Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
2b63a55c85690b03df4f357775031f1c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b63a55c85690b03df4f357775031f1c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b63a55c85690b03df4f357775031f1c_JaffaCakes118.html
-
Size
53KB
-
MD5
2b63a55c85690b03df4f357775031f1c
-
SHA1
aec4835eee3fca7a7698ef2e423a584ff317ead3
-
SHA256
b5e38dda774d8b83304fe05843fb102ec985ea2ce4dae65a3e45894155200aaa
-
SHA512
d14d466b53a21a9efd11e9e31c443f8a3c0f2fc6880cef75d89d4e231f7403056fadf2ea995b9f01987babaf8868ebd8a7dc2fa489a0a3dfef3b2304c0000c00
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYr63Nj+q5VyvR0w2AzTICbbfoY/t9M/dNwIUTDmDr:CkgUiIakTqGivi+PyU4runlYr63Nj+qN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000052ecf10d9a5fd06b69057185fe602bffd079dac93c1ceae6bf7b8dcf6d44463e000000000e8000000002000020000000262769bef1e66ca75d1324a2217daece61442313e3375c660351c87024d5dd3b900000003fd6ed7c8a532832ff60b0ca7749d6341d2b08ece00f1f979cd40db5722a6f52b44950d32dcf5e61ef9cb94dc94b7eae049cdfa74d4a1d036fb640e7a977fbd26bcf21c08dbd4a0fa66a89fad024703c4297a5425515d45601a333ac6148f7b0efa17a47b50d8687d20e4f444938937d3581a4bf1369e4137b8c69139bd6168222c97da13899bd33451e76ecc96eb913400000000c4e8fd61fd12560d362a31653e3e80d77ad5cae43b2c2c1e45255effc1c6d6348b00f4b8c9183841665e2c0db7bcdfe3c969c5639dcec6a3239d9849e755ce9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000026272cebf0d3c1216d882ff329c14549da5fb36220bfab13481cc731d26ff2ab000000000e8000000002000020000000a86fa5b5d27aae193dbf022cb28bf4b9faf3af34dbbc462e915847348df8f4e52000000084a9be0863aecb9b1d8cc4837bffdd3090d29bc897681ada7b39d567635dca3c4000000080e14d6206d16bf1e3f695280515a8a580e24580b3cebbd4225202eed273043bd387a2ea41a0adfa65874779620d911bfb20ab5be9840b437581e28b99bfe29b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434648558" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c93c995d1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3E3F181-8650-11EF-972C-F245C6AC432F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2796 3028 iexplore.exe 30 PID 3028 wrote to memory of 2796 3028 iexplore.exe 30 PID 3028 wrote to memory of 2796 3028 iexplore.exe 30 PID 3028 wrote to memory of 2796 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2b63a55c85690b03df4f357775031f1c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1251b9a377304249d4e9d4bef3030e
SHA1f85e07a34253e70e13d346829a032321ca368d3a
SHA2565fa1ee06fe6cb019f0aae4cb0451ffc0fa150c5940e0199d0ec5a2830138f9e9
SHA5127d628931ecdf872073053b047198ac7791e1ac014fc7fbd98948575a7e5c8c350243956ae8870c7febe74bd64256c60b49661352999b54894512e5477e08faee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e516f445932e195cf4df26fa1272ab
SHA1e95a6193d7550282aadd1066c78877a8255f9f0a
SHA256b8796e59c76777826f2947d012ea0f419df8784988680bfa0388b1d240789e42
SHA512a1f6dfdb680d94b83ce46001dcc80f6eb58852b6d71e035789b243fd7e1fe9a32e53eda10f2d2e54d5e7e30b803aea78dcc4a224d461898f546b834da9287bb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20bd9b67644298794f0be9f70843b64
SHA14e9bf40a5f546834497cd34017917b6077355bd4
SHA256d662d05646fae081acdeaff53392e9bb202d566dd6557a7062003b83f4fe73c8
SHA512a9296963a3c03c24561ea2e537fe233d014735647e77755f90bd7a3ee8ee3a12ee9c3a44ec52d59acf5825fce103e95c7f06446ed5edc953c18aebdd29aaadaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55653fa68a13d038db7a8fd7a2f357e6c
SHA1bb753d343e6091cb5cd927d91a626ce87919e0e0
SHA256585953376ec2a802744849a12012c4566e5603ee8772272dcebce7f3eb404268
SHA51248ef6a3ed14f1ed51dc1198f9b38dfdfa752f285fd83a5f76855a273c15362acf999c0f921531a195d5a1887add4ea2a44f68d6aeda52156c4f8f175bf5fdced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedcc35ec9237fd298c5c049e6e76194
SHA120220916b471ab9f2871f71251fc72aea9f4fa9e
SHA256fa68c024789020d153010fabb5f66dc3143e61f51080b579d70f01daa37b9e04
SHA512ee178d0b3e667561e538ef85f3e7fcc18f4671688793d4c29e34f64aac6d4eb4f08a6152f32b5df5991181a86b774bd9ac3305d9d89ca83f8a1d26996ff0aa75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d474724e634d3db430846cc4cbe25fd
SHA126e0501ea08c154f8abc12c3de3a70b7f4a3fa32
SHA2561cfe0a8f3ea608840ff6d231bba6ca9b2cd1b9913ec536ed30bfc545eb6ee218
SHA512f03803f2a920dbeb26edb334ff6cafd14954b3a6491dc84b82830ad807d7b553840224d47f81e9d34a16d757b61e42319e8540419f0f79e92757979a0e9d861a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e295fcb9c8ac697949c0e91c187133d
SHA17e77993cf1e264697c24d13ec466c938523cf48a
SHA2565aca178a7e4668bcd5fafcbb1943f91405434c7bf7aa59c95dfb137a050bdff6
SHA512c30fbed7ab51e8078e4a47a4253f6c75f691d4b54fc61859c28d603ff3bc2bcaad234cb8609d44282e05a6f00dca34d51bf0dd5e00b6bba4711e007591de7a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ebd4e8d5cd2a3f7a40cb5d294dfcaf6
SHA1219d5685e550fd53b7c245957ca89b6a3869115f
SHA256a1c5407d71f648910c4160127f276bf198788b3e64eac6d1f777fba6ca6ec2e3
SHA51250efaf748d55404e5bac8136639245e4de569669ed90c69d74706df79fbcbfb4da6034f03fb81b0ddb4ef3dc63eac2d6414643c53f802e79c78df853cdb2ef70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8f67354f5eb535508bc9208a9182c5
SHA1f82f2f1d19b50cce9011b4a02476379e8fea1400
SHA2569d84994b0ca777b780020a829768344ad8b429733c26c55863cd8efd9fd2c5fb
SHA512ac4f54e6b8ac61fd464a6107a56865b887872e271f9ddf562b557960e1f6a3d2b7a7a87cf0d6d0f3d63fe3a61319713452292053c3a16ae8d5ea20953a5c7d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f31a5a21a8ceb1326bb36478596504
SHA103d8e2e635024392b4515820ea4481122d48cd5f
SHA256094a26974e0f70c99026de7ebaa457c32f73272cfdc935d0f73ac346fa6c16e8
SHA512595505675e382b2286bf7f9effa309b3d989f1ff22df16797b50465eb60757eec3b7444898d953da10c3d902cc7d490080a00f3ef3eb10295b7a82d8d5fa8dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257635371fe4aaa4c7b228b101a65a22
SHA164ba5d0068b6f1b92367ca5d8a16cbd5917711ab
SHA256d23b86ce635270e99c57a4c3a1ab9cf41ae8eb77e51ddcfb41b2fadf7f27bde4
SHA51286ab88f3c4177a86efdd7f5f2ebf7d7dc826c4e40977e3a623450dbad4f9505cf3a4f1a6976900c9e14ac5566dcdcbaab214f29656bd7f455fa6f88b802c28de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fabeb16b09f7d8e34d8e970d1a45ea
SHA15b98cd9dd5679d130cb4c36eecf3970e4bdd319e
SHA25642924777d74c55f1ec40cbb12ce279cd4f12590539c627372c95b2e2d8b4a050
SHA512a54b8ef184dd9b512adf0121f806038f5ffb2a4b2973a6dbe72a0bab61a985c515478a4a9f8b9ad54b5f4a9a9c1bba72f4b62031c948c62d30faa381e3e37a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9de63a2becd98a6e4448c2fb072a6fa
SHA138ea8ae8d0fab6f96b95dd84641b8d9455a71983
SHA25666b78c56497eefaa4324526a2caeebfad3e28a9663a3397d1460b797748e09b4
SHA512e4354ac8daebf99534311f923236b21038aa4f5119147d89d812d962e2e81b794a316561a813cb8590b2530fc587b2f096a1f8a250a53635f7ac437722ede3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c908fd4df18ef58856e6f8da7da9fd47
SHA188cecb85f09aaf21424f71d311fd5d041cdac394
SHA256e8e394b29f02e9c18f12a3ad1ecd430b48408680f7b3b4bd88965c6e17f4ab2c
SHA512feb5aafbfb9b43093c2ccf479b758e0e3eb499720ef63c87a25fa226a3d0e37c6fd323bb8c7ef6fc26ef385fe07de842b8ee9d47672c8054aced2e6be6756f7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f7f1e540aeb858b22d7e933d3a79bc
SHA1796f72b862821d52d90336a11640e1fdc0f27b39
SHA256f853e87d39ad36a4daa0932d229d34dbb08693a9e489904bf8ee440a8f4f1f86
SHA512da17d145e34b5de8826538df48011c2a57741cf780fd73302dde09e2219d7ad430cfb3971e07a9550e7fa4acd07fa6da6adbf18626e488193fc49e039f9d6a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe26b54a065f7929ad3b4d7e6d7a98e
SHA178953bd52df143c25e2d69bc0aefe1c5a8de973f
SHA256458587f6d83943c8d3865b5e6057e07af1b6c9f642ebad854efeee8033b85bda
SHA512e08315043ccf00709c5940cf575dfe779a1a30da2b6fe12897e92fbd84fb23969e8b89bc030ce9f82e81c6a0701919d8eabe12606a82f52eeaaba60de478464b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5107f4f5623853acec4914ba2d568e9bd
SHA12eb4eff94a183812420e0cd7adf29f416ffb388a
SHA256499fd30896bb41e84a0d054e3e3ad45fa62ae1ec95a7bcd9040808244b24dc59
SHA512fb5711a6f6d77abc6153a02da4aee4a0e071f25ba3d0cae6231ae0029a71e3fa6bb16db403fb561209e9ac91cb19b4274a84b978cf545ee6ed56bc78d7d13790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc79c62b9b4878ca42525849841a501a
SHA1748a914ba92820930e6b5ae36fd817e0c030b5e0
SHA2568f4b6c94286e2521bd970a10d0f6581f80cc016447c9f3d89cfb466acc138b24
SHA512b49f61d7eb031f1a44e45e973586d83dcfd9279850ba3a0395a1f2439b048fb4a2853cdff65332bd7bf9a88750a46e5e5bdbfe529a7da2b36ed16b74e101ddac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b