Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 20:17
Static task
static1
Behavioral task
behavioral1
Sample
12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea.dll
Resource
win7-20241010-en
General
-
Target
12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea.dll
-
Size
112KB
-
MD5
c44d74cd5f55241ad2faaeb8d78b2468
-
SHA1
09f12dcbb401e37ec2a5c788fca38650b5af227c
-
SHA256
12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea
-
SHA512
20fc1c909d626d7db46b9d58ebc459f92326f2bc73b8424c7ef47c85824ab5b81c756a95871f7844256c7ca3dfa37238f6ff9b069d8dce80fab892a376b7ee32
-
SSDEEP
1536:ileniGoqPB7yMaDMfKHiLinL6nDBBvoyV2um0uqcqh2SZN0H7o4eOC4VdtRj:8fGBPDffE6nDBTeVhSzK7o43Cij
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2532 rundll32Srv.exe 1888 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1764 rundll32.exe 2532 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0009000000016ace-8.dat upx behavioral1/memory/2532-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2532-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1888-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2532-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2532-18-0x00000000002E0000-0x000000000030E000-memory.dmp upx behavioral1/memory/1888-25-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1888-24-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxFC1A.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DC275F1-D9C7-11EF-9358-7ACF20914AD0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443825312" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1888 DesktopLayer.exe 1888 DesktopLayer.exe 1888 DesktopLayer.exe 1888 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1764 wrote to memory of 2532 1764 rundll32.exe 32 PID 1764 wrote to memory of 2532 1764 rundll32.exe 32 PID 1764 wrote to memory of 2532 1764 rundll32.exe 32 PID 1764 wrote to memory of 2532 1764 rundll32.exe 32 PID 2532 wrote to memory of 1888 2532 rundll32Srv.exe 33 PID 2532 wrote to memory of 1888 2532 rundll32Srv.exe 33 PID 2532 wrote to memory of 1888 2532 rundll32Srv.exe 33 PID 2532 wrote to memory of 1888 2532 rundll32Srv.exe 33 PID 1888 wrote to memory of 2140 1888 DesktopLayer.exe 34 PID 1888 wrote to memory of 2140 1888 DesktopLayer.exe 34 PID 1888 wrote to memory of 2140 1888 DesktopLayer.exe 34 PID 1888 wrote to memory of 2140 1888 DesktopLayer.exe 34 PID 2140 wrote to memory of 2800 2140 iexplore.exe 35 PID 2140 wrote to memory of 2800 2140 iexplore.exe 35 PID 2140 wrote to memory of 2800 2140 iexplore.exe 35 PID 2140 wrote to memory of 2800 2140 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\12de3ea9345ab2fb69ac26749ed8922c5fff2ca931af5f924766bd36739174ea.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c512f86873a6e27cfd92b6ee84380915
SHA1492e836a375b37963833fa4271faafe26c95f23b
SHA2565848f18be168930314e214f2787b48e85b65e2a2ca61ad34bca5c56c6fd788cb
SHA512a3eae0111d2238b7eab2e32047492d75ef00f00759dfb1f9b447eb55c4b1ea817b6fb4431bd75c42a6152fe0c3cb4af419b1a13428bdc1d8704078419d71705c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754fdd52bacb3d27a9933d6d8559a520
SHA140bca9531fdb8fb84898758e1a486f9eaa2ddf8c
SHA25632547c731764bbb03c6c1c6f80948c68c2a125aab42e8a13b058a09d315f015c
SHA512e105b760b98be922f1c2d6c36caf7b967a36ac867bf15b1bb15e44756e32d5aee9069c9e4e6f85d7ff16008f200af3e714604bc3b0dfd2b8a756e8319b68fbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429a5d01ef8b5ded7a1c9b84765a49f3
SHA195a7c59127a4c3263a4b0d52f24fbd60eb5e0952
SHA25648251482b4bf3a4b5a030886ecdea61476a8cfceb2c2e1314c6d49acad8f1127
SHA512174d6b5cca295eee086548362cd37d5e57685c488984905bbdc599c72324b8b1e819bf45f4e5f9dde3e71e9e7a0fce67386a8881b5fbbcd08189970a93545737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59be939908618a148d7311049f81cdfaa
SHA123a8725d1dbf674dc4076bc95f9e21248fa1e118
SHA2564a36159046bb7c44b589c4e4cd13100005f2b8bd7eca5a6ed5ba51f18d16c951
SHA512b1587d01c67ec3b888aa8b398cf6597fdf364f1cc68aac9c8ddb7e94e5a73d76dadbdd7f963cc56f163b5e44fb449ad7b522e82937960495f4e6303f211175f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fd2806d137855317e6417face68c3e
SHA1b726682a233c5e4effe3d0a200ea477525ee1f17
SHA256dc6b654dcb560b61317a6812d7f29bad054efdc14de7232b03905424db347fa8
SHA51233df493bcde4a213298bb21c146985ff9327f47906770e1d426272e8b2362a91f6c716d4490356ddcf122a86afc742014c13e64198f38ba006ee7755c0f32ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe0766041f305dfce391caa82a73db2
SHA13fad913b2ac6d8254eadbd71b6f4dc939370aa23
SHA256dbc05307f1d0009cb3d9e9714e9744bf18c45e8e97e53e661d1dbf52b9b37007
SHA51230cd31c4bd71a9adf9a2b51439af0ebb470d3254356dde060e3ae1e58577555ce128aa045de0ae4ff00dc614ae11c26725f5f979f6d690f2f4c82341a0e8bac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9ca822d973bc9eca56816844d6d530
SHA1a022f4499beb260ccca441d9f333877a61d7a5b6
SHA256e74aa31935b317bde9a812e315dacd3ff3a0558c4c0f20fa55afb445b65ec0c7
SHA51277a2c4ce27f7387147ac6aa22b18863e1908f7f9f9ddeafcd0994769dad22a6b5b34bbab98050ef8e9df95fb554dc2e5d4830282097a8b275b2cbbe2d0ebe3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcdabdbd01348fd62f41b8cc755d21d
SHA1d545c83473c60556e806df8deb1906775dcf8f10
SHA25603ff50ddb29cec9dab88a4fd3235d17ae20824f09aa65a1ec3ee4bff7e9331fd
SHA512450283d52fbfe715b51701625785c0d6f070b77e3f79537b3edf341cd6af9d62b431c4245624e22bf3cc3ba64cd2c982fc996ea7d3d60719afaa1d009d399527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f724c270fd987eb32700faa88a30f2
SHA17249b96e096740d328e4d9968c3a4a98d38fe89b
SHA256b492f07bfe0faf57bf62b31633918eccd7b157eab0cb14a4322cffbb9eac9fc8
SHA512550160add467526192ea7f8119c8a2cf2fb39c76572268d5dc0271fc6ecc8f8b594abea37f39b82e13317f35d145dd48e566aea9171c5e29be142e1c85f18dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121e74c41be73d5328bd78b2346e900a
SHA1008c9a0885708cddea6147ec6f4f2ed5d18a88ea
SHA256068bdcb88da8a006f2b71963f3d02694a3e02a9ce67ceb59095f1cd411c45cba
SHA51217019b9ccb73b42078c96025f027d874f97962455b5dec58799f2aa5de8e4cc2cba5d7f21856f5c1c504c1a0423620044a4747343385a28b7641b6b5eaa00142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252fd60e16b6c4d804de17ff666f32e6
SHA1e21bbe605e2f0574567d03fa1ef2d14ab78db4da
SHA256a7bced43f1d93905a948dcf8e58d735cbf116348a437eaec89fe116825f8929b
SHA51277719f088ef41abff2691abc6e72238a67e626c97f4320171dfa4a54a6188076945e7fecc5820a7efdff5b2a1aea6a8f9e487fe64e6f63e91f4a2ad14e387443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00e743b80d684dc9f1b843ed39de759
SHA1f4c0d8326b466afb70e55072a082342bffd83098
SHA25687c91476b141fd965b263b19b41320787977a5db8c33dc31116fad1126dd8ca8
SHA5124571c104215ddb3867acce9d4911f50b24fc00930b7f738a95aaf28a922b9cde9e9efa423ac7e5ed7297c56cc38464923674fe1250cc88056c0a4549e9788969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7347f8621ead1fe22f9c6d9879e83d1
SHA1a56b5848a962d2cc8baf00ad6bbf5d679756d609
SHA256f32b9418776d45d433fcccba90d9c9caeea73f465a5a76d60248be492fb133fb
SHA512c1f65034618bdf6b62a19b451b8941ebef75a840759bd0649c4b83c85534d1a4fe8afde34ce7504a0bc6506cb825654279c98fadcb9288d12d2366225ee03b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521de52a6ef825b3856c049331d2e9601
SHA16a55751656534d94f5229a85cd12d2277a0b3b49
SHA2561692737bd769db78c38f5c004893375d10020bcf70639daec62dde901ff93f8a
SHA5127edd66945766e3aa8786b434b4d90c9fbb27ef0f1f78531f45de63deda01e7d20667e3441678122fd5496337e01767d04b7ad849f40f772b48f6872be05ea7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538cf0ed2ab26b12c94110629bc40ef29
SHA1d3af4153a2f5e52efcc692dc0de48acc91e51d2d
SHA256bb50a95869de540756d8594f717667a1dc8309929b3ea439e0e3e25a69882b30
SHA51234701b883cd5c5ae836e8690970b22297e06d786d94f16d51c7d74db7149e646e798f4e8c2c4365ca78b7e73b82052d9983a6d8479f5c69ec23853815d21f821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ed80992e7f91b8bfaee7ebfd3db5b7
SHA1588f17f5609e30450246b5878569f37fe88bdeb3
SHA25694ef2e5e765a05e4ffe090a2ea8ae64ac6ee437a4d528e0fa3accab62ab7e08f
SHA512f93abfb3ef897b77385a7eac39af8156dcd9e4fb085d79d8e1b0923cf2d861e51e11fc71f0b24f96f96048d74f2aeb19c8bfb7ce4ef9eaa699485179a4f94f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cbdaeb368cc682b3c57d06671d7ab17
SHA187045d69604fb3125a5a040b81e81fe1e16a1ab8
SHA2568ce4e26a795870b15b9f793250b444077f2cdb1b3c77f0a1faec141fabc85e16
SHA5125a33e4c08686c339456b25808e60cb8bf9704894ba7959e99c531160df89a879b4a156728e3518c280af22501ddc0fba5e7eed6a71070792a4ff68ba50a6411c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a