Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
d4dd74bd1f2ba2c463162e0b81da222f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4dd74bd1f2ba2c463162e0b81da222f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4dd74bd1f2ba2c463162e0b81da222f_JaffaCakes118.html
-
Size
4KB
-
MD5
d4dd74bd1f2ba2c463162e0b81da222f
-
SHA1
c7343dc1fc2430c6e17510ce1d90fb27f5913341
-
SHA256
6217ef4156dcf49a05ab3def746de047784502870be0b4272d91901d67ad8b09
-
SHA512
4abd21e9b38acb7695f5f21a454e26ff6f4f4db01fc710253ff43379a977aafe9b7fda230f38f96caf549ff82ef8bdc18eef326e4b9bb206a5988b30b3626338
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ocVSvTV1:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0fd9c3c1202db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000007fadb2889371ba3b3d27074d3ba134281a45f2a68efaabb4b87977f0c8e35e3c000000000e8000000002000020000000f7546af1314a9dfb458294d8ae8b545014fb3c2d2de03d72c0a26d7b53512d3c2000000056cb02245fd795d4772e435e1140852e364ce1a0c2989d5f50d8e567f453cfa6400000006c0ca7773c092d796c32c3a56dcfce84c6f8bf85728bf306b09f7ac1336e5b12003e08039fc70a8a000d168a4528394ea42bfa79598d6095724cfb8952aaa416 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005c59a6e1bc33936de2096bffd3aa6d26c9f9262e9c0e857c786ba1a257606537000000000e80000000020000200000006cda434b4406af23485c13179b31562b229a766877b2b6fc471cc6455aeba3bf90000000020e7c3c64e4d022b90f67569b2c312a7dca1d2dfba1688333b9b8b272d44d2c73c6c0b46f3429ca282fce4fa6beefe66d99672c8096dab6e325375c6911fb527b88e67552c3a912a9c843c0ec42a7b6e3f30e0b09d968ffc1464016d2a3c251a29574455565afa18068f6be0d9928a3204aed88bdf7890fa444befda2fe40ef12204754abbd311d0a9037511e3ad950400000000a6bb88bbbf54bb912aca5125e50b9a645203e997356fb85fb93fd5fce526edc538754fd77da0aac4d2ddc9a3b8f402601d08f13b1faf8b15a5a2e0600767426 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68263911-6E05-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431977364" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3032 2368 iexplore.exe 30 PID 2368 wrote to memory of 3032 2368 iexplore.exe 30 PID 2368 wrote to memory of 3032 2368 iexplore.exe 30 PID 2368 wrote to memory of 3032 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4dd74bd1f2ba2c463162e0b81da222f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500032da2cfc4112d346320631c1ae1d2
SHA142a3a3da9d3448c4de2b73779c455e2872932e97
SHA2567208441740e5d867fec74dc36bce810ada1463bc0c5072323ba0ef89187515cb
SHA5123d36512a73ae9c9b5fcddb2b29bcb24b75f9e63f220b847c4aaa92a6f19ff38b66e6d55b0060f759be78a0004484481edfd87d9e5c269e5480d7ec145578015d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e977bb696a7102b2bb547b8ad5baf23
SHA1820f35758988a2deb2310f19a15f0d7ed688c206
SHA256abc60d2c5bff0e9ec8f71d8b4a9674e23b58b963e9861f6e3c21ea202605a8f6
SHA512452ed2d176d4ab11afe8dcb08d9b3448776477ff330b67e37bde12c077f8f37c5278213369519d9d650fe6a818933da49782d54f4b9d09f1226f99c1ad709ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5512861d61d420c0d8df694350e47de73
SHA14d8472bcaa9146f010e24d90e427c9b3b56ad1f5
SHA256ad3929e90ca80e81b2defbcb455ebd6b1d125320e5e1c0b1af96d6de1e3be51b
SHA5120dbb887427ffb553af9ca5df7eee306a6b9eaf6a903605cd59fd366a303b625b0bbe65d825af9b2597e3faa0e487b447a990b5832fb9c96b5ac89d790434d24e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509833ee5009a25604374eada327b28eb
SHA10acf0e7acf98d5babcd63686e6ae7f9426e217c6
SHA2568798a0cd8f61ee7b84bdfb850cc5731e69f35059100f2727b9b92b9848e0b308
SHA51260eb9e44b6dcbb1c091ad889f07aed2fdb46f50c57ca3a91ca9c76ac29f49a74367234dcb1237769422b2a55e3b68b77f8919df46352ee5bb6a9ddb9869e4c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250e107ea8341b2f155501acc5803e15
SHA195321a96d8b32694fd56c1d6de0f46f178b97674
SHA256de031d85e2fbacd11dcfa5340c57f19e7ab3da852ac58fed8514e0217754de35
SHA51210aa867929bfe0a4964b4ade59ea963725174c5e61a8d9f9826d3fbacf3df91b8a974af448d821c2cbf873f0309f78c4d45f72b0f758c5b22f37c7acb3001e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb7010117b2cc8fed113ccfa2a485ff
SHA14883a1aae95b3775f3dfeb4c99a59f3cf60adc78
SHA2564cd2167af2214caa6f1146bbc4ac6f8bf63707be499c1616d1de973cc6ce7203
SHA51278bbf2b49f0edaeec707614a21cf5ab658ef2ff63b5e3b66ee94bf5f6ca34026e5a546e78443c2c5259c0d7f4b6875bbb48cb6ef7f1186c5650be7fd649dd5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e854e72911cca6cba83723d11a716fa9
SHA1ec096e275fbb99e1c39bc8dbaea5fc0b0daaa35b
SHA2563999de384608091998056fc8d58e51626bcffefb74327dbd4b43892d40af0189
SHA512202e8d93d222c3c6f9474659d81de15fac3916f2442b4debf1a7e4e9dd1ffce5d4cc0edcf65b806e37fd299da606bf5ca20018c075f7c923ff0a8a81d5561bc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa753e97c7aa5e73f533906239d3eb5
SHA123aff6bc4b37098bc2df8ab2f2d82435dc86ac94
SHA25661c13533f7f5a38d9edb3e50a69780d6ef41ad8350062fe896532cc1b3e3b1dd
SHA512fd7025185994a5e0f4c3f220d74899c27a30080d57efc0006e9ef99f27eb8982ec81ea84e7a7934e2ec45d64069a63015e6f35c4806d697ffe183a3b2ae50a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57796cf7b346d7c2c683a0417c7972e54
SHA114607c6ba7c6a02f3489c840a15ee945d033539c
SHA25618f1df8ed21e3754078b22690f2fad1f2d8d890ba4ca61cd7a9ae7598a62639f
SHA512d72e07604640dcb92258d04b6083fce25e2da6f0790d1cfac82c8c12b3d4f4a31eb8da55f10095bd2e695deba0d64dcb69490f37b56fa19fc6924271492ca9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8854cd415a2e67163ab987ef919084a
SHA119dc0b48a408b314773cdbf4f7d5d501d5eac1f8
SHA2569950443f40c4d1e173da08010e4589016357e88a7d1d2a25cbc2ab1c0eaf96a6
SHA512b428bd43e6903c57a68adfddf38fd5e2ff5acaa71d1df9ef59887946e977ce094aea525517b6ef48806038b6c8eee0f58cf27db1fa3ccfa78b9a44428d433ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b521913cb1e5bedd70d5e45021bb7f
SHA1fa3a64b866753a581e08cd70eed0eff5b121f3af
SHA2566e2caf3b3d7db0613cb447f018a337676c7cf7f01e0c3651c41a85b3c47ccea1
SHA51241ba52799fd8d5079bbeca4d6430674c84bb1ecfacc50dff7a4b0a156561bb4d2a20aa3ca287c68d94877a581208e7e99b581ccd2dd1fbbccc7cc2c95f447494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b20aedbab3532c4764308ab28904fc1
SHA1d1e6b9f82a2dbc6a8cde5c097619d6efdca7abb4
SHA25650b4020aff0f1b35157d87497b32bc191de529f21637b6e69daefeb629a23020
SHA5129436089b52037fdebb52dd52139f2e7a58f2d52339149c883b71d47394c8a579e48af90e1df3e3d9ada2f2c9f0a4521098d78ddc3f9b78f3c125543dd195e612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea494818aea06f99f8fbbaef1ded3f4
SHA163152a828bea653b21537508be40f9c3daab483d
SHA2569b7dd696e6b5ca29f7d520941da1845a15f6aaacbc40dcb26ff98be2d94388c3
SHA5125d57595afca6418f1978703cca37467815d5bb13da3dbe78b430d82f43903a27501e5ca20d4d232bff273e657593a69844dca8262e0d0a1127c47d7bab5c43d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550890216de868f3e352d1f5015ae8572
SHA1a85b44255c55a339246962c92d0270c1ec737c82
SHA256cf9f7ee902e45d0fef0da8dbc4c5d6981c011f144a535d7a702649fab1345132
SHA5120e9230375ef1d6e4f72269abda8641bbc9504d7e3c517525fa9613e9c4072f16b11bc501e945447e68c5d21d314af8936f9af2e55d768282b794b93091949006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ea399741db2377f83b58202fcb91a9
SHA18c56f17dae7fafb873fd8d751a9abcda1b5efdd3
SHA256812b2bae1849dca01d04e75e4b9b2e1dfcf2748247b8bf576edac90944c7cc55
SHA51292e7f994ab86d141ff05f2aef41c1e3ed11818c1502ee6d2f341fc49072f9fdef1e7c2c93b0281820e49b560d12bb950349c8adb26a86ffc3c8c143991d1f81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe4691889e4ec3ea5fb09e544687193
SHA14b34792bf129816c4fda8120b7c66496040b2b34
SHA2562f78182f609169af753e9e80d5fd48804405f9e15019fbf73f57a041300eb62f
SHA512afd9a8a9e1f16661cde602667468bb38eee2027611988fc31278c537c2cc723ea609761a4ed93428f50a7f4b24287ffbff1c3f9e8064e99a4d53459bfbe83f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ecc998ba0f8aaf553d3aece8269ea3b
SHA1d6a2ac14c9bd96fee247562d1d1bf6e6444bba17
SHA2560ec2f641a533959f50716a8731445fbc5e4b1811f3c62e9bcf95afd81ea9243b
SHA51239b4854d9af15f3adf2c6be08f1ee74e07b6d1af78e1891040a95e85700f579bf1d3ad33724dbdb79f0e2f0ec0b453efce453ab0e3aacc52db48e7e4759a98af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb15bf2da9028c7ce52d4d011f2ec30f
SHA163039300b29e68e1a831bb99120baf94e99d2107
SHA2563389f697602909bb88962bba6e266717c601c1fb3f891430f505fcaffe7ef5c9
SHA5126212142df373363106933332c1c5c95ac036a96e3e23b89725337b1bd3b9d72886a054bacfb37d71e065e8251477ca2795cf653ea97bcf977ebcffdc543ac968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5324d323b4b365e150e34e1c7b0a6842c
SHA17c826404b01ba3143f306bced77609b1c2c0c014
SHA25635c9addcc6d650e137177c70e57c81d73f0be4f778c17ed2c35c7810460ed4b0
SHA512213f3d055e498b16e96c15f821dd1fdd5742b057f1a5051dc769cb9d4871b343a09186ccb32545b547c9404785457c1facf9a66581c2934fba161d534e767158
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b