Analysis
-
max time kernel
73s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 05:41
Behavioral task
behavioral1
Sample
Release/Guna.UI2.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Release/Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Release/HAVOC-Injector.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Release/HAVOC-Injector.exe
Resource
win10v2004-20240802-en
General
-
Target
Release/HAVOC-Injector.exe
-
Size
7.3MB
-
MD5
8c7749c7bad82ce89360100c85aade36
-
SHA1
c15469f1e1e670f526962a57d9da7dfb86f78fa4
-
SHA256
bd999cdb5d849091a18dca558820f2a81358d5287f8aacbb1ba2fe1219b75b17
-
SHA512
c8661b24823be7d25f0a979206c931e28e19d0e46861c49c0ba201ce6a7b86ef479a81457525a315663b48f4197000b17cc1aba40b4df47bebf13897e29b6f47
-
SSDEEP
196608:EC3xHVal0QebYVrIFWUT/TEZN7tRkaYQGaKYbzjqzKXi9mH4X:Dh1y0QXrIFWUEZrRzbzjBXi9Q4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000d7dea80d368034b09c253d409f46c4d86393d516c1361f90d95cc36167f17c17000000000e8000000002000020000000c4d3fd50026782a785a5cf7cb5a1a42ca8cd4bf69fb05104214165352704061820000000aaeb73cd02a6d3988b3cd4dd9f7c7fc5f784fc11f0b7e319b419d62da48cbcc440000000b9803f953ae37fb922b6ec660d88d4560c8747bd48ffba1685646b3ad6cdc54590a1b53297ace3131007ec77e68204be4e902aea67f3602c4c9b0e771d580f14 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{626A6B21-65C9-11EF-B75B-4298DBAE743E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40172838d6f9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431071976" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c920000000002000000000010660000000100002000000069c49ae11612ae2076478845973d1e62ff005ad756c6e433363a63129a89d1d2000000000e8000000002000020000000500c5ed31a5d77a3725ec8d78b81df6d575da56224043950eddd3014e9e86931900000007c79972fb8f7e610d730c1b8395fda29463d0939ab50616d7e19b153d553ba44012f6ce88185a7aaf21446b57087a19dc92c8d433c16ba8437b44f28f66374df19bbcb9181c806c144a96952cadeeb43527fcc0889de883b8b1fb97652c58ff46520186525006c1cfde61fc399ec1364b1d518d6aea30de2a2604addb8a0f1e39bb86af35acc16c015914d036896059440000000703f337c641465416effdca3937c68eb5fa73d4fb9f973c10b1b732c1f187d8b622c0d7ef369b1a15889202938aa373b0792414a2423bf0cc0ae49492d9692df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2976 2688 HAVOC-Injector.exe 30 PID 2688 wrote to memory of 2976 2688 HAVOC-Injector.exe 30 PID 2688 wrote to memory of 2976 2688 HAVOC-Injector.exe 30 PID 2976 wrote to memory of 2732 2976 iexplore.exe 31 PID 2976 wrote to memory of 2732 2976 iexplore.exe 31 PID 2976 wrote to memory of 2732 2976 iexplore.exe 31 PID 2976 wrote to memory of 2732 2976 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Release\HAVOC-Injector.exe"C:\Users\Admin\AppData\Local\Temp\Release\HAVOC-Injector.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=HAVOC-Injector.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417bff5c2a38ade3e7e1affab3605305
SHA13ea8b2dbe30c3a4c03bba9b6d27e1bc57d40ea41
SHA256bd549e5ef919a81fd84f925dd840da06a05dc8010b61a1fd37de82e39149478d
SHA512a312b0b179b58c351c9785bdcb16109a8254e8dcb390c0bfd4828ae45cbfa6debe62756e82e34db8ca096721e83e39a5edeba0830426b66a83a3b71f816d5cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8f35560fcf5199ef3b5b155e3042ff
SHA1e10c296d45f456631877b74fd874a9b767f239f5
SHA256f20ea7e5fa68d792d04828e77889eba9aa610ce3d4cff3af0b592cf7ab338a01
SHA5120902898fd547470c9187e9617281562487f9a8eca6856060933010599c1e10cda01443ef9a4db8027cf61e71e42c91288282f99e7c6b353eb48a5ed033456ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596aa27b5a8c42b12ca1786818501d68e
SHA1abc5621c6759274d9c88f468b63d286b06517fd2
SHA2563a80c6e5718f29c0c2e101765b357776ce369ee98bca9ceedee8fcafdd2cac1f
SHA512b5cfdc0d2bf84ab3e6d8e82093420359059f43ff05616c516fcd43cec5dd4a4db06aa10f921aacdfbb7e33f3b619771e259e8ee29b17c28afc28851f2193b344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68537bebac8f3995ed76773b577bd22
SHA11285f9111402a694c2bf7748201581960249058d
SHA256dd3bed8b600ffe956d0df5ac4a251e908cf92ce01a9df6aaf2993b32665a0e7e
SHA512c3799a6c7e6973fad05a467fbad65301d5acdf2bcf280acaa8bb4291be9df8e54932741037fc69465266b80777fb0eaf77ccdf52ae702791c44baad178709110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b30fd22ac90c497668752a0f6bffe6d
SHA1401fb5ca03e83bc5fb2e16e507c809cd5bfe5dcf
SHA25625cbbb6d7a754623fe48e711a1a4e26fbfb5e1069ee58323d12f31834a96975c
SHA5123a836809d1e4c73a56e84f97d63f3277fa5dc59b8b26cd2a4e13a9ca70266d24ae97cdfc19a413a0c432f36e7151e93dc9a25dc00a3198a08e23d7744b2bcbbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509bcc94cc015730b13b27cae2541b7da
SHA1789acd5d97598597765526b6a82319926ab52342
SHA25644bb769988896e0d928ac310f262f236a537fe701c2084e2d3ae57700fd83249
SHA512d513b8b9dfbb868cfeeabeebf45cc3afb0bb9a980cb509d757aaff9e4ad08b679901fafa4555e3e42c427eb0a5532e38e425d8fab64a754c09da521f502ef45a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942b852edbb248573faf95c5311cf7d6
SHA19ce383464b8f9af5fa551cea1d00106abdef33e3
SHA256e18f855ab29755b76e736e324047156ab74a523ed4f2c3f174973fc4fefaa7c3
SHA512befb44d912b66c13976d5d5466f709c539e9792b596a90edd6d59f67f28e76788a5dec9b782ea301359be4705e793d92f2d6e08c7d50072be958f11f5e068a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617e523de85d1030f25c7f84df344ad1
SHA13b0c55ea5657086e1ab5dcf8c686d230157e0a3f
SHA25600c32e9f9a77f26df63c55884ac3ccfd5447cce1dc9b57514f2ff43bfc4b7634
SHA512ede969db06cac340b038096310b8537358f52768c393a4a9d41e8f572758a75f0bc01e56ab54765a8e1eeb2b81c177c3a893a2711b0b86ac2511dcfbf0e819d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55169fa794f877adc0e6894ed363534a4
SHA1fa0263ac0be8cf15b6f50df8f7bc76ea7bdb9ca7
SHA2560ec0cefdcba9ad818bfe703fcc21d80f14227c1daba5986cb11168a643f6d9a6
SHA5122a1af2dab304924a51e1dca3ff63e8a31974825ea3f1a9c3bbd0da42363bed4564f373b5670d3a76cd38b1bba73e18352d017e4d45828f8d4fd889287a63beda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca1c67e9f2fa1b2bca420062b8d80df3
SHA1614a7bcbe043dc4b114606d838e409b4516940f8
SHA2565d05cdbd0c9ebcc5f8ced016f951e74a5d1075f2aa8008f5d99968e47dd60793
SHA512da139f3d54611c478b320d6c2f8b0a1d87b74e1e97c4b95b310b13d151e2df44e3f254d3c271ce37aaf767fd38c602f6f47caca26f14a5238760bc57bd63d3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52760013c938f4f74e069b320c81479b7
SHA16c0e15c2019ef05e250c3d5cbe29267a1ded3d3c
SHA256732f48fe57c156f8eb53817ba653d212fb4b4178cc94f009352d8fdbbcbf8447
SHA5124dce834f4d67d27adf83664c2d5d894aba2c89f76e5b815e9959c5f41d744f6bfc88f1e42c4b0ecb591ce48f775eee76744e84b864f05444f3eeced2fbcde8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add6c6fd6ab7033868cf33bd001a582f
SHA1309f6e088957a2cf7d49bea88e97deef69066a5e
SHA2567a4a08ec1c41287beda663e00f2ee6246d0891da6cd3838288d9938530b682ba
SHA512f2038e545bec01122723d41e1209c2b4fc778ab9507b690830b50e39de777ba2ec3e9a71197b64d25ba5a4d872d9dba6813bbf6182a6629f33a0cb3d6e057d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522fd7a6e81a6788e6234ac9c20169e82
SHA112bec4519813589daac4bbda70351965e4cfabfe
SHA256076434ec32d91a3a953b1cb904f07b6c3a82e1e1c602975dfe83c736cd8feaa1
SHA512c7c98c17e91d5f064e8dce9de9411b55cd7fe21c3d57ed58dcf2b6b06bc1cf61ed447426c26d38d653873124f22c2e086ff81c377cd77669b4692e4fce022fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2df0817751384dd7387506fe9b7207
SHA1107ce8f73e79261bf88119c9dc61b1be6b4686c0
SHA2569fec86460141ccd120a93e6d281b3cfd6f7b03cd27066e356ab333a14c71953c
SHA5127fbeae8abf327b1408493c560aae7fb24ac90b4e86d6d35bc097a278dfebcdd7bc6d69f4a0b00be20268cece5509f59940968a5b9c69dd4cd142678270a4b417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3466dcb29cd5a1677181f2014d9d181
SHA14f97d1121b549af447a798bcb1f549fa72483051
SHA256d990ea269e118aeec118c4331f65bd327bb8769ce967200d2c70bbbda6298f08
SHA51203262133007bf4dc5ca8a9bb0193af488aea950fddfe52a367782f167732c3c293da6791474202ac8ac9dc3722664f77987bf19d22e6ae4c9badd31acdac5235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf832c8af81a65576685a9d84cf8268
SHA15db65c46d7043cfb4711fce7dfc27c2720314741
SHA25626cd5a80ab59f5693a367ad4ccf76aa8a52f4edab06c610375c1791681ba5ea6
SHA51202c15b9929d031349e9c9732f402d24026cabe66c626a91a0002b3b16eef1ee6f6b0bac1de87e117a12f77eaf789034b6681710edb85d58e986b4566351067e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd8ab19b200b4420fbabf6de87dffda
SHA1ed4821efe860255928ee5dcae3edf20ca9151632
SHA25612cffc0ce86df361781b038562d6c2cec83aab684fd576cb6fe81c2447dd5e2e
SHA512b83cc6ffdfc493605dd63afa79a5abddc997bb13f35f5117c85e431d8c2f7303e2e865c7dc8afeed55efbc555737c487f3ec5cd766a806619c30f20053cc7054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9af003b513fe8d0382205243a098cd
SHA1af069db7e0c2d533a5abb996cca366ab987c516c
SHA25676b4fad80e4d82c388fccbe66866e3d5059c2b887eb2704083dbd1e68de11c8d
SHA512a682bf2db450b5f3a3302831fe87b2f99c8717c675a531f41c0dee302eca2ab9cbd3272a157e0a141c6a7bb974d33220e74c9858f83879e374f672c5f41bf190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbcc4f8f372e8314c417839b43aebcf
SHA105095e6b1245e6c3f68c50466de6aa747a48d6ca
SHA256f75e590d2c4749eeb9565b9f863954081a2e31bd8360dd457ba2107aa14b1aa4
SHA512e5fc2955d79371c687b69f0db404d5ee07489f3da37bfdf6ccfb7899803878c4aa8d520ad1b2b0ea91b76a95203ced1bb571361297db56c87df2bf39cbfaca91
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b