Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
8e8d4c07efc3ef996cfb2ef5c1123cb659354cbf2fd681ee8688dd174f38b47c.dll
Resource
win7-20240903-en
General
-
Target
8e8d4c07efc3ef996cfb2ef5c1123cb659354cbf2fd681ee8688dd174f38b47c.dll
-
Size
2.0MB
-
MD5
3bfcc84f05125a14577c28b8339b5237
-
SHA1
58de557cf08bf8481f6b58c15a84457d4ebeaf6c
-
SHA256
8e8d4c07efc3ef996cfb2ef5c1123cb659354cbf2fd681ee8688dd174f38b47c
-
SHA512
4c03d3e42b2a52f1d7934c3f7aa9b8d99f016fb198c97b150a77d489233b20776715812795e0007b7dc1bfb6427367fcfefd806417104488d310094d670e8c23
-
SSDEEP
49152:0dyWovHcx4JEKeTO8Fbilex0S1OjuusSNQ:yyWoEx4JEKeThFbilex0S1Oa
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2100 rundll32Srv.exe 2328 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1652 rundll32.exe 2100 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0007000000012116-1.dat upx behavioral1/memory/2100-7-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2100-12-0x00000000005C0000-0x00000000005EE000-memory.dmp upx behavioral1/memory/2328-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2328-16-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2328-22-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxB24F.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8DA84C1-A69F-11EF-B656-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438201015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2328 DesktopLayer.exe 2328 DesktopLayer.exe 2328 DesktopLayer.exe 2328 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 272 iexplore.exe 272 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1652 2088 rundll32.exe 30 PID 2088 wrote to memory of 1652 2088 rundll32.exe 30 PID 2088 wrote to memory of 1652 2088 rundll32.exe 30 PID 2088 wrote to memory of 1652 2088 rundll32.exe 30 PID 2088 wrote to memory of 1652 2088 rundll32.exe 30 PID 2088 wrote to memory of 1652 2088 rundll32.exe 30 PID 2088 wrote to memory of 1652 2088 rundll32.exe 30 PID 1652 wrote to memory of 2100 1652 rundll32.exe 31 PID 1652 wrote to memory of 2100 1652 rundll32.exe 31 PID 1652 wrote to memory of 2100 1652 rundll32.exe 31 PID 1652 wrote to memory of 2100 1652 rundll32.exe 31 PID 2100 wrote to memory of 2328 2100 rundll32Srv.exe 32 PID 2100 wrote to memory of 2328 2100 rundll32Srv.exe 32 PID 2100 wrote to memory of 2328 2100 rundll32Srv.exe 32 PID 2100 wrote to memory of 2328 2100 rundll32Srv.exe 32 PID 2328 wrote to memory of 272 2328 DesktopLayer.exe 33 PID 2328 wrote to memory of 272 2328 DesktopLayer.exe 33 PID 2328 wrote to memory of 272 2328 DesktopLayer.exe 33 PID 2328 wrote to memory of 272 2328 DesktopLayer.exe 33 PID 272 wrote to memory of 2656 272 iexplore.exe 34 PID 272 wrote to memory of 2656 272 iexplore.exe 34 PID 272 wrote to memory of 2656 272 iexplore.exe 34 PID 272 wrote to memory of 2656 272 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e8d4c07efc3ef996cfb2ef5c1123cb659354cbf2fd681ee8688dd174f38b47c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e8d4c07efc3ef996cfb2ef5c1123cb659354cbf2fd681ee8688dd174f38b47c.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13c0324c5047104bb50e03561711f72
SHA114e3e71ea1eb7d1e7361669f79739cb717474d36
SHA25614dcbddcc3a945a40e96bbd2eed011eb18cc78ea062e908060a438f7cc7885ac
SHA512779b7fb76c6fad35bd611f17479fe9969ed9d3322e0d90ad1c80f7511408ce9e89b0322dc01c67e6fd41e170c33f70039f1238840d1b03788c036ee5aff6576c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55392ab20220c87841b8cfc41a9594efe
SHA1544d450abba894b2e6f8dce198bd96ec0875dbcd
SHA25649d920496d986fb0a945c3dc5437a922ff1b00fcd49bbd879d94db912aa970f3
SHA512fcf1ea471ff97de657f9b7e3bad19a6533898354f6c6f87d6086383be4cf9e5d3f9ddd49972eb9835933d5ddc831928320278e01f8421f44ac9224e23ae1ea69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622c340fd68475edca8d48e673fd03c6
SHA19ba57b576d0a1b31067d5f06551f294db5ab24fe
SHA2561c3bf334bc2ce5d8658d70d2b42f8206b8da3ca70add937762159283b47a27e4
SHA5120c9cde82c81df98bdb27e166b5fc27efc9b94e33ab4cf78dbec42b346879cd58fc37e4e13e8bb18261c4ffe449fa830dc20f9d1056ba80de93e1d63f74c05c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d38c61824dbf113ce59603d76ae5160
SHA17de1b6240a35b21fa284b3c08a5499f2291d17de
SHA256641d8affb3cddf3c5f2a19cd191e284038b295389589834e48c6da04e1ed1fb1
SHA51252f2296abcbc7b899331e07ae59eb752d21d16f6f17c34f9d37aa7190862bd118a7f4a44d6555568dc39b80adf143db11475d8dba93923951a5ec80bbd188ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4460d45363705c422177c5e4abfd7e0
SHA126d56ede288554f4f2385819ae0340a3c1d004bf
SHA2563362650a25f7ef0b8efee5a824cb8ab616c03342dfde105fc42f21c49fba38e9
SHA512b79fbd48365caa2c46a8c6b4c02e36cb149a8e06d438656db28d87b342effa848d48ab21a7fdba4e51aef1de298fdd00e1d1a5a9e4ef05c81525b080f265f445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ff803363d05e6f3447a449e1320af2
SHA1ef21e3573e473318e46c95baaa5c41eff5103bc3
SHA2568db48832d6b2f231d2498e5504e92e8a3a3f9ed62b063769bbfbeb9ef1e7fc17
SHA512ecda4cf3a6813deb8943ebaa028e3f20b3b71f6f40e5730af7eaa006d43d7c7fa9b9caef644129f0e94d76bfe56e0fd7d5a658ae1e0927a5a76c3ae0d671a737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0b1c8b5ed7f41d71cc410cb0aa7c615
SHA1650815b67df413a178f55bf13460374c4800e5cb
SHA2568d8578707ed676e2b2b2604f119f888bd7ec272920c95cc1961ec7ce268d702b
SHA51249bea782d0af128d32c9a802c6d3812fbc4194c77647ae5279c465ef1d05a40cf45261ccdc6f55c6382a218431187a340c9283c74a428fbbf1d739ab79d9a311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afe42a82ab8ad044272993391dc2525
SHA1c1ed2e1419448fa6c1e2220a387598026d6f7fe7
SHA2569e4cad6f472b0547c5dede4695c670530b537d1e4fff873863ee7a045ade957d
SHA512c97bf1e241b848d544ef150d21fde04cbf0bf54abc0e8095dd0ab4204277e8a33f49743cee82bc0d3e0e1ba779ab50a3b5d2134e5619eee0119ce503e831472c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b39c1845b71d59913e2c477ad49e103
SHA1fdd44016b67e447eb8d72d2e15ab6bc889247b0c
SHA256962e93884ca2d4ddbc6406484c6af537872e58e32429103e7dae1179bea7f7be
SHA5123e860bb911b1c17b91f064bdffaae2cba889341be08f3edbc763109110b02bf94358347fb4a06ee2f09a42f0738e80bbf0ed58168421f77049781559bc6bbe0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc4dbc7cf96a2c288a785bb51d1367e
SHA1590bb7797c437a310532d220658acb64027efea4
SHA2563f8a9fc23f1be724bf0385da20615d04d25ab8f8e16fff1475a6dfd5b36805e6
SHA5123a4976cbea8a47547a9c688949af830e9b5a7004167558be961e80213b8659072d836cf33a68e62f0552b6b7c6516c5c1fea1d340f02d36b172c536648085f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e37134d62e9f0e59fd13672df1570cdd
SHA1c1fb689492c25a8b69db6cc706be30addc5c2db3
SHA256da9a2e28123ef9c203f1630f306c1c43852458f1b62dbf5b4d636d45c0a48368
SHA51295bfd0d0f7585ecb7dc0911580a4008be0da7cd5afe89b59611450ba7eb008d2cf73c877e842757823ec8543528efd2e2aa7e97eeb41948b0073a4d08d96d98b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffe616b8de5f23753e771a1d2f1a0ec
SHA1bdcf74046b6e3f54041ce5591c7d6dca737a916d
SHA256cd3f5791876ebc4d7a38f4edbab719408aef5556899519702b16d4316a96dcb6
SHA5121c004c39ffc35a94b3b9d3fa6d24b3911a93ae12959269ec5c8c7ee9eb75f3ee8c5d75904412b2253d20a707288a7f0a3f39b43ff87814c5f98021b39e816865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587954b51cbe8bcd06f90e1296b6a4c90
SHA12d9062980735993eede17072cfb0e7ec26339ca2
SHA256771ac3bba5ca87d5d10c156424970a767aa56b68b99f95cf2de4e57d2192569e
SHA512b76822f26a0832aa1bfc59be4bfa153fa5fcf83fd216202fadd1648eb16a65cca649fac708608ae3935bcc8356341ef6397a82aa154259cb0d5f0a152df266c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545bf2e1ce8ad5f46901dff9e92b2c5d2
SHA118aa5fc3ef10553dec9423055283af7d05b77538
SHA25615d0793f73ba0178c3e5f062f7e31b5ab4ab26242e38e7f94f3c0168b00b68b6
SHA5123e8636e4e26b6bdfad4907a60780eb0cdaa0a037910ba40657171e1a4d97aae16acadbf03e70e0e13fb0c36d7695062a37fdd51d6823ee0188a6377af111b5b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d93191916b27f5ab4c32483ac4e1d2
SHA197c27e7aa3ac347246003068792a07796d239ffb
SHA25642f65fb75ad0516b03eb91f072d6d15a90891ca0a7ef254e98f41875b5c4c73c
SHA5121146a491dddc6e0b3b9cd9dc75705bde4408f2fd6b6afc41a296e2de44a75a3589109728f7c314af3953dc1a5c45897d85a5d618eafb1b4481a2b0e1dc8b023c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a0caeccba21109ba8fadcf74b9c141
SHA187d2a05135d950954d71652e758e6f6ca1558883
SHA2569197777e6c8cba37847c9cb62e1c93b8dd2c66bad030fc627c16107d98bc1c35
SHA512301d7c1217d430d58635c364c1e23fd2d2c64fc3569397766ba8898492a019acb65898a212bb27ccd4d3ee783c17198d573997430253f6b5aee09cc1c07849b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7d5628298c9f681f7923bcca18fe26
SHA1bfa1721b3c8c9e4380dfbfd7f8e302c1ca3fc8cc
SHA256b248bf495359ff527eb80bab3fa6152eff109fb1a58c5ebc57c5f4b0670c69d5
SHA5125b1a3ea7ae0eb95a9ae01049e5708ccb66999f6dbc99e295bb8fe4140ba32f4320fa14782d8014f5efef79f6c3d9320cb60c09cbd56db84d6af8bf2415d46ebf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a