Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
-
Size
496KB
-
MD5
b352690c5cabe0b0d2bb4300a2e8d78b
-
SHA1
c5e3f94b8e4335d4c8d062efad6c215e7cdc6616
-
SHA256
12328c3a65d746a4205c2b27f7e884212c2c7c515eb127788b371ea96e000372
-
SHA512
103775f213655b829019282d97d901e5fe78e81eab7fc521486dcc7244d6ce9fdb0d82e0108d5854d496421c331e3570fc205837da7a3f98e4cdfd45c0156bdf
-
SSDEEP
12288:deUDKuE/KOFuxc0bWN+NOO3MqHpiCIbflrMUs:de1LhsNbWN+TMqJADFMv
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 2332 taskmrg.exe 1844 taskmrg.exe 2616 taskmrg.exe 2676 taskmrg.exe 1616 taskmrg.exe 1668 taskmrg.exe 2884 taskmrg.exe 2164 taskmrg.exe 2596 taskmrg.exe 1020 taskmrg.exe 940 taskmrg.exe 2568 taskmrg.exe 3028 taskmrg.exe 2200 taskmrg.exe 2516 taskmrg.exe 2440 taskmrg.exe 2864 taskmrg.exe 2660 taskmrg.exe 2860 taskmrg.exe 2612 taskmrg.exe -
Loads dropped DLL 21 IoCs
pid Process 3008 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 3008 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 2332 taskmrg.exe 1844 taskmrg.exe 1844 taskmrg.exe 2676 taskmrg.exe 2676 taskmrg.exe 1668 taskmrg.exe 1668 taskmrg.exe 2164 taskmrg.exe 2164 taskmrg.exe 1020 taskmrg.exe 1020 taskmrg.exe 2568 taskmrg.exe 2568 taskmrg.exe 2200 taskmrg.exe 2200 taskmrg.exe 2440 taskmrg.exe 2440 taskmrg.exe 2660 taskmrg.exe 2660 taskmrg.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 1312 set thread context of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 2332 set thread context of 1844 2332 taskmrg.exe 32 PID 2616 set thread context of 2676 2616 taskmrg.exe 35 PID 1616 set thread context of 1668 1616 taskmrg.exe 37 PID 2884 set thread context of 2164 2884 taskmrg.exe 39 PID 2596 set thread context of 1020 2596 taskmrg.exe 41 PID 940 set thread context of 2568 940 taskmrg.exe 43 PID 3028 set thread context of 2200 3028 taskmrg.exe 45 PID 2516 set thread context of 2440 2516 taskmrg.exe 47 PID 2864 set thread context of 2660 2864 taskmrg.exe 49 PID 2860 set thread context of 2612 2860 taskmrg.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 2332 taskmrg.exe 2616 taskmrg.exe 1616 taskmrg.exe 2884 taskmrg.exe 2596 taskmrg.exe 940 taskmrg.exe 3028 taskmrg.exe 2516 taskmrg.exe 2864 taskmrg.exe 2860 taskmrg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 1312 wrote to memory of 3008 1312 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2332 3008 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2332 3008 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2332 3008 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 31 PID 3008 wrote to memory of 2332 3008 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 31 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 2332 wrote to memory of 1844 2332 taskmrg.exe 32 PID 1844 wrote to memory of 2616 1844 taskmrg.exe 34 PID 1844 wrote to memory of 2616 1844 taskmrg.exe 34 PID 1844 wrote to memory of 2616 1844 taskmrg.exe 34 PID 1844 wrote to memory of 2616 1844 taskmrg.exe 34 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2616 wrote to memory of 2676 2616 taskmrg.exe 35 PID 2676 wrote to memory of 1616 2676 taskmrg.exe 36 PID 2676 wrote to memory of 1616 2676 taskmrg.exe 36 PID 2676 wrote to memory of 1616 2676 taskmrg.exe 36 PID 2676 wrote to memory of 1616 2676 taskmrg.exe 36 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1616 wrote to memory of 1668 1616 taskmrg.exe 37 PID 1668 wrote to memory of 2884 1668 taskmrg.exe 38 PID 1668 wrote to memory of 2884 1668 taskmrg.exe 38 PID 1668 wrote to memory of 2884 1668 taskmrg.exe 38 PID 1668 wrote to memory of 2884 1668 taskmrg.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 492 "C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\taskmrg.exe492 "C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3028 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Windows\SysWOW64\taskmrg.exe524 "C:\Windows\SysWOW64\taskmrg.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3551809350-4263495960-1443967649-1000\699c4b9cdebca7aaea5193cae8a50098_5a410d66-f84f-4a6b-9b29-3982febe58d9
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
496KB
MD5b352690c5cabe0b0d2bb4300a2e8d78b
SHA1c5e3f94b8e4335d4c8d062efad6c215e7cdc6616
SHA25612328c3a65d746a4205c2b27f7e884212c2c7c515eb127788b371ea96e000372
SHA512103775f213655b829019282d97d901e5fe78e81eab7fc521486dcc7244d6ce9fdb0d82e0108d5854d496421c331e3570fc205837da7a3f98e4cdfd45c0156bdf