Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
b9dcb8e662edc8b85032299916c130ee
-
SHA1
c88a88633aabb34f5af68736c5e4a978934eab53
-
SHA256
dcca9147ba7d6c59460cea7171e90d2e96c83d2d7930d4c38fedc31198fe34bc
-
SHA512
318b4a78201915e388ecbbc3917b6c68d87ea7a59a10b07e1cdbe3222907ac40550d141b5188a53e56751b8c0840c2052a6eda22eb4d2a6e108db6817a474bfd
-
SSDEEP
24576:rGMIrmQHoYQXM8AzbuOK9XAex60FlJ5tyrtnWCr+JUpAHKbQlInFvCuGG2rGRJRr:crmeQc8ebmHl3t0WCq0bQWnFgzGRJRJZ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0eaa253fdf4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430538912" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F882801-60F0-11EF-B65B-6A2ECC9B5790} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000620024c2331c7d926c7e0505bba5fd7b9374ae8ee6b2113cb4621277e0396c75000000000e8000000002000020000000eb9b3fc3dd73180e74cae944fd58085906e22f3c7fb030c3166e05daf6a06b002000000060c195af785852cb45ee771b33eef49f1fc3e87bc6558838499611758fb84d81400000002ac4a3a4e6fc9fdb9ee5a021a5c27be04d418c26b20b7e89fa932fae8d9aa3b739cd7b7e72d11f36f846b9ee35bd43d395dbc33319ad73bedfa4da40e91fc790 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2208 b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2208 b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe 2052 iexplore.exe 2052 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2052 2208 b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2052 2208 b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2052 2208 b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe 30 PID 2208 wrote to memory of 2052 2208 b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2772 2052 iexplore.exe 31 PID 2052 wrote to memory of 2772 2052 iexplore.exe 31 PID 2052 wrote to memory of 2772 2052 iexplore.exe 31 PID 2052 wrote to memory of 2772 2052 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9dcb8e662edc8b85032299916c130ee_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.tux-hack.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01e33e8a85ca366bfd3f222667bb776
SHA1bd5aec41aea4d061c532d6b525e6a6a68475d434
SHA256e97a6a9ea71f661aa5cc6c4c124c42620c50d396a079cc554db1b3ffc1e4ab1d
SHA512c6cce9c3677e0a3f0feeaa6d836742cddd91216052fb3ed4819e9d9ed488b3e9012c4c9bbac2eac0a759737b4c2752dfe1b1668e287d6c27c3b4aac4f5b9ece9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf86f49d85eced56ad954387e2d7f4d
SHA12098bb2b6781d700b501bf54c2be779b94e1a1c3
SHA2561404b6cc09912d38a33111bc18f3eaf07477daf03fd8c9ec5f85ef0adb38db92
SHA512b176ac1e01748acb70cbe05cdfddd8b006c9fa946a75e84f52831bd4b074c694c5472b10f7020c4b3a675118c26a55d7e68fd865bf2b15934223d23aa5b6b15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634d8669d56f53a762d445b22453fbbd
SHA15d82cb912f4d8cd57a3f408b7a7313700b7418c0
SHA256b06f8606a40cae133a5196fda2e600df5866b1a2e35395caa47a101f41dac924
SHA5129a56ac78feb12e05fb59ae09718ecaed075edcefb12ba349138778df522cc38d0c2c4d9d525292ea3111c59c8014670440d12acc6d25c508e1a8c874bcef7a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e623970fe347104e9175f358e0eff7e2
SHA1b413fcbf385be75f5c0783fd62e6fb694bd1b964
SHA256346740b25a26e011bfb27fad3a07a49600015f3ef19a5dc1db7fab6e81c45458
SHA5123a8370d230f5ab4a1cc1bd88a12ed35bdd21b3303e3d9ed451a166f5315a854c74f7a6330260158bfac015135dd8ff18ef87118b717c3578471779ba727e349a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ae349e1f47e9bc0d5165280125b00f
SHA187e655e73fd3e9eae4070c11ad892d6add7fa1a4
SHA256e89b6e37a579e649f6857b96fff63752094085b35c52617ef759c7ac73e3baab
SHA5128557184b718af22f2aa222e29b5a710908c3d1469b6a5471e4a27d3b24dd932dbd92aa4e61315d323abf83430b8826f05819a905893c9b587a692f134aaa8751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9461095bebaa40f764fbdd88c6cb22
SHA124f35a0a58066fa86c913354ea0764fafa5af50c
SHA25649b1758edfe89d1bbe76798d9c773a840af49ef4c1e495788d9e8ebc6d8f6e67
SHA512ca5b676a6685d2f30998665e7abae9f929f7758103e3ce863abcf7248c47bacfd3a3857eb6e087dc2202b4a53d3c332c7108c78a1866bd01a08321ed92b3535e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba4cc189b291964b07d702a3b315009
SHA155d64154a9f2a33962397273a7104b213037d25d
SHA2562db797358a9a6c30a8073a26728792d2614bc9c30ac0689452db1d3257c7ef7e
SHA5121de88df2e20aa2e49c3264028d6f19bfce6add7d1a1537e14ef04db03aa0e12e85fb18870f0fbb17f62ecc101a9b06b0eaa777641379d5e2abb1aaee13a4dc14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ae717effa48ea02892c550412e36dc8
SHA1cfdddf0ce3e3d55ad1bc10637c4cb852d1943e0f
SHA256dfddf0aab8bd511db7aa88705eacb2e4c74e0562626ea49a9d75946a8900d23d
SHA512299393ae6f6ba81a482592b3d6ea73459e0bae8bf870c450bd27c0d63ebd05f0e34c7fb430cd62256b9c5cfc177b6d2afd612db0dcfacc978ccecc8042672c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d198c0ad601be482bbc75cdeed95e1
SHA1892226d3d1e8eda2561c9c1a848367e096d64ee0
SHA2568a1d39d0997702a2113d2de9b9ae29c362701be12c358f94b5334eb00baf4dc7
SHA5125a029400e14c8e38e1fa757e6696d1fbb08b6bb16fef4f917485c5d0d0f8a13b59b325d3207df1d09891ba00c71ab88bb5bed0e6e5d93071978c79991ba89e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504adbde4102eb4ac8285aad45cf4a196
SHA187bdfdf8e5ab6a3f87246f078d74f9b24c28f982
SHA256f87d30c1748314ab7b1167f76bb90d83c7596938e5370a3605b562fa55345eed
SHA512c87112224cba630ff99a953f153f147b7a655af426130e7da1c081df4842b2ba06a40533382413ac5617841978849214981c9f0df019130f27ad4471b3b82700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb2f4255ea08a4c014d4ae53fc95c1f
SHA12ee957c146abaa0f62cc5c35a3f581614438537c
SHA25692e6aaced86835de037929676123711239929da0a8324c8f3a2577616ffd811b
SHA512fc7532fe8f0ef0394bc725c85bd5c9a319e4a63648bfd69f38f5735729ba060fe3557a5a590386b03d8c1ac35ff8b0e064f969584312aaa5b967a88debb354fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6cc07491254b21d9206ac36f5daec8
SHA11e77d4ebd66ca9f015a97a0da0238412fc60fdbe
SHA256c8908cc05634ccf456b6db0709fa8df87ed67af02514e0cd529205a37b885ac9
SHA5123dc70eb7a9ee190e57379f10807fe3ff9776f6af2071ea0c056280fd5683b418e1c1c88702639f1d686897ee08cf9580328b2666c6760f97c227cbd95aa8042d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918e7fe59740dd97a93e7f312557e10f
SHA18df09f36cde555026270ba58631bb5360dd2ed69
SHA2569f1de1904b68baefdc72c566f3b7e82ac8532387c716ee0a2b03b710dbc5f212
SHA5128b08edb5e21de8ff7da1301dac79d1e949b5838f88f76267eea8060bb1a8eedbe51bb2812ec5bda635f298a4a6dac58b98cd0815be32dc54098dec318f571191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9e86f4f34c485c9d97e5f51d15e0a7
SHA1f6c84f364a84573a80518349651764d1ede1ca51
SHA256f6c0816ffaa980cdf632ef326293269780d43a50b39b14308a2de32f2fa72989
SHA51280d0b470c1e4c1916afbe759b204c52622b7fc3dc812455aa571d00097de0ab0c825e5d70c212615167a1c80840310351990180cd1b98bf3b3d90aab7749e7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55257d7e9109db025fa98fb9ed704192d
SHA177637051936592343dca125c278734e3ba511cac
SHA2568931694b989a01477756953805a433ec9a8c7768e5462e394412e470ef6fd4ff
SHA512fe3aeabdfc9dc48b22517153ec8015325f2e4010e6c3bbd8a9f0baa1da0f4fc38258116890eb1858bb190be1153a26112203d456187883bcb8ee0f4871685858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8010cadb5b0fcbf0a68ee757d6ea33
SHA18443a679e1097b3538113961a79d567a8c465388
SHA25688f68bd74640ac8a40756692397c5063411501d65ff06f5622f5ac3c6d0c3657
SHA51215ebf500a91f752bfba5aaf6a54d241c82f6e6e53d5b6145db222c6d79b926240ba63cf7250aee69476c985309eeef11098d23b645501ec97e0b5be533e52a82
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\favicon[1].htm
Filesize781B
MD52729cc561520f64b45e445f799a9d93e
SHA10b326a4b5ee8d2d7f65e524546e511fa1bd35841
SHA25645cacb4e8a64b03f9376304811aac7e75687556fa30feeb0ba386caf773ebfaa
SHA512387fd84b4f75e71e419d81ac1fff30ad5413f662fa8dfae7e524ad9f2fbba2961102fa5c73a963f3affd90fa1dc24f3668d5dc9579c592b739fe90db7a27ba44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b