Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
8e5a0624aa7ec01576efd33354e63bdb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8e5a0624aa7ec01576efd33354e63bdb_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8e5a0624aa7ec01576efd33354e63bdb_JaffaCakes118.html
-
Size
4KB
-
MD5
8e5a0624aa7ec01576efd33354e63bdb
-
SHA1
fd2f08528f38f8809dfb241adc59700f439d2c9d
-
SHA256
faddff609a59edfc65631d6d6d872a58d5178d59fb9c747936526d35a4daa3ee
-
SHA512
4b5f6101f741358652e233427131e773244aac99ed0c5766fe3add8d38a86cd03d0278e9e593777be6771d28db59cd21fb089e5831c9d66ae72a0a4d72681bdd
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o1he3U/S:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDp
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000001684947e8b0009003fef0d9e3837a4f6017baba4969d8d0844322b9ca815442b000000000e800000000200002000000070134109f1637c9dfa84c30af4813a21eee5dbb0f685b2489707192ad7a23236900000004ccf75f39cf865a23dd71e79c774644ad31c24b466d49edfc7a6503c55285d52ffd44e84e9b5fa2b4989d1ea93498bfb821d5cea89c3b739790c611515579a08b2429556de647e3561f8b80c66d2d3a157ebb683561bbd2f4490c582610887ce1ab14d391daab068418f91e330f3f9ae14c508aa0a4e6fd544d07d6e556cbb4bc859cc3d46655bcde75e40e1fb13f356400000002ae8df19a5e6dde4e47a5ca8adf183266d583fd99fbb3de941823e84edb500a7648445a94b53dccbfba7a0d483301f90ec2f9887633eeeaa52c9eb2eeb83b06d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d1152cf7b4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423499501" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{577DC8C1-20EA-11EF-BB1E-6A387CD8C53E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000b048762d102abf22756522c82826b8791efb7ed5de6de2c1e54b960c33508821000000000e8000000002000020000000d9c9a803dd0bdd6929bfff1a61171dcf54331c47a1770f24634d11aa7a2b1c2b200000009f1c1dd2033e8ad42eac7b592cd75ed1cc8822740a6c57ab5f9126c128f19026400000006554404b8dc6e3cea96e6fc40d1da1993f6e57fcc5886b8839d784683eb625dad838675a1159c544b72c61b723f37678287cbf1a91918ee76355b80b80b35dd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3020 2264 iexplore.exe 28 PID 2264 wrote to memory of 3020 2264 iexplore.exe 28 PID 2264 wrote to memory of 3020 2264 iexplore.exe 28 PID 2264 wrote to memory of 3020 2264 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e5a0624aa7ec01576efd33354e63bdb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569e7d911c8e627f0ca43569b41e5fbd1
SHA1097bcf27905dd9520b4427c59bd98b81555e4169
SHA2568cd461c878796357a6122c002097365d66c3c6112d4dadd0fea3e96bc537096a
SHA512c3a12870f7cc45566715f726eee2cfc757642f59a65b82e2ebb24e3cf2639c93273afc784005cf709b9c52096ce6e0341d9ff463aff29205db391e19db95f94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1b36b12ac619769cd305a8cd3a6b9a
SHA1f64bfcb2ce8a52bfd7bc3acf159c11d711caa8bd
SHA256ced66567767e6be5615c69051db62c307ee071706905525d2ddc5b4715b7cc5e
SHA512e41e7f994bb75fab4e607bb69f74603286e4543388610a307107fbd2a9aaaf3fa3d63b55c8ece2f374346d3f3cf6b79cb8d31d962d15588b4cefefdd65825f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958d61286431fc72a6da34e4262a9a55
SHA1de72b198c8488092e7eb1c52cda58b77d1b8e496
SHA256550c987d788e3374382a1c5245e32048e6fb9f37caf669b17dfc6bb226206a7f
SHA512dcba3e0563a6e858a7be3300a6fda652feb2f347c238d1c789c2adffde1cdaf5e908f57a7c90d670f788f74fda6a705982dd73b444fa85762e3b49afdfbf8a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac42bfb3ff16ce1ea2d8929d71778091
SHA12158a640ac747a2656671187cb1affd92e1a181e
SHA25660d287209c2f38d5ad8f7fca17e9da5aeb39051d0eb64a13fa14bec143845b16
SHA5121d76e0694a272813cb01f2743457de71f4d9c8bd45c30d3f989957134d8107b2768817c8aa306b9b77bcca319ba04350abe949661cf7070bfaa8d3a8bb9f0bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ed4befc2fa91ba08844e0661c87b4d
SHA194ada582f19a2f03685e6df509dbb4c1ba960dff
SHA25612d47cb0a2200021171eef34a7f43c99352a49304aa721c80f90616e2565373c
SHA5123a7f053af24e99ee1981f79ee198e6537a54d2e25fe9ed5f92b9d19c53e1691f776214347f2e5157598c295d66594021bf9aa5b499bd39486545d55a0dc22a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a80582bdf8c538d1bfa9c87abaf4f07
SHA1e799e1f28ab059cb632973565c0ed3a0c0bb5507
SHA256c3315b564381f63d161e9152a84e5cb6dc99ef92db9e9748914cfa7de29bffbf
SHA5123fa02dbd6a5422986592c34a836237a1f6a24bfd98c473e58e53f137002079f25ff9ad894e7beb831a61a85e23287f3eff58666a380371189b1f90560872dbe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ab2feeda519bb5439535c3f8e2a346
SHA1dc8182feebaa779786af2f5053973b65099897b8
SHA256ac5a8f9a501409ee773563b04335d38e21ce5db8c62e7c2164e70647e036d931
SHA512e39708d3125a37aef7e0e28515a37ee96c02b7a85364044bde595383b6080cb4c21b82c4b56eef1b5a34d9400e22db8e170eebcbcda536e952aa21bbaa2a8b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce1bd985cfce7455dfcb608ad0f6dcaf
SHA1890174908c596d7b8227a8f5b562bc510b2e491c
SHA2560b792e28b9b4268f618c56087ee0885802b7057e273db2b7c2b5bf84624e15dc
SHA512b0784025f4aace7f5ecc1f8fa5041c9829f350accee7ab522a2ef906c0c8b88aa300b82bd103ce0caa04c2fe3d7b248e3110be53de1715e07ef6d96128c0b80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f9ef6536a68239ada0bcd9e07e31d22
SHA1d667d0a48847cdb7faa073631809911a4c1f499b
SHA25640732b30cac16853e5105b388e15bd07eb217e34f398ac4391dbd2a09916dc27
SHA5120e08b0ebfb99eb2ca68501879a9498a5107f5d45515432d4b9b1ebad8fc865886f5dd4fdb90164783c1be6b6fca2d84bb5e48e2d85dab2a123924a083a4ddb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644d263a24663a9cc7ff7ceca84e2b22
SHA1bf5e0a2030e6bfb545cd3cbd9cf4d53bc9044617
SHA256ba8e659c3563f20537fc401e43db740c3b02e46af407636bb5c3058dd230c932
SHA5127b6594d32d88b638671182f29c4e4270527ffdab4c8b9c8361c48217ea2da40c9a5d745d8a6269cd36920a511312f84cc6f4d852385065b1ea9b080eda590da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52679879b2504992b67f7bcfc87a7df
SHA189d248c3747d32930f33fda3c31470c7fcad63e2
SHA256abd1fc31be000fa555f6ffa746636ed15c25a4e1b24a13bd7e797cd3dda4b2e3
SHA512bc124333d0ae04adaf086f497796f5e285d44b08ba88d8e1e5829070d498d9ab83a5277b1fdee81064d9fe0417a857eec414be10b07c5da287b41c64a12270a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5679a57baabe57bed178153f0a91bdbee
SHA13c39ea102a47a1c04bd64125b66052a505be92b9
SHA2563308dbdc341577bd118c0e0d9956860ba119ef0f06cc3c1c0d5e1f474dbeff45
SHA51260295636bc11ae6578211e692ef2bfa1ecf7fc4d33ed03bd86360087f2e23da5c5aeb099bc8d0ed31c2a8f1d2db81545bc8072b1ee8d8f77929382627c7345aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e0aaa2105f0938ab04eacc9655557f3
SHA142473ceb45dc66564286747c247a6ec14217cfa2
SHA256848299bf0002a7ca29cdae1b4130c307f2909ebf54de1dc204c469cb7e963497
SHA512f7cf0119b5c345a2076766254da6768c5f3799f69bc6d3996c87e74dc88faaa4a06f87f7af679d3d9452c0a4cc5ff1c1f7ae4df442dad17606b9f663183c58fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d260c6b36dace64aa795c9de3e066d88
SHA12cd9349d8044a653f3de894b1b062e9cdcb823cf
SHA256cdc098a62e7d7c6bd3f4497ab02d8696f97a90b7fd774583910759548223142c
SHA51226dc5556dd594b23993057ab67cc50e347e48aeb973843b0debb5a8574745cbfdc3f4212ff152d43ce2785799e5d6226e6ab73b653fd6e21e23f73435ccb254c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56487bfdb01962c871c29de009a62e0a4
SHA119ff80d615717ce91ac55cd70191779900bec07e
SHA2567e02237375eb970a8dd863537d890a5b5620635f51dddfc62ced07aef0a032c7
SHA512392b6d9635b52198e01a7ccab6a1ab88feab07de2ff73550e39f5bd66b1a6c5b6ca4dc262cc2f0e1767dea14556cbd33d43d8fea90e9b6ebb890ab858749efc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f16cdba6c484929f3e294990ca7278
SHA1e680fa187d034c0a66623ca9221b283d5a058edd
SHA2563d9421c7d5365e67d5b7a9ee5df485d66acb22d691ed9ddf79b49fca5ae8ddda
SHA51265b98874d3772f82e4a372afdecfeb0255c5d5e7b0ccae6a6c07908a6a6f7bbcd990edc8d8cadf685802a3b7ca9998e25f189052cf04f61b34133a1561443a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510fb6dee5a9879ad167184a04dcd0aff
SHA1481a79fc4664745d3810bf2912b3c0f8a00cc211
SHA25613c5027c8ab56f7778a61a6803f0cd1aa70f9596a0f305b763cacf89e4fd6afe
SHA51228deb5ff9765b6bf4d2f3b9f9f8737571014f516414d9a0955abdcaa4fc92f00b99b21ffea5ca76bb814ead3550700ee096409c3b7c0c9393041c9ad9aa94e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf73c127b5002999d03c4fe487e67396
SHA13c63a951e3e2487cde21e4d8a83fbb67927934a8
SHA256160b8c9a9ad27fce7a4fea502dc5a174f34534052e1b2a855bd20c0e332fa498
SHA5126c3f637505e80929bfa4de384b0a895f326262ba31a62d612b9ac311877026675d12313e5ee49d6ccda90f2a095226fee00d4973fe4091946646db26d0e55f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c1818eee59a7bca109f6d6bee51ddb0
SHA1134042e483fc3b1f2466615b0b2995de1e579153
SHA256b1acd4c2a9c30302ef15df3e0d91e4032b0114bef466f46be012d7ff86f660cc
SHA512df8fdb2fcc613d6f01c635fdf8ee962fcf5a6dd7dc52844e1d0011639053cdc30090ed4ccb95175317dc624c02cf71ec65d43850fbec43d3dc8f6632bc1b1695
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b