Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
60178b71b08b96f0ff84622bcb9ecea6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60178b71b08b96f0ff84622bcb9ecea6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
60178b71b08b96f0ff84622bcb9ecea6_JaffaCakes118.html
-
Size
3KB
-
MD5
60178b71b08b96f0ff84622bcb9ecea6
-
SHA1
173ef6d2ec50a428abf8a4908a8bd7fcd518077a
-
SHA256
2c07b1e58189c391121b2fbef8cec41d71fceec1de3b26f20274b24da99425e3
-
SHA512
f1d06a771bd19ad151e1cb35b7c58194328dd2cbb132d6eefcfc53084da4cd6e786943862a56799fe05daca9861707b9c03eab3a8af638bd8a0be91eb3030872
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300f72c1d3aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422384779" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECBE31F1-16C6-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000164459882d77e9ba8f874b9d9856a287f01ce93ee685c39e6187bab909967e71000000000e8000000002000020000000e3b0d5ad9b21282076ae84caf53fa88546ae1aeec71956e0c9bed3551065d98a200000008c0676d5cb2df54d97464041c91b14182a0df29a005d85f94a1c7a5d8c7eda9c400000008a9930de53039b5096f140b92d8e78fd640678943204d39d492113032b15583da9fb3794a3e8194e9c443cd84c4e65d37ae705cbd671baf85c0571b40509dc50 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2788 2040 iexplore.exe 28 PID 2040 wrote to memory of 2788 2040 iexplore.exe 28 PID 2040 wrote to memory of 2788 2040 iexplore.exe 28 PID 2040 wrote to memory of 2788 2040 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\60178b71b08b96f0ff84622bcb9ecea6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd537d85f772ac519526a806c284491e
SHA1f6c4649beacb9cf6d20ab37272a2ac0cfff2bfbb
SHA256a7dd6f566eb4f707e776de751d6f381db53051748ab6af0c4d7c70ffa979a3b1
SHA5128d0bfc9319ad7a81af05955b24b06203864f4f621780bcbdc7e917717c077897ff134f1d222e959ab1ea23ee7c15c469df6def34a9769edded274f3e39318ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5994649bb7bde8f79207ab8f6c6fe1b1c
SHA1a6fd44d9183b8cb948917569d692ac3c52b514d5
SHA25619e1926b663ab4c0aa262dd8bb234e5e20d2735a226be6a163f8e1852317bb5c
SHA51284e82e0f63e126447650460435c5e8ddb78ff80ad924fb34755066aecf337e935353827d1b9f00f1a5d2049399c9855ba13f25abc4988126e284e43cc4a6fa8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb8a91f09155cadfcb230a07105e80a7
SHA131c755258b9d65cf58cdfb0f989802c47c7093f2
SHA2566fc7159068eaf51793c03f01e10e0b8918788cb60e248adb537eb67d96614d7f
SHA5126a65577d574b385e18a1a7a13fdc3b7c363dc39b2543faca0161a77c941a30ee92f96fceea4ca921d1c4fbbe7ecae6b59eca7a33bdebd8825ef744240ec8b379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ca55de488bcc9fcf50a2ed474d17256
SHA165c225c7230e590b4ae871979e85cb2409896824
SHA25672662da44cb7d00a9f3764aed53370749221132d7a31b6416c73d5a592701729
SHA512dac746a041f3d0f4f4b946bb735b6b23eef638bff30819691aeb0515054da28ec643a9a40855369a2dd7c2dfae3064a100c8f7218f11d493f1db9f4e2a9365f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b70850e0c2602ca40e73023fab74395e
SHA17dbe3bd1b056b6fccbd30547cd718831c01184de
SHA256f536175c6a40ed25d86ec83976c8e743ed59d7c7aaedcba1df07e94dbedc1751
SHA5129432189d53b7aeb8a3bc01009da856292365b0a46692ad95590b11e5acd6ead78d9b1a4fb66e90437a1a532e59c53cbc95b876fb5636bd0e93868db9db138df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f5c4deba7b98bf3891683218b8c469c
SHA100761a1ce13c8b5cdc5241edadb89b1aff154a3c
SHA25699b7076f58e7753d30074336f9040ed1e4c2ca8816af65e31a4fee746682ed6d
SHA5123bcbed5699c261ac89f63a484b0235dd1f5eef9a3502e9d8bdd6d4d0b33898713114ad45cbb812583045e1b0aca2495040c8f5a98d2e03e8c107d542a3ddd355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d03c5045e1140830cbf6b936f474035e
SHA1ef32fe036757980d39672636d617399f50ddf27f
SHA256220032fbb86a9e401339577505ae453d3a1a01a10f9c1882733112f61c33fc2a
SHA512a6b7be3a63147fcf45019a61bed0c443e76b02cd08861286fa9b54a9dfa91fb244707a842cc496321bc7614e1d5bf16f43f6794230703296b88be5b3766aac39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e950b8270e2478ca3b754947089da276
SHA1997a0018225d7942d354967815844bd854819eda
SHA2566740bc41f3e1674a897d8933809e36535d5594bd309ac611387a2696c8fe80a7
SHA5122c5565ccd1c001f2b2ed34b32c9968e69cfe139dabc57adc464a68e48eecddc33e2eb11c8fd7c3774bba92382fbc7cd3d1f6552502916d8ac644d86c158d0dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832fe06c301ec411fbe446edd7a4068b
SHA1642c759ca33853f2fb995ea42355a04e393533dd
SHA2567f5d77a9111bc3a5433abed564fa5e6e05733db8ecb1f30f2af0490b9aa48dd9
SHA51213099cc73031819dc524c6b81b51ffaab40d0b92102ebf3dadac63787728f90805e407227a201904e2416187086735d37e79aad90faaff9980a5e73423548759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fb2645d28df5d43514980aa19f9cb5c
SHA15fdca049d7d92ecb3c7680469aa16e312b0dd3aa
SHA25679b641321114e0bfe63849caca172cc5bd52a944d76c1c912b3a309f66678eed
SHA512df3b375f2f47e6dad05a3777f647f925e98e100bc5c3cc8671d1bad4606f4ae5f734aeba440d56e48396ad8be51a698946f80190ee0fd913625369c34c4e0306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57288a51a2817a38c2e854c6aa148166d
SHA1203857597bd560bb36731e33bd38774ed6dd856b
SHA256a4e66b273339f1f59ad0cb9b1e49ab3829eef5315b857fba365db26e9e2626b4
SHA5121635e86637375a964f66a07d4fb18307e4d0ba2c5aa49e51dff9466e69ad61c4e5274746ec16ae43e9813ec128c701dd1d9e0a92ce2b495dc1b655644982f278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d52a40c1425112f4b7eda7b06ae6c5e0
SHA1696814217e64870b29eefcfefd19418ecd534b32
SHA256a0080ffdd04ccbe68ccd62eab550a018d12a727dfcca8b9e0a4ceff84152bd5e
SHA5121b6e092f4b63822cd4dce4743799b36f27d97c286272fda496259ef1a725a398072bfd4c40fdd6967bf147031fdeadd3bd1f347316af393da0713fd8318cd681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f7b2868fffb41294b6c9db8c171038e
SHA1facef782d8d88ad48439ed491cce6a257eece364
SHA25652e5cbdaf081180790781176821a2e9af08c297f0b2208007467b2aa742f7240
SHA5129611c912456bf05ddcf99a9ede370966a5de9fd48dbeee943a2d77a16cdccf4ecb702b9482fceb814cbfc41eee0bac8e1161eab020ccddfb25226417b4a42afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55cd46fb0b60909909c9bab6d6bda43b5
SHA1beef4c322ee1a78ab00d7c738fdfbde8f57605b1
SHA2565b84461d01603f14a6b879e0fb89e36e20c94455dfb3f06a7944377430432b78
SHA5122b522a106558cbd9ae5b03f7e779b63e0694071b11e2d60690150db4f4450c1e5baba500be16f5645fd773625b1349a8f3da52234569037a9735b9b56f9e976e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a92b9760f71e2c10cae3e8321d0f08e
SHA1d3b4ce7169ed69ffb04396ae743f0354b8633138
SHA256c86a040fe5746692bb2134693c70318bbb8050c1430d4f675df98f4fef3c3021
SHA5121abb9387a24e15787470ac42a051c7f347a559059490cb995b3aa73a5ed8a5e4190f27b8eb8174d2c583b97eb1c511874ebfe355c1b606843f8994f88e89f3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545316401b1eaa82aab262c923c624101
SHA1397e5490bceb44ae68d4af71a7cf94aa9084a976
SHA2567563581eb6218a27a0f04bea7f9085b671a29550a68a707188d4d5273a8ffd35
SHA5123a578660eaf91019b56ce7a7bec0924193fe217b80dd03e804bfea64197c10d30f8f4fdc4311b0016a8dbccf2c55bc667ce2f4ab7413ec20b2a25ddc87a49ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4f3017e68191c5cefbed81e9ac6033d
SHA18b785fc35eb0aa4ae1282a8f14d83ad9003a108e
SHA256ce8f4ab1265a3b8167ef483ba40d83308a182b70461fe7b761d2da91ab73185e
SHA512713fc2426930ea2abae3a4bcc45e0d6b3205fd25ac064fc5e141b051a80e8bc2554c8678a939829c72bbff87f55bbef7ccfb022b33944e3a43e958959c5f1f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d2074e12fc1533f8dbc105eaca68c49
SHA114ad41c3580d957c8dfc82fc81826790953f946c
SHA256ac8086d96691b990c7221ec023694852a003e901d0c73cb255496720dde851e8
SHA5126776c9b1d6a24f8d134f281a8bd72bf401d8f1db3ac5d66b36f32eaf1faf9387c5d727d07eda4840dd0c94086263fd176ea1a29a62f157006fe4d2e58fb1b97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57477a37b228697478e35faa5eca622e8
SHA137e6ef94c6f6b81698c7e951312091170a13bd56
SHA2567c4de04fc7914fa0ec2bf206aaaf8cda3bbb23c37e972a3f5cd6de7676037bd5
SHA512a628243d53e3c3ba34d338c14db818e550f7525985ba28be8c876f40669ee2a1300e6fc7fbdf9106c8badbc95041db6c7dd82bb701f1dc623bffdb45ba752a07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544e096961dd7ace1bb27ad741029579b
SHA1bd97edeceb2714db6b9d436673962ef51a850891
SHA256b3174e168320ef731227517147abdb95fb2c2fd146aa1c26b8fbfbc755d95244
SHA512f68768b4c986b1709850826db2ac6268220bbbc7dd6d60c9a6e179a98e7e8b84abfe660bedb803b978a298bbe36c67d09ceec549453d3cd35c94265724d1dc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5265dc57d39c839c247fe02391bbcc490
SHA1cdd0395bab46523482c49e3cd1564ad0b90a6939
SHA25644b8a58f3a263f950ac0da1b32f132667ea524a9d4367ebfae68e0b6bc81ec61
SHA5126a244d08f629c45787fe72ebc359ad3897104c6fdc94dbd195113c1a865b48b02fca8ff100eeb9ad536b7c56186dd11a332cc6986be57de068a3dfb878314baf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a