Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
1b751eabd243e608f813f68bebf682c2_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1b751eabd243e608f813f68bebf682c2_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1b751eabd243e608f813f68bebf682c2_JaffaCakes118.html
-
Size
121KB
-
MD5
1b751eabd243e608f813f68bebf682c2
-
SHA1
8eb2cc89eeb8f7144079ca6b848969a99aba2d1a
-
SHA256
56aa326340c6fa97e2d92afa370730a950ffc936760061df868e178a56059075
-
SHA512
a5c537ad64682daca308cf1d11ec4dcb0650a7338f0adfc90be2cd980c779058a89750f7a94e5d0cfc014878b94945b821a3895e7912db485c73c654614ccaeb
-
SSDEEP
1536:Zzpse1wraA/e3GZBVLrXZxA9uOLJpfMju:Hxs//eWRLdC1Lt
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d22e897079ac884f999b679f324e882a000000000200000000001066000000010000200000005f16600c69b3c7779179518532294f02a6329d6b7a95c31d77102c9f6b82188c000000000e8000000002000020000000147c861536eb96411920c3cfc199e93c1fe6982defa7a681133c5d4a8b7a1ce3200000002bfad6fce3f0eaa66c1590436cc0b8bff328ce2b796c8875cd9bf8b30d1fd22d4000000057fdd0d768ce627b7bfbcc46cab3b67e2ac66c5a35aeba37ef8fd7c7bfa86f964c30fee1f8fbd3fb8a78af2c339bac90f6ee33368defe0b25706ddfab8bed57f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04160e5b9cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d22e897079ac884f999b679f324e882a000000000200000000001066000000010000200000000f8d558694a787e0b6cf5e9c9d0b891874f3e7ed5bc32991d905c974c0e1c9ec000000000e8000000002000020000000348ba464f863643e815de9814e1744d5601830b02f2b8614dff0b6e3772265179000000004b6f306df2ff0d262b2aba7a13bf764508867efe85a3ffdd665fa63cfad9431b9fde4b75884f4f50f808f2bbf0881736239c23eddfabd130b6807d1e4e2442910dd4fc80103fd946966f3fd54a9535baf00fbea6b8ee666b09177d4f76a54412cf195f98dcbd44fd774846d9e76e4a74f304663b2df431f1ec39b2b728734cf98432c073a58ea2a169371f790b8e16a400000000c4927a82d8e171c094fa3f6220932267fc8a2ba83751cee6071a1c8b07b560cc6b1557ea2a9c0c0b76bf4a3d55c8ee3413d7e7645a952dec7559dbf1c79a0ea iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4D50B01-37AC-11EF-A5A7-5A32F786089A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426002013" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2924 iexplore.exe 2924 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2848 2924 iexplore.exe 28 PID 2924 wrote to memory of 2848 2924 iexplore.exe 28 PID 2924 wrote to memory of 2848 2924 iexplore.exe 28 PID 2924 wrote to memory of 2848 2924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1b751eabd243e608f813f68bebf682c2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2924 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1479cd89b7fa8b002a4d290ff40d52
SHA11149a8c7104bc91b3b7d0e5f47e9ad3d217eba31
SHA2562870cfe325b1abed6f493860e2b1b5eb99dd9cb3a4f1ff58886c22d6c86c0023
SHA5129f881a549deaea65b7ab834443ef912e3843c7d33b3c095603248009dbb1bdb01b6f49a5fb4eccfca0487bd4df3e029e581fa2852a54c32376476c6224a2d58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d2cb283eca3d446eef6bcbce4f6ba5
SHA1bd8287d6652c004b763a6a1eb35910ae9f69494c
SHA256f64a05cf8ad1e4708d236a7c25a7baec71fb6065e7deb6a381e4798152f60881
SHA512f0936de7dd2125d2cfdced820c5567419f261b2361e4062d1f8452a8440525a27ce2e92ddbaba9b6d0219d6dded1ec7b40c0a3ca4a81087dc78abd6bca68b3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7ce08f6ba5a26c341d067bd6cbc2c2
SHA1c313b4e50e4386715659854169855df36195241e
SHA25694c74361af480c9245c0be88b17e4389868b2ef035f095f78584088ec75205d3
SHA5129ff276fb3e4f062f108c8ee335ef1f95c779034b574401127ba3ad57e1eb5c30d581f312086da670c2467a42a79715220e7b4023db106d945953d1c876c60da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b4946f97f7b79b8dc5fb658304a40a
SHA11718cd1e728273c6ee54a1d19113d81f4d849ab9
SHA256e13ae97932fd3aa23da1227a99cea64a8498d25323905ac3679cb5a9e4c7c76c
SHA5125865d42cda7f8692a6087f7187354f4565728929a8c56133c721dab6347d6af386807f163f3bc24308364b766e7eaf4879cf5aff4ba40ea3afc2bdaf2a5b51dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ada4cf1a5a7202f5bdff6dd6552e1a
SHA1fc04978cc0dc8965bd99fb5bbb7a05d5a5f9df43
SHA2567e809db521ec6f6ad15160280a189735c9962822d4522c334299c3df5dce94fc
SHA51249f9ebcaa096622f3c08ce07f2654c5ed77307bcc1d6344eda694708e0e0d340c0b17dd8f8cefef92833f0db93a5a3bcaf67a4d3accd16dd6f06cd8da3a258c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9ea40eb48922f04fd4e61f64f618cd7
SHA1d73c0b67cabebacca914a4adaead1abe2bcf0647
SHA256a9bd4f635a2d7723d087a05f611fea252f2ff1f88f35fe0b4c22f2a7d7469da5
SHA5127dc2eced00a6d345e86680ca4bd18dec915bba06cee1dcaefde668486a6adb65644db43a0f7c120f3f7255396b9466128be9f5a962250428fbd698b5f6e445c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd1f8f68f9aa56545968181ab1b30a9
SHA147aeb1f416a4efefb929b1772e50681a93752d87
SHA2564be79320425217350fda9c4336936de3d7a5ce37aff3bc1af1efc736d4a53087
SHA512336d0eb3c9c0ad94b8a7313a97338ee3a4b9f2d25a502744c4383ef23f0a7a13bcc9ed8a754a098f76532dfb6ee229c0075f1e44df8617d27016dfa40c1bb445
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f452a88e206c6fc375535a04764f7488
SHA187d990025d76f4e6f7f9612916ecdb1989211ab5
SHA25608a0ab0efddad3521c15723a3b44ada691d95c2c6ed5210e402c25f794857148
SHA5121438ffc91b093d6b6c736b4721be5dd4db26c5bd28c9f54767f87072a4bbe71d31e08f90952d114a57ce6e3b81897219980f22bae4d0c8338a07153dbd0e8bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57a705b8f9cc6dfcca617278b8c97c8
SHA1057810fd20f324c37d5fba30c48a6962103a469b
SHA256948fae31735c37b59bd79a57a05b4b1335738fb00bd8fd1823c333b20a352d47
SHA5121c78c391a89f7fe0b271db8b0833404bb8fa69780e15e29bbfdca739b590dc5547aad0ac82a0c781bf3221409e6d82cf8b5c3ceebb52121de091ffb5e30af25d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e19568c77d0ab59bfb3299bfaaa2d3
SHA1e2b18fc95a66360f84057b50a138e486d191497c
SHA256c23fb3a5b5257fff4e488561ade53beb7ce69bbf3486bfb2e0ba9f1d5d610b55
SHA5129f8e7dda62d3da6d73cb94cafb4fc6bf7326c466a59b29a7f641966a324caf86cf14698130628d55986a08f802a7a0a28980262c4ae4d7a1c52e9d8ba32177fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fe924d309084d88a20dcf2a73d8efb
SHA194924e4a9d725e55c96170b33b6cd4f97bf3e5d0
SHA25691b9e985401525753f6b33746dad2e85f9792d98fa3c654b4a6db39b90122838
SHA512e1856d98637f4f5f7dad356f2d582c8f99b3e8fe38b5ad62951ee52873977aef58a3cbbcc2a94a46afcf56356002591317e8e8fe0ce2e2daeadc819f77d8d674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245c8f0eed58cc0e3b45db8fd5cafd93
SHA12069845daa581b7e0fa056862e9b4610be2d63e2
SHA256e2a076b0173b9c84af39561e01411d67d5f3a571306010b6dc6892f8fd59880f
SHA512c94e399d2e8540648ad4c92496ea11044d49a2fdd419115b18a3949209e72a9ab05f771e2cf496a2e85adad7df88a7b556e6e88fe2974590bcc76c944c55aad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59632c4b4a36a52c0139356524a61ae58
SHA110a9b222beb15fbcac764082f420d321822d51c4
SHA256f5b471e737e9a50d9ee38e382f4c050253b03a4865b14f75587e09f48b57a5e5
SHA5123bf6bdfa8f6a9cb95076a7c54dbe52fbefabaa05062a61a9ce3a436d418dc1fa47fdd1206978ecbd523a745d6a6776c82541e7ad1932460635704d4f425a77a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b53626e00d09d5c8134bcf032f1614
SHA150614b2f478b76a09dfc1f6d176a2856b9566959
SHA25664e74b821e8c8db80c4e13cfd3b445e62ceddf56d096272b630ca158383a910c
SHA512a2fa8ea1e24c264e3602848ac0d9800aa071208256cba0092fcdf8d5364b2f1622f11e002d853293341ae7d2c833b50dc726fc472de8f9299282a8fb54376fdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e97698ddc6e3f96a305b8cbbc3473d
SHA11de28db38d7a5982f7c1c050576833e00b366d96
SHA256eda22a78d4c5abe47b869a49b47c6b3fe4e3534aef4c48b1aa002e0171377822
SHA512eee7a1d9088605dd2fd73647301eed0c5fd5b5a68bc417285ccf811bde3d5b2e519d419366592fdebafa146fd174c95e7a1a9c10600198a1f0853ce226e99605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9f0475e90e6a9c5b0f7a3c0a5eec92f
SHA1943611e6e2ad3d2b60e690b36bc5fae4495e6d04
SHA2568c1cfcd70f1afffdf19919366b161e368f12f0b890f57d605c1e6d1abbf68ecb
SHA5129f1de015969c8b2b654a3c637261090e3b37e0f5165ab6bbba744106b61ad52d15822ee960b06eadf2d8f3c0be56d39f33baf051da264f9422f7401033cd6968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51213091d6682908468dfd3963a6a2e82
SHA1f5c7f29980c5bd3ffbfd39d64065afc720a2778a
SHA25616f5085d629d2309eae2f94111727ab83b9982eb166063d9c549303fef5dfeaf
SHA51249d38fbf028e6bdf343552a9057c8881bbb43181bb211098aa900b5f3b73f9652af8cce68fb951c5158f55a98ef5464d647dfd8c12af1264bdf11b3685038720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501bb94130607ebb7820b9a8dc2f60236
SHA13457f0154e9b12244853859e3c84685f6f90c13d
SHA2568024df748d875de7da4165bf3528c7f0664301cc86e8ef0985a918239513e2e0
SHA5128bc051dabe34d191ef40997e54dc69c7aa57b6995f55047190cb272581af38bddf6ff967387ea9c2e3cf2e8c8bfa804049dd529cc270b58f06d61f0f1149ed7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56855c1432fb8b905cf9557e56bcf1094
SHA162d75e7abd84bcca7180a910757638b83b5d384a
SHA256257bd9b6f3e03db5eca33aed72f3c31ef6deea31aacf5a2a3e5c45bd168f5842
SHA512a81eb90231c9e4a3b13b1abf332a0fd952a13d38291fbdfa75c752bdba71fe1aeb3146125c9891182991c8474266bb3800ae1bf6ebc612130d2999ef385d1982
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b