Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe
-
Size
528KB
-
MD5
b5f210333ac06af9382cc5f751f7d98c
-
SHA1
f01d9828d3fc18977b7e4d7d38cce0b570944c07
-
SHA256
55bfcf21926a9ab2fa21728e5fb26a40466217b642098a5af6602328b609b0df
-
SHA512
7cf9f78311c4c23a5150f9f7fecb9069f6817d6dffb8fa4a7dff4a0166afbf9e9796f1bfcb556d06cf8cb3cefb0ffee1a00c493555d29d1a605dacbbeae8a2fd
-
SSDEEP
12288:mP6ys+NgzZhkDjhsrIY05dzfafdMjt4lzhy8yj:yBNUfkKt05NfQow
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98B48BA1-602B-11EF-9232-D6CBE06212A9} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000f72dbf2af1353b5132d7ffb76c995a73967a6999a30726a11df461a842fd7bd4000000000e80000000020000200000007f8d4fa2be37c106e898f94b88088a5c7aaa45756b7a0c5ccb0e04544bd3268720000000d68ea88657739a311ecde8dbb3226f9d62f18995db225d3ed925d0bd9903ff7c400000004f7586cfdd04bccae97b8847f460afbdfeafd4798f1d9a3721f5a3abead30776efee856ad882cf25cda49ffee05ace0a56c343783dd64d57523e9f8127b87acb IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430454450" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6095e26e38f4da01 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2592 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2608 b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2592 2608 b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe 30 PID 2608 wrote to memory of 2592 2608 b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe 30 PID 2608 wrote to memory of 2592 2608 b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe 30 PID 2608 wrote to memory of 2592 2608 b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe 30 PID 2592 wrote to memory of 2444 2592 IEXPLORE.EXE 31 PID 2592 wrote to memory of 2444 2592 IEXPLORE.EXE 31 PID 2592 wrote to memory of 2444 2592 IEXPLORE.EXE 31 PID 2592 wrote to memory of 2444 2592 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b5f210333ac06af9382cc5f751f7d98c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down9.tian-kong.com2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd71e8c7ac96376a1f6141391767cc1e
SHA1b53537085f05d54496d9a764edbd44dee837931c
SHA256c7f3144712b173d8406bbbcda0316f6f860991a29b1ba2629fec0f3dfc880b9d
SHA51257fb2bff475100c6cc4ad5b3ad1b499980d7a1653a0781e8f855ffa6bec5364cd77b8cdb34b2280c6c6d919361e14a5228ebc8be974b66866e378f0e74e36b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ece7674c9cc4488463f9fc18023341
SHA17668f04987895f4d5f96c759124f2b2c17fa5ae0
SHA256848e56d087d57d235876ead826146886f30753932a4baedb125531690b31e692
SHA51235872df62b66d61e724cfc1cad2c25a865ba9a66f2f4481befe626505ed3205bbc2510f89bba782f2e3b2bf0ecea8d773ac869165af88d68a09ff5702bbd0d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c71bfd515436957df4b613954d19a4d
SHA1a3680be38ca4a0f1514ae016a143f5378a63c3b4
SHA2567348ca339d3e6972d2f37c30d9c35e2fc46c9d1a8820d73cdf5806246e255c0f
SHA5123f5ed2ddb5c2443d35ecfb4a487682f3b3af2966f569de715e6d1788e7635a2b78888ca301e97fc71e9826a2d6d3d984bcbe9cfea796d10c8e5e49cdefce7174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656ea350c54e95e34f693854d87aac5f
SHA164722c42cc4b62f4f09b4c754441aa63bc274455
SHA256f88e78e9edf290a0d20aaf132cc4203fac14a7702068ed4fcf3ce233025fe395
SHA5127c86fde4c0c81a41a08069cf5d9739c29711cca516963642c644934c4c591f90b967222284201a953a220e27746eae02a09b9863cd9e8b8aa41dc9f3c7c551a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222782ede5777c7f5d27db36bfccb115
SHA1c812aa07324fbaf108eeb5dbacd2ae530fa9bfd0
SHA256b3d39d7f12f9ab84b4f9855987fcecaa91b1b7c06f3d64552874b025afa6d89f
SHA51287170405bad044a15829112c92fecddf81e9bb1058939c158523b8a272bb1d72dfecaebdafbe6713dafc9686b97b7671c3b1c7bcd8389c589bfef0e3afd3974d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fe6e9c13069500f857b1d096a7aa21
SHA12c812eb1557556d13f903f87e7b67517e9e6a71e
SHA2562fc2b5e99d5c1b5ef8cab58875efaa3ec46f9965bdf33b9eec406d91ec20ef1b
SHA512f8e530891ee3ad1634617458d703041181275be2c97ced9334d9a482421e53e7dee65525517664cef43f63c50787eacddb85fdaac628dd5b81a396778e7571ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b9efa0a2ace5fc3e4fb3d8749df0d6
SHA18700e2ef34186af3433c7fd9ac79915da07de66c
SHA256139c3d64432e37906a452ddd6b5cea6d10000566766b3a9439bd1097ac1067a8
SHA512a7a2a6a2ff52e861f5f35dfb3c446a945ed2bec782f3b1fe48906b443c72f7662238b37e0349de33d6520dbbe98af0730dfe4f0658829432f0d46c0dcd580c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2e2c09d85796521bc984127aef5aa1
SHA1d1b99bf34c43dfeecc79d58a4455d17dadae7c2b
SHA2568412fc98fb013095811bf954b075879c77f1467c714f9416f6e9e4ac0aa0d7f4
SHA51209889357946ccb3711c71e06f4cf851e8cb4f82964beda2a4dd7bd0cda215ad68b5d9f25ca9224494f650afd6e3f70acca86714b655952abf2d58bf034cba46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f820b1022a9d274ac4431af6b85e3770
SHA111d267df57f4655d7e2562651afe938458f803cc
SHA256b309f96dc06f5ed86dd54c7f91adbb3d7a585b1c966ae08c0459902eb7ce1a07
SHA5128dd6618c0d1734eb2dd974a18f1a23041bb49609c8e4ba0197da2a586a8ccc0e8a41f7c59c1a8b93d62553fdb3108944ee361bb15fb51a7529b0d83c2e975488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59b2f47e386bb527018b58ab93c07d0
SHA129a5e4045ba4fbff25cc060b58340e2de008767c
SHA2561c964c613c9e4762b09e33aa9cfaf17f84395061d4d2abcf5eaa79e8f55ac3fb
SHA512180cfa3bf6f3b83a32a0ba0ccdea8910ea7123d3afb1a9568789f54449b3141102bb4b4533c6cea10421828e438bd3c37314d7d2b56064ba5fa7434e67198feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de17d876941397441ad5de2917e5deae
SHA1a1cd36e5363270f81772cb8294c50fca4f5c60d3
SHA256f1979c7ab2d3084602ef52cf1cbdafb68e0fa2488a8b76a28f0ca93bb1d623a2
SHA5123d4b747e280782bd7a132027ed6488cb665df668dda8427bae43945721e68ab0013b4d34746255b5eec95400fe53e0893702bf53e36f02541ca31316819f2cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f46a7461688e4d91ced1f1ba72205b7
SHA1a975a34a1c0b111bedd32a717475a52541fb2997
SHA25698f254f7325864340a372f4201d513871d3bbd26c5f314e32c592d705fbf174f
SHA5122c6e7b2df61df48ba245b4b53b6bd5d74c4d57f43265225c8c86c0c7fa9395ee767b146fa3ab5a1e01b59337a274a346e612d468a967e7bc4ec32d6c1d8cc54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e63bd13030db79313aad0bc6419441
SHA1e4b6e3de2887afcff25bcb6bf7395118e5d2c7af
SHA2561c7d106ef6fbc1d0fd51ebc295bfaf2b77c9b0e961cfc05bf0db7f835dec1b50
SHA5125b78ed727dc68cf2f585c53bc34b3d86fd5f88cd6834bb5e945fb35775f788df2e13dc022dab796587f3b21ffe0f28efda65414054cdbdd46419b8fcdadbd09d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5375070a5212e47004ea67d3b25e42
SHA1b9e605972f1e0097e7fb99de72b2ae22f369059d
SHA256f666b9b992a1a2aaf6f251ece5dfd6cf182d0146dfb9017380f318ab9ca6d6e9
SHA51234bf5483e5336a67293f0ff90ace2251fd02e26cf15f07c0a1083f978fae11e93e189afc8275ccb75b3f861f4622039b66c44bd699041dd54cf94dc01d0c1494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889ad5774de3345a3994832eb777c7c1
SHA123e2f97797d5473c8b968dea026660916d28bb9d
SHA2566fff4418c89398bfbfbe01fba336df6143cc1ac7d01cca9e6fe28a061d272ccf
SHA5128cf21ccec131099c3e76823a04c1b8676e17e3ff51cb9f039ac1f18d22748b852a411a3fa46b8627ed82874869cdfd6e9f72dff91a2029afd08b7b970923f995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626e9f16260dc416c234b431277aebfa
SHA16ef06f97c63a23b1579b43add1625fd60cee6783
SHA256531d0f1f4b0f93f8606589b3fb03a63f4a34abc350b7279beceac91f8355a6b9
SHA51284c4147c0ae8e408b0114860de1b45da38c125facb698bf2fc602ef521314eafe17c748fdcc160bd844fd9850ee5adf14e2146f295deddca505aed63ede55a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31e9800340a7429da5452bb461fe9c2
SHA1857945fd70c25a3567b280184d153eaa9e27eabe
SHA2560cad65c3634debf26564e15c3ba51f43c50fc372192d9ddc05f1d4abce167665
SHA5128d4927a5aa658e37c9c11ebdbe6d04281176bda0cf30eee1f4444bb82b5ff6545bdbcfb8ac7b58212b6e39f7e1d1c2bb0302bb487bbcadeadf20c17aaf46e4ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b2caa910ef50e13ffadde802256719
SHA1eaa1c4502842ed30470be85de93f528f46722280
SHA256f8455b0eb1dd456e784340b92951ca2ad56bbb6e145c1b69139688e55a0eed66
SHA5123368ab4d6e84008efb1a31853b7193f684ec99306468529bcba0b52033a436daea5e311ac97a628f6a79f9adce74d3e2f192ca4c15b4159fe2269d9f38b6d33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53294ce3586b92403c5273549b73dc64f
SHA1a3664dffa8f10cb654936cef145818fcddd6edf9
SHA25654a673e0a3be4ff7675b44c87bf1cd2995d20984805c4ceefb81b175d48c5276
SHA512debe0d93a31d23a20b6d7f3682e46d58792cd6a117dc9bddb26f31831adfbcc72132b5986fa666b6bc2d67623b5ec870032aed4ca0335abf41d08c4aa905dbc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b