Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 06:03
Static task
static1
Behavioral task
behavioral1
Sample
3f779cec82f1c90947fc8289ae3ac7de_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3f779cec82f1c90947fc8289ae3ac7de_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3f779cec82f1c90947fc8289ae3ac7de_JaffaCakes118.html
-
Size
44KB
-
MD5
3f779cec82f1c90947fc8289ae3ac7de
-
SHA1
074302cfff5e80838c7622fab81b934a1234b9df
-
SHA256
60fece61e19f8c03ee3c75109351b6d312d3a7f0cc8bb30cf6e7beff9e333657
-
SHA512
05b83d3a2c68be60fc163494f4c1c2c04fbfb1c22613f9b613a7c77c72bcbaf077585db330ea231389c6e2c60644ed05c420ab37fcae29a877264caa59f4fe52
-
SSDEEP
768:SYl3juhC9CCCCCCCCCWCWCWCWCrCrCdCdC3C3CV0UH8N8yW726MMUhcfwn5p/pdT:Zlz84bbbbvvvvqqaa00UtH8N8yW7s13r
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421828467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000001dae4c7d7d274e3d865ed35616ee48576cb95884c6fb32c9b5cef20b3b86a9f000000000e800000000200002000000084076d582735b8244d0764e73b39d06fe17ca2372c758b604eb1bccfb1609abc200000008f6f593976804da3b5076ce8eb2d541b11ddc53e3ad6594bd9b18d6f44aef2d24000000072505417e3fed6a385b02e94d878278f2f95e4809f8c2de525b28234f004bc4fd6ce47eac881a0f1c57620b7532eb3aa457a883f42288c7ccb67c8713fef473f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9897CF1-11B7-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 005c3e7ec4a5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2164 1284 iexplore.exe 28 PID 1284 wrote to memory of 2164 1284 iexplore.exe 28 PID 1284 wrote to memory of 2164 1284 iexplore.exe 28 PID 1284 wrote to memory of 2164 1284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3f779cec82f1c90947fc8289ae3ac7de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5651ce4cbefb75dd2eee053368ef3ecb3
SHA1c49017c0753a9e164a971d5c8902afb4aaba4610
SHA25681ccd95b71eb56aab405d036d004249bc78b6771e078a8818d6572d82bd376e2
SHA5120a2d5636f4f49ce0f6955c9515da45603cd83d21079899a01348b11ad57703fe6fe3630eca3623b309aeab388eaeb212519b12c1dffcabdd192af2eb3a197d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55acf6d926bc239aec8cb70f28561385c
SHA1a7024abf076c4f6b3d5981509782ab5b885ace83
SHA256f8444e6a8bcac84bfa2311f538d20f5483dd135a0d71d072a20a42e1e7dbcd35
SHA512a2bb14e883a49dde8706cf63781dd05dad6a08103991f796af53da7f831cc5b1435b4cdbeb82f55cb59e8570df78076ea5bd236a1598288be68610c3624dd4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59304c137331b2435bd89b2c5eb9f8a61
SHA12924ca8d5f2817f924682ea3a15c193aece2d64d
SHA256dd6d854ad4e3d19921f9d6d46597832138bb72c6dbc9386474f24c396b2d3938
SHA51218fdeabe29e30f83c76432cfb62fb30f791074704a4ca977097537d9f3f3f2f82c0bce9dc497c6e1ac9d85c1eee2c29dd396e1fea518a66bb84397f3fef4f0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f7c6042087c5584d53572e6a82e69a4
SHA1557a9d72b5dff168720bb9fac9e21bff6b483769
SHA25683fb30cda24a585c52d891a04f5862647f11c4136b6e90440aa2b247db6ad771
SHA512356e9e0c87eebb0b61a4b6b81e549f8447e20f46088026976f7c6c2903b9bcf9d361d6e1789972aac9bf9b3312b866b126362613a1e06e926113e3af6928c2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5368e97e00e189a059eb7b72bef8f028c
SHA19e1cad2b1f81faccd306ef9416d0549610122c10
SHA256b38f769c809e96ae154950fb4737773b8e871ba22b8bbfbba8c0b1b96bdefe70
SHA5123449cf5cf9a0dceea6ee7c15f94fe8cdff0538d24bb2994e8a0c836e189c36db45e62d38e36111035960b637d2312f2b5dc25f2a5c9089feccdfa39d31ee8709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9435f8871a6031fdd34ed87765754dc
SHA1fd098cc6faa2584b009ef5620b15cf5a864afaa9
SHA256920613ac0e44a756dced33c1d1ace35cb5dfbe6dc258bca8fa347fafc5257eef
SHA512e2c23601c11d962c22abf7f1954289bf77b88747078d459a780696f01561735ddc71e85076b94ca25e01e910ce74ac4dbe3c675493ac0c9a5a8fe09bce7e15d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e61165eec9e4d4983beb56877460b62b
SHA1327a43b945fe2eac3585398656b5177cca718b03
SHA25649ffc2db082157c49a98c6e3ba25ca1f8b34ca98008579e86c5f3bdaceb88190
SHA5125a5e3a4c442307d316a75f03ab7c4cbbc395ae1f85521796b33d8a20acc212b6dc28d85c2903066f464fec7c5e427a0f6e3236ee10f0f7eeef730b20dd68eb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca65e9620cf8e5efc2e7a0e9d305b148
SHA10c51ac800935a0ea4a277e4e55e213f27fc2e5b6
SHA256dbcbd46d644fc6bc2d90fecaefab518fefa1276061a2af2d2571ddd49495e7c0
SHA512d290ab4b415664d503be4972c62edfae4d388afc47a26acbfa6bfc371dd0c7dc0f4e0c13cb796d6a215bdbe7226165a9298799b60d4ca6239b26a83f418424ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d64537ca6101fc261c7d9a30c2af61b
SHA14d4068e457de460cb3c95adfc97c08e6bb6576d3
SHA2569fa4f6957bcc5dce3e1abacd533f547f1c13417d264c00a2756fca59b4d484ed
SHA512a94c780ddb98678dffe3bca90778f7965e0373c3a57fd13fc55f5717011336ce1b09270f1bba8630007b3bf88713f76942b2de6b59d706192ddbf2fb1b8b80c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f2c698fc12c1c0166452d3d68f98da0
SHA19b2cfee485e3b5b3bf34fedd5fce8ff045a81221
SHA256c954f1305cb8bb6df7031b99556a6ddb1d2733a39632f98dd51e7cefc6c64939
SHA512329d905c5ba7a2dde05bd430c2e051a7da6b7203e5250968bdcd75ce19b068126634a882586ead995ceb3ab61512d352c9e8459c4381d02141e4855f8d84f45f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6f1582aeafd17f28bfc92d35dbc50ec
SHA1a26208acc7fceccca33755b8d2b2f2a198b77436
SHA256c9048d0c2e6f6e11bd954aff498b258f11cbb1109ac932f387d25c77196c90f1
SHA5121dc7b885a6fe7a9752454e261c4f4f264e1a32541b5a0ac7f2e215777f88a9db6d074b0a4cb8697903865f94adccb5f9422fa03b74dd8edb0db378a7e81154ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5409f55a4c1ef991cf83a8232ec68a235
SHA1bb8df07694e9c943b9815ebf760709370f848003
SHA25686c4ccafa837447467ea322da41679136f1f34a498d3073ebe8a4f983fb7f2fd
SHA51285a6e25832110001a51b8f7df11423699bef97ac1b092f682749a87e95725e0d0afb549274d4f003b76ed8f6b9f60fbce22bec2c7cc21c93ca49d2635e1ab2a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ccf418cbaffde1d4ba04a0d33fb9755a
SHA1ee01943bb0bb1ee48fb22deb296c0b162d38c196
SHA256dcee3aaad0a64520a52a23e02b6e8054ce20791616718922a3373a3a60d5296a
SHA512c00bf307d20c09779d0fdabf29ff770068bc2a8792c0af73146f30bec5102d79350a1e57b09c35d8631934ae2fc2c3a95c3a12c1c24e71954079969f8a86b089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544059132f6f64d2b43a3dc6139533e78
SHA1263d9825451c12bda87791594f5a0652bac81f7f
SHA256e0692b97f0fa968f19e27d5faa80f1c6a1ad90dfa3e22812e7c101e1fc71fd44
SHA512d0365889c3d5437e13a3a3bd23d1094d12399d63e8c72695de21a45b72926cbfd0e2c4e43fff6b02d6c9deeadabc714bb77a21a52ff2d9f30b1b1f11743ef14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53654cf9956c7a396484b47457f463964
SHA1afcec5d81b554a1319521386ca2f8f328e594a8c
SHA2567106b1661061c2b9fe2da00084b11a7f50e1d1a8f7c8f39e7ad52467bb68f995
SHA5124abd5b1866ff3e9a180363ecf37bb4d1e08b183d26cd36f21e21fe8734c6794f0903e04f3f8df20928e4179d7ee9902d36ae2ea0c22aedca6f18fdf4772debee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1933206aa0803168eda5957bf9ff6b9
SHA1f050feabf128579092a3361de2ed709af2bd1f1b
SHA2569cdd81895d0e572c2aa0724484f89dc4569be8931655327620fe7531ba18b7d5
SHA512de2932255abe7b1a9c1d0445c0365eb709d35e8030075f6ed139be24e00a4b5b420775e3b9d6d19f98f2823c449a98c9b7b348aad0e4c985548d3f3c44e64735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a775c51ead9aff8f80a9a48b56fbc14
SHA16d63d70022f1cac706f33b491b81a7f282abeacb
SHA256994db8c710e08d0f19e2e9a6feef3289e5dc1de59b7628b2255e8443846f7f09
SHA512aa6060ccdf35db8300cc9b0c68ea57f3b08f726081bd62af32e0eb5a3b78c16d056ce6486fb9bedbc87f1cc5d40629789cc7e1bf79d20eb8334ca08fe6a571d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0413e346b442662e20b9d66b11acdfc
SHA12a8b2f2d472df60e40dbe00e7e73f436eda1dc03
SHA256630ce2adeab64f6b4e3c0703c534eb6cf250d8bd61d892efd38544ec05151936
SHA512b6e752e9ccfee84f95c081b0d609a0f2b2ddc39e78e04482e33f8512508cd5684d1a716da8b06eef4413dddd7fbede6ec0210915c34eb172373a922416306552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bda39267c8549de78008599ebddc3b2
SHA1782940836f911b1b901e6034da834b049680fbc7
SHA256eea2a54dd64910ab976e3526867dd42e0af0eaf81cc1a74b9bcd99dbaad6b8fe
SHA512f41a2b671127d5bc939a8f0b948b5d275a6af4a23a6bd01f41c2ef23ae9cc2fd0060b2c4a621666ed3d0b92b407a4d1382fa98078c2c593747a4c0a9af97ee96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9da0743c47ba3b4611d1ca142b77616
SHA1971586d5fcb1d72daf2581c81da7c4c8311c30bb
SHA2565342977561a035611e7185e8774998452d9486ada57943a9835c368900b40e56
SHA512e76674a165a89bae512de1ceb67ca6309d13504e5cdabf6ab6f4e7feacfcb04691f3509da0b11ae6de5ed6ffac7df11784d9c48502188de8eb79746bd9b12baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dd1bc04ceef975b2c2f30a50c6b057f
SHA1923e5bc744cda8ce8f4b0fc711ea657ecb6f08d8
SHA25614621128870f6a52e62de72be377d4b28f68374b5d03cf488e73d866b6ca3bfb
SHA5128359078526c7997c1653568b732d08953124b375f388bcea3c612697f93a14ba9119b5fa737b59fcddfb6abc0786ba3d721a1d2b60175328278e51a3a747bbec
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a