Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
da5d1bbca69329da05024b24a3339e22_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da5d1bbca69329da05024b24a3339e22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da5d1bbca69329da05024b24a3339e22_JaffaCakes118.html
-
Size
45KB
-
MD5
da5d1bbca69329da05024b24a3339e22
-
SHA1
ffa656282c841f48bc2b856956debcfc0ef01f53
-
SHA256
b81db9df30ef15481e1f96715dd4a870f84bab657f8ec59ede1faa72b0152e49
-
SHA512
f177836fa065fb4bd61e060cfc158fe2c5d3f83e2e4b8cfb22517242750d51e97e73c1faa3f98026a17e2ac26dcafef8dc81365cfbb92412efa3a921dbf28260
-
SSDEEP
192:uwDtb5nTPtnQjxn5Q/6nQieJNn2r0nQOkEntScnQTbntnQmSwxEaIPeVQLlGPJ6N:3GQ/Yr9/xela68BumDBQv+Xxk+jY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89BB4BB1-703A-11EF-80FE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 301a41604704db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432220087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002beebbec4c341822ab3497b8602d9896d06eb9cf09ec913c4924231951320e98000000000e80000000020000200000004d35430f39c4095dcd45fed6431d3e6c9fa1172b9afae41361d8ad15c83208a420000000458de87050f36ad97aaae32070ed831510ec8a3e60f15ad26016b2ea302bc10d40000000771e72ffa937bf56e59ee5e3c98a547016c7bcdb2c34f2a8883fb4d8794b44437125df95794cefbb813ae000418a50481dbdf0b107776189f83705664201cb90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2792 2152 iexplore.exe 31 PID 2152 wrote to memory of 2792 2152 iexplore.exe 31 PID 2152 wrote to memory of 2792 2152 iexplore.exe 31 PID 2152 wrote to memory of 2792 2152 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da5d1bbca69329da05024b24a3339e22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0dee23732ddbbdf43db60ad7ecac61
SHA17927d6dfe6cbe5ae4b8c894d6c738f86ba78c2f3
SHA2561f296f8c7da0f3aaa808cbc23391196f29718a3b7f2d070880057b8e4064b205
SHA512bdc139c57f2e212fdfa70eee668dcefc56204e4d5e6a1b95306f746c659e9c7aa8c0aa4b2a973a2f1f48269092da48219ff0395a8f7cb73b2a2baab7cb71b1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90231903e7fdbde34a2a767b4c3da53
SHA178ce68c9086e381261435dd28e83c6fb4774d092
SHA256c602de2e70915d339d36661cf93a6e07dbc7446aa4a4fef9a93b8df1c07081f1
SHA512b8a234e069f563af38ffd9c5c3911c558d82f51b2eab9fc80da71edb4179f5034b9e8079dfa963398f48827720915ef8529b1e057e1a7112fb58d4db96f77660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5875cc55e995d65e6aff1f63fa15b41d0
SHA182682a845a07216bd81f3c55ff1217c7db44ed2b
SHA25693f38acda30a65f208fd8020d0c0259b5d0607076028f4ce248c3c5abdcfe712
SHA5129e492c07df9594bb7ea30c2719e2aff147e3f0b3f796aef0e76f05d86599988951c57587a07441ef749cbc2c7e3ccf35d5fbfc8936c21b77626516527d47f865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8e5bc34cc29a0b1ebf0177e33bd6bd
SHA1bc33f72adf0faffbbe447383a0f79bde995a0cd9
SHA25615a1488edd89351c6f55a871cdaa1d1d77b5fd342ea50426e75dcf1d597ec965
SHA512457304b15d5eccbefa42dd66d809167164446a10486d05f902a960f130f6c511d9630c78dc5abaf3a602cd2dff7f1d3647434bcf8343ef9813011fc0954f1bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b03806adf8ba6b555e4b9a0e705a4c6
SHA1bd44f73e50a955a01dbe1dcbef04920dc3ed980c
SHA256caa5876b893f9d14d88310aecf48ef97353323d20476b89e284f9e6fe6ec3bf8
SHA5122b43a5d5322ab0316ab0c5b64794198392d26469ef21295b8cc210443553f40f9f6e5dac746c750f52e3ceb527d10bfefc45df3c7652fe6c84a8aef15a5c8a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14d7529d0c0889c0c0dba39d383c433
SHA1f6ab290d8b73e834174e86e3ed95b6a9de436104
SHA256b84cb66baa73a60b2810e50d25f50f17b201638dce8c80b97f5aa227afc2f673
SHA5129caefc79e2d3a40d2d3eb97703c96a9208ddfb2f403ea1066eaaed1eec3ad6b3ab221cb419d04a0c0882782cb49495ea58f77d047f8d063eb868347830e45c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500775d6fa44c8065b535188c7ab2c624
SHA1d780669279f3c9d79e030677776c2af6e3291a06
SHA25633e84b467305aa671519938746bf376b85c89fbb8b183fa862f9fab3c63d5638
SHA51208e667a3e2cdaccf64405570de9b6dc7954ec87d38f67cebf2dcbed2eb1588234310d7b8adb1990315306b1e832c8dea34c3f86f44be32488a9875c1975bf700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b169ef9e112a571509fa6b251e692d38
SHA1a23c9951c7eadd4870e404af2581089276ea0ffd
SHA2561e333189e462d82bf7d6b757af75ec0d6c60e7b2f76389d5bc85d6132a0c784f
SHA512cfa4c6ab31f0f646b62676ad7ab5325a256f5d17a716b351cce3e40bbea866bef2a17d482c248e3d64bdf403dfb19d90d46a163c453750c15035b37995e01af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c88fd4046b359f71e1a69664b35a8fc
SHA1aadd21fdd6f9544f4d2dcd06efd5c103aacc3776
SHA256fc755b8443c05d541d503adcce09a93c68428e78bcb7eb8de1b821b29c107460
SHA512e256d41bf2a929c77ec66f798bd58e9b897571bddbd385b4cf41d2507619b18b4cf73e7881c4a44f1ad06fd8f56686862b6f239304c63b5a8f0d6a9e49f57d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5394d14196aa543c869e9f968dfcfd835
SHA19bf731f862f0275c1aa29e7b93de7df921612268
SHA2569b960c58d224b7eaa8618812ae3ae2b36e9552b2ba1d0f8d6770dd806df9ebcf
SHA512195c6caa10eeb6085b44a9132ab7a4690078ecff0b5c4cffe8f816d4addd8038537549013c22e83cadcb688e1a1e79b39a4b600fe22518a370145712a5ceb476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55006c3d3f08117ba24b0c631e383100a
SHA121b9b3d463a66657ebebacb44d1426b829873aa8
SHA256612966d741a7fc5d593222a2a0889f561f248736c2188fdd8fd9989dff3b78b1
SHA512b6d1c4cf2a478f254a388aa1862bac08580cf3575df8cec20e30d9a22f149191ca639c8713d9fea09a0cd961046fc2865f12a79b4d7faafb5123b04076db1951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f5d3282f186f18ba7bd9bae9fda92f6
SHA14550f72522d35a7c9643aab3683b170720026581
SHA2562b21e463f0e2c0b36b3d7886edfdfd96e25b3a6debbf2db88ab74ace7e15209d
SHA5129cdabbcf8d1a3cd21a7d6db1501daea1d228d9998c44ed8fecc2083963f94bf4c2c93dff4c368e55cb41321c795ad172e0659cade421ef485b53bbf6481a07de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f5785c221a8f4de3dbe8e0511dfcbbd
SHA1ea1b8d8ca2a7eb33d3f55aa6ee7023cf369cbd19
SHA25697b290d048aaf23d082998fbae9f00dc1055e5f98eaa9fef6ae2d825a4705970
SHA51292604fba422b8cf8837fa039909e0363850e65ed62b8cf7dd132a0ddf5ebd146edf4aee4ab84bcdce46f7b7dd47ca7d764c95176457d309faf05a68cb7424aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652e6649184cf0fad2a526e58b856411
SHA112d1dcce94d2c32dd35008819d0b1603499b60b3
SHA256035ce661df68335fbfa63eeb170f1887aecf8d73dcfbb2a1ac1a5e22867d659d
SHA5122271269982e6e418094cad7225db3e7bec8e62ba52db632aa6a1184aca0f2e99b507d0b54a11697b02d319f6c98472ce6dd084dee303c980575519148229086e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f35abdd4ad0de91e046b074c9d5f96b
SHA13a090548782a26b9857ba9147b5afc0c2518e3c8
SHA256d5a53ce3ee4f980a9140fee7f41980fbb1b651c71db11348263e750ae8ca68a4
SHA512d261e604404892fdce40223be48124e76c16beaf0facacecea3e078131428f1dcffc62cedf36bd83ddd7d66a3efe7b0388a2a89901dce56bca858024dba943b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec858063d125db01c96759aea7bc958
SHA1f0330e5dff4f00b61221f91609a60ebdc2bb2b6b
SHA2564fbb0b9fea479bf93c5f7bb5ea89c207972dabd6cdf70f77cf21fcd05888be99
SHA512e6e8a852d38008a1dedef56df2265b7fa3bed9859a9ae6b3fd4d51f342ed3a59e9c639f7d7224b94d5adac635a9150e1b1015d3c563f1f59a2317849da2c7b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb2f0b87094152fe0c452fb815a08c5
SHA17d5a18b1c33993f7f129a45de0e836ebbd8d72c1
SHA2566bf0cf979250768468c3fce9a5d2dfd0e71d5f7efdfbfb33bcca508b45c8403a
SHA51232b934e1bc8b4fd8f59eb74e6ebbdf95f1ad3f49abc205cf242de5e970da9a66b2cd3862b4a8ae7bc6026b84fb3b8e9832f71737f229ed49eeabb0331eba25ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d1de7cd02621bf403d5ae0c1d363b7
SHA1620112dc3c9aa5ce8634f10162170ef936d88fa6
SHA256313aff4b1f463108981aa5cf1682dc16c0903167d6bc1d0302ed3362b2469784
SHA51297beb4d0a968871c9c20cbeedb496bff965c2121b8eae1340e8c779873fc182783a7995aef564e83fac9c98d5e504e917054a925ac9168d7c3d4da572ca67a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ac8dc8806846e2e9da51f491353cf1
SHA14cefddd67fff18a73a946b77537f1e55b0c1e543
SHA256d24149bae5b06c661d1882804c8c2809c54f4984400292f5303418b75fc0eed3
SHA512b75c617e46d447f6d14d7ad355676b6478d0ca346049961802164bfd450b071effa78d7e6c5a0edd4fa3a3be15f2d07f8031ba261c899ddb6361c5d2c4a40137
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b