Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 21:29
Static task
static1
Behavioral task
behavioral1
Sample
VirusShare_00abf6c6f4d819fe1657027edb147133.exe
Resource
win7-20240903-en
General
-
Target
VirusShare_00abf6c6f4d819fe1657027edb147133.exe
-
Size
151KB
-
MD5
00abf6c6f4d819fe1657027edb147133
-
SHA1
c1715530dbce6bcc3ade47ca4f059412b7310fcd
-
SHA256
2b478e8b7eefbfe81058165b2bb9dccd50b4db9795917872480cd646c1981d2c
-
SHA512
5b64a37a0edece1a07b3736b679695cccd1ff9483d269907b5b8099b848849a148879b787bb669ac298b3e5952034bdf5d7debb4b3e5aa848c4af0b31643c9ce
-
SSDEEP
1536:JR0vxn3Pc0LCH9MtbvabUDzJYWu3BmiIuw22Jn1fbO4VkgcJzH/A7XUk:JR2xn3k0CdM1vabyzJYWqQa2ygcB/A7
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2540 WaterMark.exe -
Loads dropped DLL 2 IoCs
pid Process 2520 VirusShare_00abf6c6f4d819fe1657027edb147133.exe 2520 VirusShare_00abf6c6f4d819fe1657027edb147133.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/2520-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2520-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2520-6-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2520-4-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2520-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2520-3-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2520-1-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2540-27-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2540-28-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2540-71-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2540-70-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2540-594-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\Ole DB\sqlxmlx.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libjpeg_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\weather.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\micaut.dll svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\mshwgst.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\msdia90.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\WindowsBase.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\InkSeg.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\MSPVWCTL.DLL svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\it-IT\cpu.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\ALRTINTL.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\imjplm.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\epl-v10.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\PresentationCore.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libschroedinger_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\d3d9\libdirect3d9_filters_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\logger\libconsole_logger_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libfreeze_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Media Player\mpvis.DLL svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msdaremr.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_imem_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\cryptocme2.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunmscapi.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libaddonsfsstorage_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\spu\libmosaic_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libyuvp_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\clock.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\libxslt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\en-US\settings.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libaom_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libmkv_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\librv32_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\dao360.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\npt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\Mozilla Firefox\d3dcompiler_47.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Web.Entity.Design.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwgl_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\hxdsui.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\verify.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\WindowsFormsIntegration.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\Microsoft.Build.Utilities.v3.5.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Utilities.v3.5.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libmono_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Mail\WinMail.exe svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\odffilt.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\offfiltx.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe svchost.exe File opened for modification C:\Program Files\Windows Portable Devices\sqmapi.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\hxdsui.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\tiptsf.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libuleaddvaudio_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\misc\libvod_rtsp_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libparam_eq_plugin.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\mojo_core.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VirusShare_00abf6c6f4d819fe1657027edb147133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2540 WaterMark.exe 2540 WaterMark.exe 2540 WaterMark.exe 2540 WaterMark.exe 2540 WaterMark.exe 2540 WaterMark.exe 2540 WaterMark.exe 2540 WaterMark.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe 1272 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2540 WaterMark.exe Token: SeDebugPrivilege 1272 svchost.exe Token: SeDebugPrivilege 2540 WaterMark.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2520 VirusShare_00abf6c6f4d819fe1657027edb147133.exe 2540 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2540 2520 VirusShare_00abf6c6f4d819fe1657027edb147133.exe 30 PID 2520 wrote to memory of 2540 2520 VirusShare_00abf6c6f4d819fe1657027edb147133.exe 30 PID 2520 wrote to memory of 2540 2520 VirusShare_00abf6c6f4d819fe1657027edb147133.exe 30 PID 2520 wrote to memory of 2540 2520 VirusShare_00abf6c6f4d819fe1657027edb147133.exe 30 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 2168 2540 WaterMark.exe 31 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 2540 wrote to memory of 1272 2540 WaterMark.exe 32 PID 1272 wrote to memory of 256 1272 svchost.exe 1 PID 1272 wrote to memory of 256 1272 svchost.exe 1 PID 1272 wrote to memory of 256 1272 svchost.exe 1 PID 1272 wrote to memory of 256 1272 svchost.exe 1 PID 1272 wrote to memory of 256 1272 svchost.exe 1 PID 1272 wrote to memory of 336 1272 svchost.exe 2 PID 1272 wrote to memory of 336 1272 svchost.exe 2 PID 1272 wrote to memory of 336 1272 svchost.exe 2 PID 1272 wrote to memory of 336 1272 svchost.exe 2 PID 1272 wrote to memory of 336 1272 svchost.exe 2 PID 1272 wrote to memory of 384 1272 svchost.exe 3 PID 1272 wrote to memory of 384 1272 svchost.exe 3 PID 1272 wrote to memory of 384 1272 svchost.exe 3 PID 1272 wrote to memory of 384 1272 svchost.exe 3 PID 1272 wrote to memory of 384 1272 svchost.exe 3 PID 1272 wrote to memory of 392 1272 svchost.exe 4 PID 1272 wrote to memory of 392 1272 svchost.exe 4 PID 1272 wrote to memory of 392 1272 svchost.exe 4 PID 1272 wrote to memory of 392 1272 svchost.exe 4 PID 1272 wrote to memory of 392 1272 svchost.exe 4 PID 1272 wrote to memory of 432 1272 svchost.exe 5 PID 1272 wrote to memory of 432 1272 svchost.exe 5 PID 1272 wrote to memory of 432 1272 svchost.exe 5 PID 1272 wrote to memory of 432 1272 svchost.exe 5 PID 1272 wrote to memory of 432 1272 svchost.exe 5 PID 1272 wrote to memory of 476 1272 svchost.exe 6 PID 1272 wrote to memory of 476 1272 svchost.exe 6 PID 1272 wrote to memory of 476 1272 svchost.exe 6 PID 1272 wrote to memory of 476 1272 svchost.exe 6 PID 1272 wrote to memory of 476 1272 svchost.exe 6 PID 1272 wrote to memory of 492 1272 svchost.exe 7 PID 1272 wrote to memory of 492 1272 svchost.exe 7 PID 1272 wrote to memory of 492 1272 svchost.exe 7 PID 1272 wrote to memory of 492 1272 svchost.exe 7 PID 1272 wrote to memory of 492 1272 svchost.exe 7 PID 1272 wrote to memory of 500 1272 svchost.exe 8 PID 1272 wrote to memory of 500 1272 svchost.exe 8 PID 1272 wrote to memory of 500 1272 svchost.exe 8 PID 1272 wrote to memory of 500 1272 svchost.exe 8 PID 1272 wrote to memory of 500 1272 svchost.exe 8
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:596
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1716
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:328
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:676
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:740
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:796
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1148
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:848
-
C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2584
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:112
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1004
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1060
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1100
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1532
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2268
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2240
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:492
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\VirusShare_00abf6c6f4d819fe1657027edb147133.exe"C:\Users\Admin\AppData\Local\Temp\VirusShare_00abf6c6f4d819fe1657027edb147133.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize316KB
MD582ed6b8333dd8d2f00e75b6b9171d884
SHA1389b59edbef8efe95552b535e2cb9053259d6257
SHA256785a528b4df25e1121e94c5ff897e0ea8665288e280bf06e20f703a57dac5580
SHA5121a918b94c6d3c2fdaef3e967e3e6317087d5454099f3483352e785452c3177150f73621391d468df385e512e6ebb643fe8dcaf8177add7e2dc5ccb2e43741e6c
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize312KB
MD5b64a3f6d8b4ce7c3a0585e943b307732
SHA174ca91cae31af30de6f590ddeb0525001d18b1bc
SHA2568c8469dfb73b675351bc0a663c92f14cfb643f9057d0eacea34c685c97c47d7d
SHA51221a459543c3c3928895ff2977053f377bab1db14061f347f94ab0d2be4255381b80a7bfecc93db7ed135c535d30a90bcd0b1899756616c4df19c52c8aef3e114
-
Filesize
151KB
MD500abf6c6f4d819fe1657027edb147133
SHA1c1715530dbce6bcc3ade47ca4f059412b7310fcd
SHA2562b478e8b7eefbfe81058165b2bb9dccd50b4db9795917872480cd646c1981d2c
SHA5125b64a37a0edece1a07b3736b679695cccd1ff9483d269907b5b8099b848849a148879b787bb669ac298b3e5952034bdf5d7debb4b3e5aa848c4af0b31643c9ce