Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 15:28
Static task
static1
Behavioral task
behavioral1
Sample
0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe
-
Size
160KB
-
MD5
0749234ccba292fdeee26c8d856ed525
-
SHA1
39c7c05fcbbe01ce1214c95da7d58388dacc5114
-
SHA256
47da5dbe445b9a0bc7e0f48d9ca46ffc26f978096b8d68addd0b0a423cfc9989
-
SHA512
d331dbd52f46882e359a7cc67c24d82900d2a8bedcdfdf555ee71851f6247c4a31d605bd187b234f3adaca687c1047c5d6b3624be307676a0d912070053c36d3
-
SSDEEP
3072:9HkTo7cHvXq/rh0aLQ7uEFMyI5rzgMmZv3Atinc/JFdvqLSn:eTjPXq/yaUKUMJrzgdHA
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425059181" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C1B49D31-2F19-11EF-AFF4-E681C831DA43} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe Token: SeDebugPrivilege 2920 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 2432 wrote to memory of 1684 2432 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 28 PID 1684 wrote to memory of 3060 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 29 PID 1684 wrote to memory of 3060 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 29 PID 1684 wrote to memory of 3060 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 29 PID 1684 wrote to memory of 3060 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 29 PID 3060 wrote to memory of 2352 3060 iexplore.exe 30 PID 3060 wrote to memory of 2352 3060 iexplore.exe 30 PID 3060 wrote to memory of 2352 3060 iexplore.exe 30 PID 3060 wrote to memory of 2352 3060 iexplore.exe 30 PID 2352 wrote to memory of 2920 2352 IEXPLORE.EXE 32 PID 2352 wrote to memory of 2920 2352 IEXPLORE.EXE 32 PID 2352 wrote to memory of 2920 2352 IEXPLORE.EXE 32 PID 2352 wrote to memory of 2920 2352 IEXPLORE.EXE 32 PID 1684 wrote to memory of 2920 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 32 PID 1684 wrote to memory of 2920 1684 0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0749234ccba292fdeee26c8d856ed525_JaffaCakes118.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520598cc1c9ea5e6cc05a6d123938d524
SHA1a5d50a87b59a054ff4f58d1f178a1806c3f4756a
SHA2565beeae63b70d9228e3d336be633ee779559061b6ed6b500fc58fadbc6dbcbbc5
SHA5120c03198bbe77350d714601a1f0c07c6472dd37ea2c34e32ef7def11d87d37dd6df5d9fc0917b94a330bea5915496ed3a8786696a12f79abe1b952ba808fd34c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b90442a228eb225cc8ddb306b40815
SHA1de9994e0842e599d5a01ba98d76845de8c09e58b
SHA256377cb369742ff86345d9668a4bd76c8ca55776e96c152148b0dd3a5bfd5b5a59
SHA51202652d418c723e86f78e0dec0ea94bd95095faba02bf9fbc913a64dc1ebcffd627db3ae25cfaf32dd0ff64f8e2bc94f65f36de4615da6b3927e5a25f0d86fb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ad57e04212f4aad378d6d5c8b68106
SHA150bb77b2152a9663d54c3511db81399841e40f52
SHA256bc00a80402c5870e2059055f6e7028687d00e94e198cc1d581140b3876118d15
SHA5120b047e70a2c6f772c5738b31207315aee301966ba0dce4e97f926963557fd6b21892319664155832b750bde26938451e723fa1ca690e690825a9f71245a62ad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558dd2e3863fd6cfa7ddf30b15a820537
SHA141751a6e0c022db4f50d9e95d9d6d8e35dcbcb83
SHA2560f2ce318b4be56c2986b0f4401726caa4655af2db301e43b35a538b2970593fc
SHA5127be19b6d9bfd360623aff25b60700b65934bdd369e27b712b490608aa6a1f458057a8d9a96deb1f864c1f53579f86b812abe1f8acbe65bb3af3c53db736560dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552216cbc9dd27c868ee9fc0cdeada290
SHA1c5c1f80d2b51d61be9889932588844a506b0c86c
SHA25606256191183e7bcd2b5b197e04f8589c69d4c1d029d57444c911b3c7502b2134
SHA512777a2f2caa47c207a17500304815b52b10aa67ddb0dd903f7f3d0f51a44dfa89e9070f591819df2e3f73973d2ba1282066c4d09e458f87622415da0e068a3759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc71145fbe14c1f77e70b1587c8b92cc
SHA1985cd94911c2496d67ac9e20f1351d890a0f34b6
SHA256302073d6c429ac426064c3e75fbb2f3e5501424fa48b4247f630f71ae2389252
SHA5126a4b269929f071b0744f5cfa4c4416223c833440f50ba64278f57eae6d7f1fc427f9deb43e138bb743b89de0eb8e6f8f43bb1f332edaa11ddb8c7a83686efb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592af2741a74fd18204f1a3863cf97c37
SHA1b4c98b6f8b7719ddffdbc80102e00f03b8b65d7b
SHA25640284c46deb35844a81b560764c6da39d4554fa0f3b5149a84869edf79f25c85
SHA512925ccfc2254079cc5aa732b32073cf8ac86ff714674f7d14ded343251f1310d6362bc0e7107d8050b0ba6f18d1ec656d122b0f3cdb5270b24b4232ffd7b6c48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449c4b71b06c46176065aaf992c2117d
SHA1767a8f26bbf3219f1439ad85f3dad1100fd5d671
SHA2560cfb5e41e5a2b7a1b64b45d0f4b12223db878ae844d3e0828944d3f9555ce42c
SHA512a1590089d31a63091aeea4f55607c599ec1c4a9293e651896d359fbcab0c573b1d6b4059d29e347b2b0c5f8fc82e1e27dd7d14bfb06ed9fa68c0af1da83844f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6774adf9c42e70e38f21b49bba6ee6c
SHA157dd73e229e2aea4e9315098b34ffd6c291de9f7
SHA2568bc088ad318ca83eca1f66f21bd7ff4ab8be24d8faea4f45e440a5f40c7d407e
SHA5126121880230960fe70df07e932a67adc10d89122becf59c6e7a13c1a6595fafba1d4a310d0c4482df60ed507cd9851c65e70047f1d89c0187a7c2b8df5acee060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca621393b96e4044e85fe95668b97f9a
SHA17983b92933f28710d72aee819eab9aade6bfb8aa
SHA256bec83d43ab26e298cc7e4a9255f12cbcf0cfce236b2c1fe55f5e5041efd78760
SHA512327d831971abdb0f4a3930d20518e1dce9b1cedb49996ac76b7fb8f37bee350ca95f85b71c6702cd5d6e368c1ad38ea986a1577c7e02397348ccee34074b637a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6e6c03cad46d183d04ae05441c64d3
SHA1fad1e38c7e0e9b718d39a67684d319da159de150
SHA256e20e95c93cbc319ff962117712b6673f1dca5c0e6e4d04fa790b8fd706d4ce6c
SHA512928cb6dd31ed34f4df0d3635d2a4875c21150500729f6f9d2e9711efacd6e1684b8a02cbadf670a9ab2728f327b5176938b40dee7498837159be7badaffcb1c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb1e91e2f34320a0e28c37f24afb8b0
SHA188e1604605e56556e54fc804baad3f2ae0cb9aa3
SHA25617fb96fa092e3572a68b4e3bdc2acc61627f0484117ee8f2568b060d1be6f999
SHA512aa5e29dc62b3a4f90d1ddfcba8400cceae500a6b3b9398ecbdc194a235886b2e0dd4fe47e49b420aadedddf2b5dd4f6619cd402b80847db2da4a43a40f7d507e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541825f6c3d26eec61e3a40f4e93d44f3
SHA10adc6084c1eced20143c889fcfbe2055238d7f9c
SHA256c52f69984d5ffd37758aaa850f3916a76e03bd2fc38a1e760ba25c97f2579b52
SHA512bd3ca7c287ad302b378b4ea664c12e845bdda280b70d81db32b19a48423bc1ec358a72adba556d0f1e9b8dfe62aef8a3e160740057e308b7f49d8c2ced985d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273bfe59f95af8cb26e66f7b55b87b2a
SHA196c89937fc3206b67da7faa0cf5cce3db8cc5257
SHA2561b8bf4ef40f0d7064e65c129d137778743ec42e52953eacb006b144c57025a2c
SHA512f3c28c99dac7ec08eb0dc36985d2e7e89e918142bcbdd7b312b83db13f3aa02569cccddac7886cd2c41627f44f30d303024a3dc4f872f073220bd0075c298c8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515245f01612e0f3ede3e0a26f04c0ea
SHA1e6ff86fbd0070bbb7b7fb70fd153d7512e6df15f
SHA256fd36ff63f74e0ba9686ac84120a984a6433ed5f474829acc778bcb978aea5196
SHA5120e919a00020e0caf6a1c0a110a6cb731d82ea7dfaa192f0004edead6f4eab4bf5074296cede8ae2780c3e38c70d4df3617150ed0354ff8ce7e5886228d1c96f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5236199af75b726ff8987a9e120f95209
SHA14bc5de4e4fc1b234386f08a46d8150a63f9565c1
SHA2563180d6cb6382897f81dfb7c736f3f5316deea259b0c5412e9c2d200ff314d17c
SHA512f26a55f045773e5c57f404b3aea935aa4bf8bcd38bb315c66987f96121c3caaaa4c1ae09477d3323030e0140d057ed7b3ac0543dc43bba206832655f3dc0ae4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af1a641c2a19584c2faa5a55c66c13c
SHA10ff5a97b9b474d4d1d94df6c9ad64461c446e531
SHA256ccd481934053af275851737f775335dc88c1e78e967804d9616d7a092741a79a
SHA512ff13624b0a1ac6fba65cf0a6989bdbf44b28c9589fbcc815d940dc4a43778b15d2b2ff095080ef668fa654f9abd49322976f5b1fdeaec02739ea58109c848c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57019bb4317e3d0cfa3511cc57bad8464
SHA137a09855209d179f7603c5d654d56fc261b949fe
SHA256e715de30571556060eaed637ac51eb7ac8bd23d1f837c678a6e829afd2c2a00c
SHA51213df9b08f71894802dc254b8862cc954a3219bd4f59bc1ec6d2607ff22a0fb852485cc6f7b96acafb599ff803553a906076edcc7f65f4166095bb3bc3ce1b90f
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b