a4b7987393535dcf5b78e2c41187f9fe8a4ea4b12ecea28c4aa83f64dee5
SHA51275ba0a8c924a91b111e6813e375631b3583e5bb1cd704556ab54ed403105621e039525015e51e2757090e3bb5c57f89787ce22e0a5884faa16487272c6e19bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870b0605f8d23936b8bf305a87970d7f
SHA1fea714761e72b40a6516aeb8319ad038ab3a9fc9
SHA25670b9e3f05ac0fd393c6681695d6962719d3a1ae3ec9d4bf016d3647947cbb90d
SHA5122395079eee8cda451d6ed4a6e389621eaf7158d3dacda108faec493d2afa478bfa7994e9cdcdfe253b5eb4ec48da74fd04579f5e950700220e2c70c4f3fa1cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa2c25f59ea6dc086a3db2c13cfe879
SHA1a08ce39e8bcfd07d1ec4a907cd2098bc010f6410
SHA256b39dd6ce9ac728e8aa38818a46d7180c06b6efe514f105e6153f1551210b594c
SHA512466a412af833d8a7fc0793a70067e2b6199b7b41b86ee2b2acac8d1c31cf8bfda47831d586fa141c7fd256c9cb9594d0608496a502d48fcb0048c570f933dacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ced254f847052280d6384da3bc304d1
SHA1550f68d7a9c16a0f64f501358c0f667a48795583
SHA2569f6bee314dfa1125fec9b17e8dc4e0551eff63f2ceb0beba5ff2ffdeabf1af12
SHA51259260f0a9619c001f0d984b360d27519f81d0ed8b0c7da9c2dbc2acfffc1a5f1f2c3661f56c2894ee5078cc500f520e640bce49ad77b6df033bb74e310e42f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257f43d8af780863e33b2cacf34723db
SHA1b08cd22add0595f576b805cf5c3acfc51646ad39
SHA256854e2e0ef37382ce1fcff9222c96eb935ed5181c3e132bec04d3807d7ccf0103
SHA512d45cad7bd380c804f9cc7652166e34815b4755b828021100d4aad703669e673e53700d0b985c330e6bce440b899da9cfd7f4c157606db9940d913eefbe7b2c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce57a7a0d757070e2059ff3510f0f23a
SHA1d3f4e4ab94a073535c631bc0e887bf2e8ee890a2
SHA256ac5712dd8457296ec5bb3e91161ff4e10036061939f3c50b6dcfc1f283f8ec83
SHA51242b5d2e4341b0ef1618ca92497fce646e80bf3a62079bb93b9d1b3745c1822ac330a1b5b3c581c3fe637614185ac6bae4de4969ec5f87bef234eff137c1f5d00
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
134KB
MD5774b9c11bcc0dbf50425e3935100b905
SHA1519338139ca0deaa4b42e056468087e18fd1f253
SHA256be6cab2cfd23bd5cd633264eb9a7d55f0feacda3aff05db031af04a531585590
SHA5126d9a570b441f96013bc5ae2bdc6422beb0f48c3953da00e2443e94de531f8abda9ad8403380543f95e0ac16d84985e1a5829556ff7bf26fca85afbc86fc07872