Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 07:24
Static task
static1
Behavioral task
behavioral1
Sample
b43a72a6725d4342dda03210e19e35307e74ef03b3a9757f928663af10f001ac.dll
Resource
win7-20240729-en
General
-
Target
b43a72a6725d4342dda03210e19e35307e74ef03b3a9757f928663af10f001ac.dll
-
Size
472KB
-
MD5
1a0e44f069192ecdb59268f16d9b47fd
-
SHA1
3df64c67076d0d05873a6adf93eeb156373a7f34
-
SHA256
b43a72a6725d4342dda03210e19e35307e74ef03b3a9757f928663af10f001ac
-
SHA512
56054ba51028587dc21467e758f56b2377db0ccadc5b59c78c717e00df0183a534884f0b8d522fc7389ea71a493afabd52f71b9e9504aba5b2f82c09356aae7c
-
SSDEEP
12288:Rlg7Vk6XmpPS0IbAMFL3cKncXbk7saeW4S0K+x2th:RlgKWAwL3cKncXgwaeWV
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2844 rundll32Srv.exe 2704 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2724 rundll32.exe 2844 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/memory/2704-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2704-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x0007000000018710-19.dat upx behavioral1/memory/2704-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2704-17-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2844-8-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px20D9.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443433347" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7230AF51-D636-11EF-AD31-F6257521C448} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2704 DesktopLayer.exe 2704 DesktopLayer.exe 2704 DesktopLayer.exe 2704 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3008 iexplore.exe 3008 iexplore.exe 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE 1752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2724 2140 rundll32.exe 30 PID 2140 wrote to memory of 2724 2140 rundll32.exe 30 PID 2140 wrote to memory of 2724 2140 rundll32.exe 30 PID 2140 wrote to memory of 2724 2140 rundll32.exe 30 PID 2140 wrote to memory of 2724 2140 rundll32.exe 30 PID 2140 wrote to memory of 2724 2140 rundll32.exe 30 PID 2140 wrote to memory of 2724 2140 rundll32.exe 30 PID 2724 wrote to memory of 2844 2724 rundll32.exe 31 PID 2724 wrote to memory of 2844 2724 rundll32.exe 31 PID 2724 wrote to memory of 2844 2724 rundll32.exe 31 PID 2724 wrote to memory of 2844 2724 rundll32.exe 31 PID 2844 wrote to memory of 2704 2844 rundll32Srv.exe 32 PID 2844 wrote to memory of 2704 2844 rundll32Srv.exe 32 PID 2844 wrote to memory of 2704 2844 rundll32Srv.exe 32 PID 2844 wrote to memory of 2704 2844 rundll32Srv.exe 32 PID 2704 wrote to memory of 3008 2704 DesktopLayer.exe 33 PID 2704 wrote to memory of 3008 2704 DesktopLayer.exe 33 PID 2704 wrote to memory of 3008 2704 DesktopLayer.exe 33 PID 2704 wrote to memory of 3008 2704 DesktopLayer.exe 33 PID 3008 wrote to memory of 1752 3008 iexplore.exe 34 PID 3008 wrote to memory of 1752 3008 iexplore.exe 34 PID 3008 wrote to memory of 1752 3008 iexplore.exe 34 PID 3008 wrote to memory of 1752 3008 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b43a72a6725d4342dda03210e19e35307e74ef03b3a9757f928663af10f001ac.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b43a72a6725d4342dda03210e19e35307e74ef03b3a9757f928663af10f001ac.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3008 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1752
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea948b4d74cc2ba39375715b997d75f
SHA127f33716cad4e2ac9b581b5010d36cf04a2501fa
SHA256eab9e94f28d86a4177f0b66e9f13d4ab497cd5a1492d16bc5d0a4649c3a03326
SHA5124ce67e6668c2cd9cc65a73136049519fcdbb3442ec3073b822a82f19a78295c525f06820b9413dd45ffca3b05679ec31103dc670760b38883b85d6ea1904e015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591dff0eae95edb4818ce4aad17c34be9
SHA134ca8665a971f5a4e2a6c3507ea4e39f48b19b5b
SHA256c377c48e7d25c2ce5467f018d5fe1659df775b8c53d78daa7b6f0f21b2a283df
SHA512facdcf6ffae04bfdd2bb1b8d16fc3390bdfaa2ac0bc93a1bb9289954b2d33421a9805f50fa06d39cd55d2bf0e834e86db213b1536f1be4a8c2e3544e35faacd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c3baad1265057f814940174ce7ae04e
SHA123defa8f852f1d65ca223dc173a49e73dd367231
SHA2565e46205baa6c45d47c4d67ab32f6a74d230d8c99d123ca1ee66a057b56953e29
SHA51255442d863277f54417b93a65a224118a4500112bbe3653c81f4a69409fb7fe8b1015bb07dd6389f4eba251bde24f340c7fc1de1cadfb43eed1bb2e46fcd7b7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0d76a30cc7a9da3f3bdae94e8ed623
SHA1efaeda5b01eeca3bd81c641169703d24061d2938
SHA2568895147a11b90512a8b55949178ba003bcd5995c64f6c62dd5b6bf2918f40335
SHA5127d89d995e1aa253c7700f705061a50a28cc0831df4b23bee45ce5d2c3a977df0f04c1d6a811629bc5d128ce94264cd59e8b491403d9e2d52ec414879e3e5a28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b10e0324bf32b645e5798aa048428ff9
SHA1cdb59d1ca0c65b2f68a6bf082a9f0d6be761e8d4
SHA25684f37b23a698bc3da9168ce750e3ab7831dfecedc09b577f5548be0f28fa5d1a
SHA51282fc51de4fa9fedf1d1de3f1576110e10a1a137ba26af6287a5de667f34dfbb80dd005963e481687f0c05509e1d7fd1d8592ca9d1942289b0268586db2874327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29f7c08f52e3d312fbd435877d83468
SHA19c8a2d95ff3f9b826603ac05274118722c8158d1
SHA25653b736f422392da3fe3baa7b0e124e5424d349c2b93a7f9862992b672b09ce20
SHA51284a2af9fe542d9f4bc40648ed69524e87e1c5c629e1b992913154a187f6f7cf0975d98120e5a123d760a12df4e018b5d27c8acc29a4f6a60a4506e814e03e675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e2c180571357e66689c2bcf45c9eff3
SHA11da4742120a8f16819f5c6d3480dee64d8c1eecd
SHA2560b8d7d17cb04382afc2cfa0d295c8cd49e90c2fce5a08da8a728fd37e8abc1da
SHA5125708955339ddcaeeeeef0ad089805ebe0ad3edc9eaa58231210366b954109f0a05b1480de5f8e6605312e1074e44f778e275dc4ebeea6627fbbdbce1b76f4f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ac3af185c5cd23c8eccbd87e4b33f3
SHA143a9fdbbd4b85159ea39539db05f81f97ca3c41f
SHA25612747e4b6ac6f132d234b121696ba0fb4596f5d7467de8dc2c28a3f236dbd5a8
SHA512410aa49fd1147e3dea91a19a8f2e7a29edf0be3f946fffc9abaa0c75843356a235c25b2b3d128f31e0a7ed285440b7fdf9c12e2113b056616e2d2b05bedd52ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6f5525e144e0b76a0c083e0b1898b9e
SHA15044e13ad165a5a271977fc5392300154f4f2a14
SHA256944f7a2cc1dbea775493a46e37b22c0075c45ba37749a7735df85dd44e4678af
SHA5122cd40fe6aaca2468e88fa8cfa6bc1f8a746e2daeaf915fda00f72637417122451f7366b973197342471b14326bc00911e6b6c9101ea269a6ec9b47950a370556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7058150f2a338a3953cd044f7a83ca
SHA18eb78c919cc720b36cdf734ec9a95efa9d4a5c92
SHA2566b8985e6b582dd365c1ae71b4405fa0d98ec14f4e255bd70179a8ea48a958eec
SHA51248b8db84a3a48ae0aa7eba768d93c84dde26d628b5332065415904278ea4662e00e1868246861f2bd880b4a29221bbbc7f4adbc82c0342bb1382a757c99173f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5113e8256482e12f4a8ba76f40ae0c
SHA13fa0a535b403d6493141509596fa8b99eedbc125
SHA256d3194d8bdbb2a5bf2061a49e1839f557c581efc2237a3beb7faf4230e7dc5818
SHA512d75606fcd7d98cbc856b450fc306293bb48c0dab8ce04cd1a6d941256a0f2821ac6cd939e0cd5d4ff6a0e343eadad4334bbd9c2cbad3e236ecff387111f41ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c962c431902b0bcc7cb053464239ba88
SHA1dee37141f9979b9762935b54842b833adbc488e1
SHA256beb53b5efe92525d1c47a3ce308ae26053dde7eb94aca260d56d1ca15b211b0d
SHA5122305d2f0041869daeb13af324e4fb1d55215726774d345a7b5fd38bfbac07b6df81df5335df40cb0adc5a3994d583b9553097b4f2df1e4e0dda1a943d5d79c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ac60b5dc906cdcef99280c9ba5909e
SHA188f33d213353df518434bd111352fd5254751461
SHA2569821c6d18aaf3cc24711df5ed89b3d4896c9d3d94d63ba829ac6eef8eee98a76
SHA512c9eb852539a4c45a9fab09e2135881fec3dcca57beb325c46d39a5248ab2bc602c68bd79bf05211a51e0264a1cfbde96044b26c406b603c100967ec7a8f0e7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a57c50ea165232ef974b2c2f2e3188
SHA16721ad57bc601c06a995a7d7acb1f7edffbefc4b
SHA256e46643b9be3c6b01f682da25a66aec55180b3f2d2ab9758c3b1c111dee9142c6
SHA5126923ed0198c46a40ac98d899814fe76cc8e0dc6e60f57fb362b5dff3ae9c2a01c521db9bce7533c917d7dccd0242f19f2aef5036a2b39541c4a5391687c81aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbb42cd59082998ecc06559e485c9a4
SHA174d43fd7fefde9173934de80d2623ccee62718a4
SHA256b155787c4ba51258590c2aec8d71f115bf9110ddd6d90f0f1a0abe4438592913
SHA512daeca230f6ee046e7b8e41388c2d10173fd3da08d60cf46f3f21366c40d6e010405e2f98402c738eeb63e105ba1acdc971b33db07185d1f5eb3fde50d1a70856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c84b3f767fa4d749caff477fa7b9ea38
SHA1bc2e850056e6b6ebf29f418ff1ab57f1b02c1b57
SHA256c4b8a37de92de5ab8331161fe8ad22930071af6317e931ae4cba6fc7d931aa11
SHA5121156fdedecbe0f46b33240cbc0092e5be394248bcd4446a84f5d88a4dda5b91b47cdfefb4ec45fee412ed44065eb459e1ffaf4f123ebc12c4ed2d40c1bc5d451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2dbea575b3dc9cd9c46280c0d2b599e
SHA15f52bd5c4b92751c085c81381b0af4ad3c1c76b1
SHA25691cc81db0ca0ec0b0ba785f303415478816c50c799806b8173c5518f01bb37f8
SHA512a814fc1d25a99f3914739a905ba9d7d1f11e89402fc3ea32a516f4685e105bb198ec09a3f85f6aa980c95125e8fe8ab525e5e448f70d3123beb225516c97d923
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b