Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 21:22
Static task
static1
Behavioral task
behavioral1
Sample
1ca3e95625babd3a1a3c4d4f12cac3d4114d9a57b7307114677b1512b82824d5.dll
Resource
win7-20240903-en
General
-
Target
1ca3e95625babd3a1a3c4d4f12cac3d4114d9a57b7307114677b1512b82824d5.dll
-
Size
248KB
-
MD5
4019a364b7f2ae74ccb5d32723f8ce0c
-
SHA1
a364e4ca9e57e4f8c9377f1581e0a912c8dbc057
-
SHA256
1ca3e95625babd3a1a3c4d4f12cac3d4114d9a57b7307114677b1512b82824d5
-
SHA512
807741bc1f70f2698108ad0697e94a6d20b5676bbbe7d968028108b91e248c8c7c0e6a2cc13bdcd3b4f55017d0195df10d4b5fc8c7ca800998f44948870c034d
-
SSDEEP
3072:tTNHkK//zNkgc4TDx0CBf35l215OzoKnItkWRPcv8uv3LlsAEQiw0p9dJ6:xlzNcCBf3r4g5kvuv3h5riPbdJ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1432 rundll32Srv.exe 1424 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1252 rundll32.exe 1432 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0007000000012117-2.dat upx behavioral1/memory/1432-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1432-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1424-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1424-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1424-22-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px906D.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443656424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC6115B1-D83D-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1424 DesktopLayer.exe 1424 DesktopLayer.exe 1424 DesktopLayer.exe 1424 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 2156 wrote to memory of 1252 2156 rundll32.exe 30 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1252 wrote to memory of 1432 1252 rundll32.exe 31 PID 1432 wrote to memory of 1424 1432 rundll32Srv.exe 32 PID 1432 wrote to memory of 1424 1432 rundll32Srv.exe 32 PID 1432 wrote to memory of 1424 1432 rundll32Srv.exe 32 PID 1432 wrote to memory of 1424 1432 rundll32Srv.exe 32 PID 1424 wrote to memory of 2924 1424 DesktopLayer.exe 33 PID 1424 wrote to memory of 2924 1424 DesktopLayer.exe 33 PID 1424 wrote to memory of 2924 1424 DesktopLayer.exe 33 PID 1424 wrote to memory of 2924 1424 DesktopLayer.exe 33 PID 2924 wrote to memory of 2888 2924 iexplore.exe 34 PID 2924 wrote to memory of 2888 2924 iexplore.exe 34 PID 2924 wrote to memory of 2888 2924 iexplore.exe 34 PID 2924 wrote to memory of 2888 2924 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ca3e95625babd3a1a3c4d4f12cac3d4114d9a57b7307114677b1512b82824d5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ca3e95625babd3a1a3c4d4f12cac3d4114d9a57b7307114677b1512b82824d5.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df41132c3edffa960e52f71f9d3fb2b
SHA1611f0f4b91b81fc890c6184f00422048275e62fc
SHA256443ee3b2387b5e64749a11ae2c46bc5d378bd8aea83bad4d157fe75068505643
SHA512a542ec1e35884d0c0d033f75abee4b6ac5ffe77717bf3bb4d3ad6fba5c3ef401fff9e8b1d07b10e782390520be6cc585841bc8dbe48c18d568bd866e81587631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fb563146dfa1fe67e3d923fb74918b9
SHA1ee84809667091f4c4af8de45b5f4ec92e3efc053
SHA256da1d1a38bebfd4863287842a80c5f39dd39d869b3a2e844c7b1dc0214778ded3
SHA51218b3f30a2c3486ef0b2fd10d63c5f71f1ff7b5fce7c53198edcd1416df2e3a230eaeac582f891fa9a369625896842b60805caa52c16fe449fe53302a86cff6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab1d7cdc1693c4cc81473bbba246f01
SHA102ab9766710b222ed087c2bcf1dd89a136974560
SHA256ed78f7f1309b7fd6f4d49e111245d564e207548970ef501a3b8078b8627b2b52
SHA512c4d69f5d6a039242d969c3c4e02ae691030769992215c8b6d87034731aa49e8f70e642deb625a9270ddb6f60eb8d1288cf9cc16361c41e176530a210b7d322f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2cd5d8e03c1e13d7edd9dc41b8f9f6f
SHA1ee576b177ebb231759635e0168082f096613f491
SHA256fda87b436288ffadee002c7e4a04aacbed8bf2f1c5b105ff03cb255a65cc3261
SHA512ba479546367ce5d8159221066bade5f4a3354a61f5bf4c55ea55bdf478863cf7e1c817a3d44b397176f409ee06fb3b1e6c9aa050193fe36647d477998b1eb0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f29e5dba771a71e9fae99b239b6e51
SHA1cd393635d26aa414c52b843d214784aeb0bcc582
SHA256baa66838fdb1836d8b5146ee6893b60db45e5e39f3da088108841f75ca6bac51
SHA51218009fd1e73e6c4540deea8c1afc077c72c7ab01a2d114b5b7c8cbc739f6ba92a8af80bfc22a3d13e246946284ac6b6f06a8860c422a26593137e1ba684e7a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5e2becf3fbbf1ee86e1cf683083555c
SHA1279fdcde2e7e0f8b69be13220398ed4dd32311b6
SHA2565581760570968a9660bb4397a77f4fda66c8674420a8d346713e6513c1193501
SHA5124368da0a2cc74abf953a743b92062a1d8a98df30ee92bf85f3e9a3dfb3552d26f526e9e57368db0b3c3b3323893b761bd364161282d36f3ef9f57638c44544b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c597271c9644d198453923e31bda8f
SHA1fa9960fa8d7f51670237a850020efad68ddfcd6c
SHA256e8eb1872a3c621e569b3bf00207566b33bb3c59a3d8ff992f44b0a7cc2e9f8d3
SHA512a0a9d039ed650f5a7732d1b4a17bbdf40420fa9c74bc4037e791b249371e8b2740b272671ef31a2005bbfdf46143f752600da6593f343a236c5d2e45ac73976f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e047d6fa927774bf451172375308a4
SHA13eeaa25eeb0f0bf73627768dbf8ea69539c929a9
SHA2569f7ea5ba6d16675779d446a325eb413763c4192766189618fcd374d2d80ce05b
SHA5128c38e79871382620a08494fb2d0ef9c34d8b9036aac25a78704538069c00d5881739f119be44ae2e1e6f86e0fd8a1deefe4859c697ce3af4927f0324d6d35720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914e8ff4192c28e2b79d516d5d65bd97
SHA1472bf6f065bf707d24107302a7fa1985017df0fb
SHA256581b47cf8b3cf412dd693557e691394d5190e0aa270b97091e9f57e43b734bbb
SHA51211c4f05edbaafbd2d56de58b6147938dd155d00427763e82fe1a52c7f7e8937d62179cfc738b748ee876eb455c7d7bfecaf11cb985bb445e68efa2dae1e87ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d43d5697e5ebf109d76cac76cebcf8cb
SHA1b78199b29e6176736ba6f57d6a0b96855087af90
SHA2562ee391273cc3356fdaa36ebdfe0db6504b78d2468577fcf530ae2c9387890688
SHA512f9cd34509cf1a208a8518fd42c451e4b849c8c29fd921522bd31ff1b04c1bb798349a911d5982f9d9369fe795d9f58c0f8f4f581ead787f56603d0cadbf349b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805d0609a71f5c980837c372f97fd306
SHA1bcc0327b5580416cd0c84c4da7bbb37336982eee
SHA256ba8bd89cc0e1f4f8b957762edc8a0bb4f3ce805d76d47ed425b067a08a8a8930
SHA512fb214cc0deee57944104e066233c07d2719f16733563a60baf15130fde311c620023d34d480152caf9e0e72f421449c8a1194c19a8ebb6bdd6b4817c33085b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53159dabd3a4a0a86616439433a077f83
SHA140a5d61c5dfaccf22320d8ec556bc4d97528a5ed
SHA25601524a752ab526523934f69e54dca17868d30f2f2e784fd1d0ce3c9372a2b8cb
SHA512a2c5f99cac3fc6161ad78459593831054001d753843e88f72557a323640fe7baf7b5ff44c7310b0074fc119d46837b526cec656fb6db2379a86da803b262156f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f70be36623d750ef10c488c2ee2e7e
SHA18da2246f6f96eb32fd3ec56f5dd6c6868d701ec9
SHA25604ed1f13b68538470481eb8a034cebd222e718550d633f1f5db55a25d90926f8
SHA512c21d382494b9ba7bb0dc48c51a045c087adc58b3851bd2b30fafb3ec7351dc82eafb9822807feb5cceb1b6648fec5cf900caa898f131b078b20c580887ded52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44b8510d26b97b779b72bd1409dae66
SHA1d8620b103938d476b40cf3af33191649a72c2513
SHA256ef088722072918658629770fa252f7c72e4f5790a5430b205c5ef7ca5bec5cd7
SHA512055b426d68ee4d244fa3b21699115f72388cb4ca87030d096c4b87cf63c82d03660adc968c904d093a2a381d4ee6bc60856ef0af887977ebaaf23efea6c27489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc603f4ffe8efaf5a5b419faa322317
SHA1f9ac3041772484c578e75337752632b98c0b33d6
SHA2563414c778972d5e5ab4b4badce4c94d5ef623c16f6dbac9fb81ba898abc56a88d
SHA512db440bbc48caed69369bac0961ebb2acd3849932ca5bb9cc7255d8bc4b1b19e8fc3786323273484dbb4504b93fb542e50a7e317b4297a9bcf677e31943b083f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830e1f21bd5b908ec2ba012984375e30
SHA1551cdc283dcb780d52fb7ead47a55a1a948592f3
SHA256672bf204046a2afd0fc9201baa47ec2a1b80420eee4f507b4502f9fd47a2cd8d
SHA5126c5300c63b3100a8c148a312e5be148ff29775541b5e11055ed2016cf9e93b76820c45d35366504567169399d1128fa5d24eb5e44682be9338566553f669c20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c7c1fbe6c81d528d27f623db0e1e29
SHA170176c5596c556ac8b3426d61ab8a4825a5f958e
SHA256840ec65c2cc939ed106530c28c1a015c4774257ce4b861b819820ccbdebca6bf
SHA5124a0e35b40867912c74812dcbd06dcf1bf6fd773ca928078a9adebbcdac36e01680de7d6f1e9b14388f916e96de0de17850c3e349994d0a85f4fd42f58e6ee507
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a