Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf.dll
Resource
win7-20241010-en
General
-
Target
bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf.dll
-
Size
124KB
-
MD5
daa45d7612ba5c09af73723ae271f68f
-
SHA1
20083b1389814ca8f109a87e0bf0add7712b9903
-
SHA256
bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf
-
SHA512
64eb399d2b5b85745568b1834afc5c1f1f91e5283726f7ae671484730a5fc17f8f72c90fe2ed7fe9d72aaf25d96616e27b8d4591858155cc6d560699464bf249
-
SSDEEP
3072:Sjul6/5M7VmKeZ88Dkj7oR2SqwKJXtf5DGyVBQwIY6X4N:SocvZNDkYR2SqwK/AyVBQ9RIN
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2304 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 1280 rundll32.exe 1280 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/memory/2304-15-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2304-19-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2304-18-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2304-17-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2304-14-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2304-13-0x0000000000400000-0x000000000041A000-memory.dmp upx behavioral1/memory/2304-12-0x0000000000400000-0x000000000041A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB2A5BF1-C2FB-11EF-AB24-56CF32F83AF3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441319058" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2304 rundll32mgr.exe 2304 rundll32mgr.exe 2304 rundll32mgr.exe 2304 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 rundll32mgr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2304 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1280 2068 rundll32.exe 31 PID 2068 wrote to memory of 1280 2068 rundll32.exe 31 PID 2068 wrote to memory of 1280 2068 rundll32.exe 31 PID 2068 wrote to memory of 1280 2068 rundll32.exe 31 PID 2068 wrote to memory of 1280 2068 rundll32.exe 31 PID 2068 wrote to memory of 1280 2068 rundll32.exe 31 PID 2068 wrote to memory of 1280 2068 rundll32.exe 31 PID 1280 wrote to memory of 2304 1280 rundll32.exe 32 PID 1280 wrote to memory of 2304 1280 rundll32.exe 32 PID 1280 wrote to memory of 2304 1280 rundll32.exe 32 PID 1280 wrote to memory of 2304 1280 rundll32.exe 32 PID 2304 wrote to memory of 2820 2304 rundll32mgr.exe 33 PID 2304 wrote to memory of 2820 2304 rundll32mgr.exe 33 PID 2304 wrote to memory of 2820 2304 rundll32mgr.exe 33 PID 2304 wrote to memory of 2820 2304 rundll32mgr.exe 33 PID 2820 wrote to memory of 2768 2820 iexplore.exe 34 PID 2820 wrote to memory of 2768 2820 iexplore.exe 34 PID 2820 wrote to memory of 2768 2820 iexplore.exe 34 PID 2820 wrote to memory of 2768 2820 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc9c0e0ebbf2f2f0e5ce6b2907504ecabf46145d1159809d742de6dcaed29dcf.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657ea7f1aae90c9609571559ff0f4710
SHA1cf2d654c1df54e092c5cd9da0a285dc40fb640e9
SHA2568d563ebc56e7a4cf11e716db0b9dc86e47c9d6699adb562941eff0f85347935e
SHA5123dbbeb681d28c509d96e16519da0402539b564ce8ef9716dba58221aa16e5708f42e1f3fae082a5f17e565f15a2a38d000b78cc8fda277636ec1dc12a48341ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6139d2c81d427f7de0c26e15bda2e1f
SHA1873304c6c23c1ffaecb47cde096ff05b75a07948
SHA2560d9ca455a1a7eececf2245e4bb5412555d807a313587cff42531f026840094d3
SHA512122eae3d38d998ccc71cb0f3d1d6e0fdc7b5b4d73104aa7985f84b72b191d6653d3c19668c2e3fc9cafe126c11c4bcc9bab139afea50cf5f868e6665820dbb98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820417b365308b3602311102e4f259bd
SHA137f417da42aec05917a75e20c70393095843d4fd
SHA256476c971eb462d66f6af19168ca56cb9104b7e7c86b096f7f77e9e27ac16e64cd
SHA512351e0dbaf8690b68c9cb3261af3a0d7c846edafea0aec6c8f873e4604a47e0535ef159bf7be51565d67dbb432d1559774e30b7d503b4c004ab946432ffb6b06d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732aad48cfc3a1371d2255dbfa8e0597
SHA12b09ae9ba6f8856c0422090dcaf46c144d909701
SHA2569e731b4639633c143bbc93dd92ec27870fa450d0e52b12998cecaa39330a6af2
SHA512e03afe98305cee2d7fccccac45059765004996b305f2bc9485c5f30e80fb44b6576ebe0035b6d68f1ee1cf992f68f4433e538877e476f00527718cbfb801406c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc93e0e1a2e031b8194e019224215b2
SHA1c6dfb09baab8db9e732670d8b844cfbbab0b5447
SHA25669eea11f4641731e4114dae40457d2c7585e897581ea60959e3955f8171fd9ac
SHA512e35d135eb9ec6ab0678a619f31c1d9fd6ba42a77b0f7c1df366fadea53b4faa7480ae3e3a4c7b488e06940029bbcd6fa108e5e324f0b6bacbc837dd8a888cad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf340879622e0f89a8a1c7b71b30ca4b
SHA1abb96a91afe192f76dc2a61df01665d4f4b8655a
SHA2562b9376b2ad55e93cd4603549bf1135ca80f90e1160861eefdf6adeb1cee0be14
SHA512f0ccdcfe4cbd384fa478e1982a2025f0702ea265aa3652019f856179e8dcbdfa1b65b18f42f8ee013150fb945720d7e1285eb8028a742e1eedaffdbcf0d0ffb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851e146b2c22c3dad8afc5571a226187
SHA1d1c30069a2011233d73ddba1e63b8003f815e66d
SHA25675e6d73296d2c29de4118132d4fbc1ddcd84dfff4867f16e2b129cfefbaeae6b
SHA512c0b88a70eb48cc4598dffcbda46dededa4281387aeed1eefcd6f8fcc48963b5787cf0122cf185206f6339cbe2aa63657d6d52f0426acf1f790e7a7172541bee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0b8429cf8c8c6a9b9ee1f77259f748
SHA1de8f49aff30522b11e1e290a8f0414bdef8daa18
SHA25670bd814739e1de555ea3806ba1314fe102f8578f2caa5ef551a889577189654d
SHA512c02c719b0aa6a22e29a1b3ddbc73c5c5ccd657e68f1905c64454b258aaf2a41041daad560b44b42bae98252a8d85a0c272cef09f2a72f3d26d9454e5890ca7e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272a8d1e4860de0ff2d8a7fe57ffcd9c
SHA14ae109a2c156066c5d9bda7f962437aaef79290a
SHA256be68a9bee75860329cddbab94deb72468995d26140e930b22e3b21e5a6a6ade2
SHA512248254b1667837a240d8d642999c311e5a369152194ce51d6ea5f4147449a000b9e9bc3ae3040460c7328dbdbd04939eab5de92a9627314126dc61f10f32041a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ac9aca24d1cb96fec7081d767c4a9d
SHA1078bf0b88402a18996a5bd9076e22697b2171e67
SHA2565fd818fe5d06f365b1ec002a5d77618d1d2aedda771b7634dcb4f5fb5cec0b6a
SHA51251a6e9ce1ab6966b046e9b3cfa27d9e9e5f68519855102c1383a382bc8194900539c1f5a25d9ab5b6a4b7bfbb424b3449b6b3cbc3de18630483d354be42bd121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5664bdf465ca55c00d0a281838c3a3e2c
SHA1bd9904df0dbcb4166db2180e25c7d2a8e02cc76a
SHA2564f6f32a9bcf2f4e3d7121f01828855511cc87b6e7e847c49e1dd24ace59686da
SHA51200880e49bcb1b4f6d85908f52a9a7e8fd4c8d31866b489c2e573315cbc17c325738fa665c8eb3960b4f0ce3f9d075ad1078bcf52397f07b3b76fc7261410ad19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e5ebfc6573ab65fd18de32231632684
SHA120282c48191967066f57ddb283d11c69f4cf7ddb
SHA256146fc952a8d237063baae19bf8d8965511fd1ea9cae24c14476d54c34e8c9d1b
SHA51274e1748a04909a00339e258daf0f59500f65f0619a61a5d4ab8a37fd75a9b7670710298987233328c27dea2f83a657cf3678beaa32306c2ccc01ed1e639e5f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da772c777e5f47cf6a1aeb1a9645da6e
SHA132b9ff68d4cf7018c2ad49be99e1574f9066346f
SHA256cf1de6051e729702db80433cf793fdf25f41d3acba1da363a13ca6263d1f119d
SHA512bf8943d22d67e14dd530329ccb33e95c27bd528a4d61f32953250083ef91307688eb8aed0a1cd567fc343405a2102fefb779d8f05ac23951dfc8ada92d469136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539af37847292d6d54985d90c1959619b
SHA1eadb99792f593d547651378349e68be461114bca
SHA2563a20b3b9739a494c76850ed2a9477d86a69123d52c72f097f9d1aa0e6cbe87de
SHA512beff98eb8c7b0dd73b4e7b298a8a8e29de363d426d2494855cdecc302245443eedc05b6586e65fa551f865d8b4b79ae49de6dc9bc2b0ce10d897b0afde130f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8eaf63d82345800847e5c6a211065b6
SHA1a0d0ef11e2778446af89a215cdab27a8f406133d
SHA256f54edfd5b7758fb076f5c9f79d03eaf02e2bdc3e162cd7a2bde2dea97b4497ea
SHA51220df94a8c44752214847f7dd2723d1c86167b7e392e04acdef9f4b8da262a45fa8762d86aa8ba904daa000082450a43ac6ee49023efebd549435060a873bd0d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e471d14029d0e84c720f24c9fb64182c
SHA1a8cc851408819ebef727c0349ca5e01428683465
SHA256d839368dec25ac1e86a3e1f4445211689c63103e4473daa03a7141c5597eb2fe
SHA512d4afd3618eaa390061947fc9f18e5f7144ee82490a2b0ffe419162f0d841adb894a07211e3c2fd5793e8ab340b0abd7e20a0b1651b78eec93ba5b68cd0ce128d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dae0facfb3eddf31f45b434a64328d5
SHA1b5f39e6f6b3fd61c4473498489e2438694095a63
SHA25606ee761715ee4d3515e31272c7027f252df02882d25ce5fc37c7224a20fe6e8c
SHA512531746ae91f7cb0f7410f70d2c3fc8dc1ec317a23acf6be3cb6d73ef36a0b27bd4d93e6b984609ed3315be79eda4033ff9e1ef8d58a1f91c7e924e3778f03639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e2c253878927dc2db1313632521f0d
SHA1b4a32e10a4241a8848d18a1618e28c3bf28d4d18
SHA256461f537b6e8ed84caafaba158f880102b000cd8b4f8e51114bec42d200dfaa5f
SHA5126777d2bd6f62646bb73533bca35398766f7e45193744ece714acc53e1501ab4b48d40c1a84f8cb1677693f24c4ecce2aef9902bf7e54dc3244c365c3e69200e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
88KB
MD5fe76e62c9c90a4bea8f2c464dc867719
SHA1f0935e8b6c22dea5c6e9d4127f5c10363deba541
SHA2565705c47b229c893f67741480ed5e3bce60597b2bb0dd755fb1f499a23888d7d6
SHA5127d6d5bfb10df493ffea7132807be417b5a283d34a1cd49042390b2b927691fd53ecf8eee459c727844395f34e4230b2cd85b38b7fb7df0a3638b244d0c3f6394