Analysis
-
max time kernel
69s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
5a96bb3977a3637361bfd613296662ac_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a96bb3977a3637361bfd613296662ac_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5a96bb3977a3637361bfd613296662ac_JaffaCakes118.html
-
Size
31KB
-
MD5
5a96bb3977a3637361bfd613296662ac
-
SHA1
bfcdbfc48cb98ede3fb0bf6e0dbb2d2322ce51b7
-
SHA256
2f7fc5d8a14ecebcfe49dca2a3be8b7d06ae2e33dd69e32faf03a3c528310e8a
-
SHA512
b0b46ba63a8166e13ed61cefe83ebc68f49ae67afb2592c023975dd23c5f24ce1154951082b4ebfa13290f87c1aa338cab36972470c7bf4ee525079434c57800
-
SSDEEP
384:Jda4V/HkloMHnyznnnNvNyLfNvNyGn9RNvNy1nnrNvNyYnnDNvNysnnlNvNyAnna:JtVCnyznOn9gnVnRnTnV9Kihrq0vI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13615591-458D-11EF-BAC8-7A3ECDA2562B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ceabeb99d9da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000547c5ac6828adf5a37bd274a7cc13127383bfce13eb9451841beffe2abaeff3b000000000e8000000002000020000000bfbec47914a18d99a8f752a11fc4876dee9371bc04b35ab4e074e469589bd16720000000d77b9d2a2f91ffb4dd01c3412c45a6c2625443a600f390c7c9d9071e9695b7d040000000262e826ef3283d68a73ac2438f899288ee05601745162de2a05adc47e6015b50077c0391d8cbe91837f57b5da1271eff53f0d0eab199910f00d496d43fadea8d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427527637" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3004 iexplore.exe 3004 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2160 3004 iexplore.exe 29 PID 3004 wrote to memory of 2160 3004 iexplore.exe 29 PID 3004 wrote to memory of 2160 3004 iexplore.exe 29 PID 3004 wrote to memory of 2160 3004 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a96bb3977a3637361bfd613296662ac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5daaa1b9e80d109198931213da48e916c
SHA1770bae712181d4c19c2e15a0fe25f6a6f3bd60c9
SHA2560f5e77fbce2779ecfd5bfc79b19c335a39217e7b6d6495e18194b5eb0c2f3d21
SHA51247bfac0737e8d4ee5aec6ae44c192ed3aaab40c7cccb6b56e1e97941108dba02f3bf6d6a69fc519c4b4729590151c31659c8f42624bae604768f0bbe39348d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a637adc6ba958223bda56489ffc84b4
SHA11920770f83d2c9701aee8b27419a7fc1310d41fb
SHA256810cef72c9f1152f2bdcf3a5e5a49bc69c5ba0cf9584c8a5607fd8c5aa42cbcb
SHA512158ae6f5840ddfd8088007d3a720a26c12062563f2b2634ad1fe1b155b7422931ffe0f2f5a366a7521d3654a6a1967e9ae0cfa972e2b48b1ec7faa4dcd6898b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e2b1fe14bdaa55f4925178f11fce870
SHA1716548e41a0a789f1c5a7dd35ca93a9921fd6b5e
SHA2561a0b25808a7efcd5a4ebb106d6104a2bf16f058a42e3be395b192dc4d31864f1
SHA512c8e3a97fb3580fa6eabbbb0e02d4ba79bb3d74cda7223257def818890a596b0590fc3b7bf63cedb6411dbb0f30e321b955e1d09b7d9ca9f953990e592f90f6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575571e27fa593c791b5dd1ab9c9b917a
SHA1f7d447b32eaedfcd17e8f46797f7c21db67c178d
SHA2562c1713f58282bb2a63c10b3e75e60b75b0f8353fa1c6c7804c19885a21720a08
SHA5126c0356c1222c6b477ad3b55d8bd5cf6520c684150d2022558d1dfadecc1145cab3d05973c9f1050a8b7a8bb29f24ddb276a6844d1925f8d7a6622debb28548ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329e8c57e82736145450d0dd7a33b8e6
SHA134ca9490883f1d769c5be3ad5ca2ffe143007975
SHA25601a90afed46be3e6fa00ff96e6dfdf6ab3082df7975f5d4f609f8812ff976e35
SHA5127fb9adf95f8fd5472905962ec5e215a383d626fd800b4cfa51609f5eba55f3613662e2f0b34e4c1f33b660a20c92883b280263ec352682a4b9d56eb727fdf422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3445af0c6dbc4b2336e158406e6dbcc
SHA1db42284eecb6a5ab6e375d61fbe0f9c03a31a291
SHA256bc366d57def3a0d956f7e762791f487307097fc3ae7f22ff1583cb7d69230c53
SHA51272b1b933b005e915ddaaba043b372701609f3e25aedbb765e1861007df50d61db937349f18b7931fa6f98b7d892bcc249a39545d155c505d78cde434d60ef7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c878e1d3fbd2c6f30d5e8fee9943d1e1
SHA108ab07cc0614383f58026a6b046e97a2a63c5626
SHA256d1a3a331aae7370763b2e9ab617ad6e5c78b68c1dd9bf8bf029010c7f32dc55f
SHA512dc416af94b0efbc357ea41033b4062a866dd7e07112280ed8507a3ee92fb56c06982d652987994f2e8f19eb5676a553be21ced891d56ef0a415807bb7b83e4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518ca7447ade9e4b648246549805ebd3e
SHA176ffc4ca43f5dfed58e92415a3e6fe6e75f0348c
SHA256994d2a2c2698d1c8125a606bbcd32329b581c6840f701e9c6607a105f1ae9d67
SHA51296e9892611d0b29821b4d20b77bca5e05b99ee383a708e714af14f17d1132ac3aff7344522205d6cfb8699eb80c743178e3b07e5548fc0219793c9aa919ad104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c46a2c4aca1bc61230a3e3db3e9209
SHA179706f0a02d362200ace0c18ccc40b66e9b6879b
SHA256353e540f53cc689a94f888e56f716c610614e7bce5f5fd1cdb6323034f4f7daf
SHA51256b50c6f7bfdfd70637f84bccad3327ca87028b3b5ec4bc3693f63a0c117706284b75c69ba68dcaa89af96f317792ada732c59df3706a1cfcb77d08db9bb47a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa34989d6c0aa1117d3dc461f650c47b
SHA1c618e1a0e19fdbc1265d1617a1ead5e65afd70b2
SHA25650338612b3b85210705ee0678804b2b0aa8fcc094846b5b2b2ae502bbf93db57
SHA512114878feb1c9b3cd6203f0dd09344d0ae78a323ca16cef4eb814daed205896f00e80a746c078d3692705a904fc5f39a1fd0210a9ce6f5ee1ec83bf54ca5149b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7154bfbfcc0001fac47d53b425efd18
SHA153c1eb76509a160b03a8c701401462263e62bf74
SHA256f028b0aaf068493b29363a7e064300c487a985e77f95fd1f955a287aabe8b0b7
SHA51250ae747dd3375313ae63c30560f4baced6f35c61a1c494a760f0ee6f9bad0f3f0de997840b6b47c830dfab2239589eaa5abfb6046bdab50838cd95f5ffd2818f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534cbd100e0603b4ce0ebcc5543409a78
SHA18f0565080caf73379a56309632f951c37d91931b
SHA256a6795f2f71e6ca669ebb92d9662cd4642a2e495dd7409be97006609819749cdc
SHA512526e2b124123c8565a8846308232650770266f53a451165b3a1f2a0e2ed5d927a8ec5f9d2f5e89c75b13bbf379b9df0156602fa376a61b6db509c471684b2e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a39be96a63968a3d3becf2e5494e84d
SHA1f3a1747c085032152328b335f9bb6e5668825b1d
SHA2563ee94aa7ece293969ea0f15173b199c49332636009b348ea2244503fa9d702ac
SHA5128f46bf308fb1fd19fab8a66a0ff5e83f6c2474036eb76eb25ca58f4ccb08dc840f5f4ec598cd97c38edb5471f64c3444636e957a2c0c14cbb0dbed3f4037da24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582647ad3c24d1053c7b8332cd60d624f
SHA123362ae130fe2073ee9992a7e88040836a000f8d
SHA2565fc5d52648d507c880004981c557ceb05bf11a9a9649eae442c9894e4a5d5e75
SHA5126bd49c845c3097d24ee6da276bd736a9ec67fb66d17565063e030b2acbab82f70c115fbc4103d9e5b7efe8e86d62840db9acac17d2c414a6d8256b8fcf963588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e088dd3e773f4ae093be93fdfdadd5a
SHA1cdc216c134889c44750913b20379e5906d594f65
SHA2568528219ecafb445a86bad2cfec658c6c1d8cad7d2f24181021dce2e5479f2860
SHA512346743d7e4e7376d4249ed9a718f4aebaa5c1c9a0a8f8faa88886d11f3de5b93d2c3fb0bc126c8e4e6dc28a7beb0db2ccbc7bf564a7fc058dd091ed02d400c32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8974365df59649a631ffd305d898a7a
SHA1d5818f3e2d1c37ce550dadf06ffa37e7bb2778ab
SHA256735cfe84ae599b597078aff826e3f811909b70b8f46a5c40a5b16acf21598f41
SHA512d841390396f70631278f917588192e59b322f224b1c373fda981454cfb1de2038f9006b71f41d5c7daa8e4f4449cdd421c941ac7d2365f8aa2c29ff176f96c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7cbd3619ce1252c72196c9fc0366fb
SHA197d3b1a7e0560e2507e1ec3b7c176d5532dfc287
SHA256d2ca3a65516ccf252ba0fc26ad03c58825e1566f62812a167ddc13f3cdf2457b
SHA51282dc5b6bb69a9aa409074045ae5866a04a60ce16722d6c962d171eef42840ca78997e2f8161fbc08969524fd919df6cd0d29622759964fb4a3a5cacba0d53fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fab53ff32a4405123faac4b885d8fc8d
SHA1252e307e568c38919b8b79966956b413deb0dc75
SHA256266545a2a4ea7bf4ecb2714a8151a5395c7f36e96b666ab894c4a2aa5d0b6c5d
SHA5129ce1e0d718d9be6c6a109cacd83721933ec801fc1ca662378ff90d18cfcad5fcd0c0d35f3d7dbc93d3262c1648c22103e5724fa341bf11ea06c9878b522beaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508daf8e598874cfeaa057bda3ea777a0
SHA1aebc10b26955813de976fb3f3517b48968811905
SHA256466e70c79d72af38d49e453e33ddba023e39d986bddcbe74699b18e431cf67ae
SHA512c6ca0b55fc802adf4c9341678d8fffce64214cf6ad4978e313ed9b38005239de32f1e42fb5d568c58356aa63a48b9aeab9c3f33828f4cf1681972afa9d9d1d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63e27f360cccd1f3c77501442ec8651
SHA170e494aef5ffe0da760120cb8bea0a2d4a4989bd
SHA256312f34f5a24a850c2a6f04d1500baca64d8ebf89b71783a7d20e77199aab17e8
SHA51203761387c0391ebce9a9387d4b9a0efb044761d7bbc14c24cd76525ee87d6ba2a2db035afa42145dfb04d2ad9decbb91098e13f87d4b952e660f4e15c4be0e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58daa0dc3fc439d4509f7f4a74f5719e6
SHA199596951a1c2e3979cd3cc0eb03d3a96d0d69825
SHA2564d5a682db1cba43aacaaa6259a32d7c559f4551764861b9b1edd6014aa6471d0
SHA5125e439d2ba8d79c1a68347504a718dade517819d91337af04b2c42f32b2cdda27cf4c4a03c9f519ea2e23a7383e8a7befcad69cdcc2ac832bf07a7d4a55eebd55
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b