Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03/06/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
919895126372ebf9d70e42fecd30d101_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
919895126372ebf9d70e42fecd30d101_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
919895126372ebf9d70e42fecd30d101_JaffaCakes118.html
-
Size
10KB
-
MD5
919895126372ebf9d70e42fecd30d101
-
SHA1
1bad68a8c6b9815749a13af0268057e27a079731
-
SHA256
504a8e83dde9142199167c5d22c6ba4e71735269b40a92e2456fed1606674eb8
-
SHA512
78da68f413b57f0856edead2e805d3f1975a47c9fe104ede1b023b3618f76e69a8f77befc092a0f6532cd0f4368934b1ac56ee7084ad3c7e9362e4702d2ae5cf
-
SSDEEP
192:jm9f98tgbW2ZWEMJNj8TsHfEaghcnL+vD+glS5UwM0m4njqpm0U2Kqkh8D/wlPM:jm9fyr2Zaj7ghcnL+vBS2wM0mJ7Xkh8N
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423575565" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c2d5562e27db73429e5d36a464446195000000000200000000001066000000010000200000003a99319a9b3d4399bf8b0073711f27843d659aa06620eea4ac9d777b57569882000000000e80000000020000200000008b36d27196ac50c1994c380fd219286312fc5ff18d1f7aa2f97088d7dcfa0d6720000000ec705c1e301bec5bcdbbde8c44d5c4f822a837f23ede4800741e0ac5721c3d1140000000577dd314d41ae130cb30c9ebe0d879b3a0155ccf060839aca9c107d97fd10c7035881023d9ab7bcf6d079c1ec90e52464b2a1fbcd3559fc39d554d8714c039bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f088c045a8b5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{711A6751-219B-11EF-8B56-EE69C2CE6029} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c2d5562e27db73429e5d36a46444619500000000020000000000106600000001000020000000ca7e41cf04bfa4e7f0abc5add2f76adb892f6d405c3bf557454ecb6db7359c57000000000e8000000002000020000000efcab9e93008063477896234bf35b02a38f2b0fa5328ae2cc51e18460bd5336b9000000068aaee0a2f5b6ff4f04c9afd9dc35d7e37b45f9fe9c5d1267b926114d827d5c4f59a9ecb1251c0b1aa102c0e29deab2cb02308a60fdbbc9c2bcf25d0f86b275d58e19233403038b8bc417798409b42d2883935f59b134866ea3798fb8b9e99dd19ca3a8c3829c7f2f77a57e6f788388c36878f3ff8ffc0cce6251e7d58d9776a4ef34887440ee305d56a454fba09e6da40000000e82f9d9890a4e4f6f92afb528fccfb7789e63a5d988b208a212e3403c199cd37512398d49fd2e444a9267a4a0a208307cde4d7f5f13d5c06ec21e484a40e6065 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3044 1620 iexplore.exe 28 PID 1620 wrote to memory of 3044 1620 iexplore.exe 28 PID 1620 wrote to memory of 3044 1620 iexplore.exe 28 PID 1620 wrote to memory of 3044 1620 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\919895126372ebf9d70e42fecd30d101_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1e851ec4cd6ef38f369fd767adaa74
SHA1e586540ab4c5278bdd871e5733b1993dc0bfd672
SHA256330c7e9a43811bb68306937afbed3b254ac2b57a99a04a17482cb63836216283
SHA5120dde857b3f5cb0bc97fad3fbb7597242acfaeec23d6642092e155110df3592e5070db6df23703e34922fa40d1d93c6c86d3fd5144637b35e842448505e083216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6298d5048f5996e6faaa0cd6de5390
SHA1b6a34a00d1fab56ffc9e8179f70ad23a5f098938
SHA25600d83b30e3df6a1d2e6faddc9fa44aa1ffe433ea17da6b76fd674cde561c6158
SHA512a07fb3478d04dea08c716e7a8fa6cc117d62afe81f77e79c9eb2f3305be00728865a4c7912eee535b145a92438c6ac3ae26db0aa5ae739fab7ad08c7b2d34db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648d83559e0a3cc8206b04086ba22455
SHA157f07127da040f848881cdd0eeb88cebfdde6864
SHA256433eb251a2bf8ffb031cfe302ca3019798d05499886116d2419851b83099f1df
SHA512317a8ae55ee70f1818ebd636784602df10296cf171c1563ef8680e63966fec82d1d67f1a1addddd2b915b113391ad0042173736f032c1c6c11ade00d975cd626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b85e15b5d078e098679f82ef8b1d918
SHA1814039c2fbc2ae97cd43d99e0817ad296da75fa6
SHA256312bb93f173187ecb054e233e00097953b439df65552840d16346d9913fb0947
SHA5129a59ac66355df4c7dc2732d6bf1b3af1961c2782a082e798a0e78b62598f3ff3ff67dd4b3e4ea64f1935a72bf08692fdf3e8c52ec7b848d53a03eeeeb1a37c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5028d48b4833566325e432316cef380c7
SHA1c960572835f757fe0f579bdfc012c40cbcad1cbc
SHA2561f9c5c661e447808cb677a2e653ae5b97ec7454722be7b19a440a289746ff85c
SHA5123a2e410a32909a48de39fb1713b16c9cce83e29759c3f5b486f66f56ab473807844990a28a7d7b9cb37a4b60b6dd1af45a5501dae79b0123eeb92d073756cbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502bc991aae00955aa15ea9e3c9d62ff9
SHA132ba50a38ae8bac8fe3cb1303bb3202429b94780
SHA256f24bf17525728e1d82a325c4eea419292243be38bb6238ee7bad9c840d6cd498
SHA512b739c590e9a2281baac64475138cb5dd9bb5309f5d89978691f8f9a3556745938bccb116b27690b27b6507059db31de9fc046bff5cbfa45edd78ac1cd7db2216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58463c28c060b020fbd8076e57dbc05ef
SHA1c69f013ac10eac8f6b3a3339ce6b7b4de947f863
SHA256427d70891f0760f5ae8dbd4fa2f1317f623a0e001c6b607503bba02c65669b6b
SHA512a41cb8e64a83e47d4d13b97ed1ced7b7f2d4981dc3a88e6dbdc9fd497cc94ec8da45ae39101a27634d85fcc08c095c97279906d49f013448f1e81a9e4bf18c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0ef5ed62bcdaef5395303dc8999de2
SHA1d19922521fd5dc572b5c07207b88f416903fc5b6
SHA2560c2117a958efb83f5a06561efcf88009e4439ce6fc73f53fa71749e0b64b380c
SHA512913be913c0e22af12417dfdf6f847d1e938eabbfa7d55f2048b5e0fec784c04ecbdaadb2bdd697d986d5b94e363cb87dd82fae4d560fb2968032d65531e01efa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a6c7fa9f6b42e01bedeea2d961bb3e
SHA1c5632ded7f453517cb06e11ad8e333a972e82786
SHA2565c0916504ac8305c37fa37a7a9fadadf08e2c82e93fd13983590ed06da09aab4
SHA51222cb5d98d90d069b3848ffa413380a98a946cf5daae37c78cf767bdbf3460e5321831359926cc097400bfd40f7263f1c4b194b35ae5a00df52d56f5786efdf44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cac13d9995ac7e8da1b5c22fe40fc05
SHA1e16057edaddbc2c2dc076061cff39f4ef999879d
SHA256be751b25aa19c527ceb178e68e2b65815fc531f40bfa78aaeb4c271cd4368af0
SHA5123dc34ee17d10e1a2e051bcad420f15f667d3725ed9bb4a7a6f0c7f0d5ea0385c8c5355518e4f0c8c2ebb7e8865c2721acacdfbd94112a2a03de3f1b902dc639c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58131decbffc16835f8755d4c174c0659
SHA1a9528b2ae3279c1462df37caa8e454123d93c455
SHA256288b501c10c66e5caaa0236b622040ecf813a69db5903e6bf5b51d35fdcca625
SHA512f315569af224a3f7b7119738b568a6a3382d5bce0f3e3f4bc418230074f8a2fef8785e9cd1114cea8ca6c40bf455ad3651fcde29d85e0b31a9455887db1aedde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dce0ce3ffa70ef37ed1cd74e06da5de
SHA178f0def7c5516f2e212bf611ad5b1406ddb6773e
SHA2569e3eaa279c769f64e8653ddc609cfd82aed37f864589708103a6b5a6b00e6530
SHA51218d258a58eb9a404fa484fa458d9b025dc81b77fa72eaf04c759628d220b96e8f8505573b511b02ae26fdced2d59b500fa7d9cc631bd8b7c27a6313ce8869c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1c52e78b937a207ec734506419a436
SHA1370ca471a35e002474e6fa468e8d7ba6e6f8cb6b
SHA256ea8a2452b33e7c4ddfff5b91c5481bdc76124f76159e41665461c273de0e9bad
SHA5120931684a47e2460104e1448f22d2f3114b00a36f188d9f0686406764b8e2a06a26aa487e77a115008bca5c6e3bd348553d7699f04c139e6e0dffb2b6d8795b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41b2441fda708a2417e591ba1a22f0a
SHA141647cb98cb4b262c4c8ef8850e27bbae1a967a1
SHA256aa1fd8951b1786dee56a2f32c0b462ae313351d80141ce454d9b9924168aa6dc
SHA512c31bd7885457509e532c776013dbfb803bb0bc34abd590597724bff036f61c483379cd43c9904b52ed9cd7b74daad86cd02d140fe979123e0cc2486694ed46c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090ebe0bb9793764145f0af07fee645c
SHA1742f86d13158793ad8a322f53fcd232f5e34249c
SHA25623cdf50d5d9fbea19ee922a919b8ec65b6430cd9b4b7422f6f48b2f550a1dfa6
SHA5123d588915be723eaad79e139714b85d9dcd17758ce13d60d90cb4c102d0b3db1988e87a3666d2086fb22033a8bc14e2567086afb2f77275a597af21c8da7e66ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c300e73be076a5a5537159b20378e1
SHA1e3f0a11e5ff3ec2cc3cc834457f097745fa7e84f
SHA2566d07fdf4b97a20acfabdf5ac88ff14c1b7e6b8a6c43d01c6c660c718725b9e83
SHA5126a10d758492b07013366d77211f4fbd11ef12f2da6d0ce784d27992626e2447be750c932ae74cde18eb07509df8e38053595a54085be756395b35597eb6be3f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805b93d99b1398e02b6a5d1c575cd69d
SHA179bb05e40dd844a35f1a029afcc9ad0e8a9b45f3
SHA2561de6e2b64f53cbabef68dc7a328feb2000e4779da3ab5a74f6adedb44100df7d
SHA512fff4576528a8febece8f911874f076d55cc62aac058819b86f71084c823d064a487cf9512fa8af89800c8ce615b511e46ae3f4128fdb1eaab45301e823e6afa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57280b230b242b4a4971e794cec3ecdee
SHA19a08d2d8f13ad65b72adcd63374279028201a7b5
SHA25642dc40acb5a97e2820ab40cf1116855f10a3256ef305b36713b1c6aa4e3e10ba
SHA51276d45b394441617e33954cf9fa9a0fd7ad3c3a78c3dd85685c793813c2900de1731fb47099fe2c6f8099e7c60dfc39089f90ff67bc0bd2f2a9c4a6bd2a32541f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc5937d6b06fde4c3478a128c24f269
SHA158a31f6e04798d8d7b047b00815c13fd9c3a2bb0
SHA25670d40377718ad86746e921a316fcd72bfc31979e416d436acf6e677bc7dafe5e
SHA512e7fc82c0c159ef53c12948fae8064a76d91c5e73e9aaa43d5b70ec6d07042eaa2ec6dabfbce29505953eba2d26dfca8be51d18dcfa02cab17e8cd770cb2d7789
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b