Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
249016585e1fccd9e1170a8843f3f87e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
249016585e1fccd9e1170a8843f3f87e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
249016585e1fccd9e1170a8843f3f87e_JaffaCakes118.html
-
Size
53KB
-
MD5
249016585e1fccd9e1170a8843f3f87e
-
SHA1
a889769210c328dbfeee969260ce6ca4d771572b
-
SHA256
e858e84e6e561432a386edcc95e83af4eb55b2b0bd6a1353f472317f53f98a07
-
SHA512
394dfef1ee9ff3956f37ce0dddb7965f296147117aab9bae94684f4342b08f3b3cb38624d70957319f09f1856bc740e4595ca453bfeb4db8b1d21b71498826f2
-
SSDEEP
1536:6gVIxbnz5S1b7saedGZeLehE7zefAAAepqIzfHbW4do2Y:yxbnz5SCGE7EAAXqIzw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e0000000002000000000010660000000100002000000028948dadcdd5dfebbcd298e21dfb1f4091d4e0f2dc759b8ffc68c6027b0d16df000000000e8000000002000020000000af672c2a8d7f7fd2e819aa7e7737569ff42015f459a57d788d594a8180b593ae20000000f52d29ec5e2c8406ff1a395027efa6b71e5e014ad63bff7fee9b899b0b570dcf40000000723de7f24c136001154cf19b0091c9c8d975a8715d77a6eea85b63de4585f96294f0d5ef0994685866e62a0b326a5b7803ac4a266ac4115007cf139214963e70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F21D4231-0D2A-11EF-A30C-E60682B688C9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421328224" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00675e037a1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b2c60f692a71e77663edff5be7c78c96b435ac4966955ff1ecd8cf477888ab40000000000e80000000020000200000001760798e0cdbfed989abe5a28c039f6c63ca545c1718337a0b54353ba16e57a89000000090605c2c04f596b58ca3713bfab39b11626ba4cb7d83b0c82452ed9007066ae550e180530086d3ed1de8b0c51c344472387a86b689a5bc96ce6d9bd16bf2bf441a547b9876eeeb3c43764f8fdaaa507ef8eb94ec9610f89121265a49581021d0d778fdf88ab9e79d96238d3d78d8931a1b366a478e6fa643c5fd0ac7e7dfae45b5223ed688549270052be3e8c8b41d1e40000000ef6dd22c850076477e4ffac32b46e6b72d3bdc1cef166a4f2c6b82589473888a7ea32cebbeac5879be4c36db5b548c5148e9cd1554065dce8cb7e174abf9aa5c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2512 2196 iexplore.exe 28 PID 2196 wrote to memory of 2512 2196 iexplore.exe 28 PID 2196 wrote to memory of 2512 2196 iexplore.exe 28 PID 2196 wrote to memory of 2512 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\249016585e1fccd9e1170a8843f3f87e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b6b4b43fb265c897df1008ec2d6e415
SHA147196a6a28ff8a33e47330e516ac46f3ae1801c3
SHA256359066c0bc7d2ec6931ea58d1d3c5ec25b494c7ca69c4e257198cd8cec358431
SHA5122cbe0bbb4442ec3ec7ede2a5cba33e9531453f260e7e2edec82b0d4ec7c2957cf1e8e266989bbe054245fc58467e9218a7466ba19a0debe92b77c92c554a607a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5292eef2b0e377f8627f2a21be35d9b6d
SHA150205719e4c0c8c3c485da1609523c9b63037c54
SHA2569899d024036150c7c12f9871426d1ac9debbe67fd441e393fccae7ac5913f9ae
SHA51233ff2d91d9cd2244b6732f19cbd5dbceab238b49bb7acb94de0eea491f32c9c4389629b77e589b05b25ab60180e0df0d4183236b47681d6c9d82f0d89fb233d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD593cc8a50f1f50a4654f8a397214c086d
SHA1219102c7e9132f43d235c27e12e6d4cbf77a3de2
SHA2565be0cc172f09d79bf07311991c5a0d55284d44e88122b741973e6f317247ab11
SHA512f7c0764f2c281742b97e545266ac25d728090c0b188ef44356b5004c6702f277afbf5499d912011e55c19764c6eda59436219fc5f352add00036eab66f2e4ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b636a462489ab1ef0b61417df9802053
SHA17075a785c58d4a4ceb58d0c56cc92027b58ab0ae
SHA256d393e0288cc3f31e5b21d13fd9093b76261c1c504d1edf4082e22f976fc2504d
SHA512bd5c690c07bca6be6b82a2ced6824375064bc5d63cf36466385d788e740ab6335efac09e4415e281a6765601b471028e6e027f27166e84dbd98790e365ef3899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c097dfbcaf6d3d031bb80ba7c74c02e
SHA120a89590447b67f0aedd4d5d335486afc80fa3bc
SHA2564d55f4186e1af0c85734fcf0c56d0e9dbc7200e5320e6b4858274322f47b5087
SHA512b8035a3b1966accb48ac1cf721bd6cf558152baa46261efd453466fc424586a15137502dab51025e0727d921d37f9bdcc39948a9c2e90ebf262ef085504b85bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5892bd64d8b50aeaf43041969f57dfdc5
SHA15dab662677419b101c2541e2ae83901e44ad8a32
SHA2568b7e876170baa4886cd647302a451aa166e747cc5e7d3f2668edb51abb7cd980
SHA5125228ddbc22a889b1cc01ef4eac2ce5b37fe5da36a19ecb40c9fb6651c2e8eef59221b0057a8b37a736a3d04a31f868f2e50abf477f8d0dc662c9f2f3c8b04d30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bcd1eae9499614481014e07154741a5
SHA19d6f39af0705a5dfb23a238d2f40a583df98470c
SHA256863c120c15fc59cd95ef702a78bd8b832e4e2be61b5dcb6490b10d4e0d1399e0
SHA512a3c159e39e8ea824caee3fc134f0411d6757062c593088135b6a9a48bd49f4c8a4c2043c1bca5c461e1c77b9c355986f93a0f6e775330639e13cdeef286829c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a4bb15e091e7f0e9c1c40c7148b957
SHA1acc84eb25bce671df4bdc1d9590c27fffe8995cf
SHA2568270e2d67021634e61d5c4c66733adc97638e40293cb0835a93f138307b34402
SHA5121c8f94aabe7a42f1b626e31b3d5e3a142e9916348815f2b75679cfa0ca1dff7a007fd3890b609f3190453a9deb03dae19c723c35a822fc08f285bd1d59a2a300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504bfed8c924519dec05c0f9c5666583c
SHA1225681a5da0570d81e798380e38645283a000b6a
SHA2565cd38f213dd268e2b900258befc749adaeddc35b1792f78cb45e57f3bf8b6bce
SHA512fe66b4ed751f2b7255923ffb430030397dc43b466ff5df50b0dece56a6159bbd491bcfe6b5fca02e7177f431476da3e012dd06fee91a74eb7e3ef5fe43363d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583446fe776e6814533dd343715338386
SHA1f5e0cf66c381abd7526e9ccbdb8dedf86f3d9ec6
SHA2564af13ffcc76b4e978df0fed9a75c63b90398ee538725df189bc5e9f58f623df0
SHA512f66ec7d965dd9a72ef279a1f96ef9a619924754b9b8aad2710916eb6327778b6e982c5edd60d81a33647f446d67c679d3aba500fe08c972fd7ebb661d2d24565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef59edcf9ba59a0f88948e3b03f30bd9
SHA1f4337d5c297e4d1a57397ad070a2fa8cafb19b91
SHA256d3dd887445829e69a9c20ca5f326a04deb2e85a8dac91027242a76816ca575a3
SHA512a08f9a49e166b4b7a62b2936020e506d683745159914554e0ccbc15dfc1d3cfc90c6b4c94ea7619ad4e8830dafd5f9fcd423e3596a36579a67c66c16137ffba9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5832c76d7ebd0dd8ffce07d04d1efe8e0
SHA1f98efef76a18ffeb56e3fb509db907b30cea6afd
SHA25664161701784e30ef4cc8866c2fd354d69f54a4c2323e170b419326996c2cad65
SHA512a8407961818ea01d0429f1fcc405b91db91f84c83dc298980349fc2f29e5ab72ab56ff91a9aef85d6f3c1a92fee071493ada0aae9a706919d962ab80ae7ea216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcc86e4eb77b35dbc531fbe651ab3603
SHA1a039a6bba982f0c814b933811558ec5fe09c4229
SHA256fcdd4a6a2c8b137dc1a1f5381987b5d66fa41f7b585bbf47e6e40f4c7ed44e84
SHA5124cff4107e644e934da6c8f21bde57680d697cea9ac5c941b9063c86f3dbd1c246cd5fe3f6d9c07169c415368cd339a3857910eae6611c9d452eca1603ac375db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527883b37c3b4b7c80af9a2b84c83606d
SHA18e2145b66b90fbf54eb1e9be14ebdf421cc55fb7
SHA256ccdf71f4b4a5cf0c5e92f3a0001c98b218ff558412281ca9b811c193e8e6ab03
SHA512536341570c7643e93846fe2b402d07d66ad60feed8cdb42b757a43621477a621b22f5e28a10c3a0815cf0906aedcefd2e006cf65989c7e7c751a9a3a901b0f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52f26b1059beb4f09b5dc917e33ebacb2
SHA19d500ad12004cf5afc012e8fede31433b45d2234
SHA2563fba9b5b7721b8ee254150db02cb40b8b95dbe931add434a0ce047525b45ef3b
SHA51264e5e006ae845fc879a08945006d7378f0fcf8a67fb3848fd68fa60e320365e1cb453953f933f22a06b4a1fbd9b628ac77d9903364324a1775676f24a044078d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558f60179a80e91998f503fee6a019be
SHA1963ea3f1fa0fd09aa69abcd9f8e70206eca04754
SHA2561d0ab9ed711a7eb25eebf27e50bc8659f93a3329cc1b281e45cbfc5be6abf05e
SHA5121d9254bdd91b8bf46dc6cabb715cda82598c2cd900487ca0c453e271b6860e1026f7578f57d20d68870cdbb3c39f60313cfc727df4cb72064e606f7fb2bb206c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b1debfe0b7c3373081a82182cc18cd5
SHA1c2e836a35f992d13edbc2b74107e26604ef6bf95
SHA256c788d760ee67aff73d1d83c7cbc2f52ffb15051a44c48c6a6d7bb75209579483
SHA51250f37297eba8df2163e25729577acffc507c699faab102d76e428ec6436970b9d18156f58d3522826c660d85fc4a775a5e40ed255137d57ca17d3b1623372b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508c90375e317e270a5876a9e2e177b38
SHA10b133039c1f3db81ef008cccb9f771bdecebc33c
SHA256ab627cb0b73f2fbb8a1d6b8647b4d621f317371eb854d729d68c26b3eb77fdd4
SHA512135aea8663f3aca7d159420ff925c58346d87c8f0f9eb7527144be5f3aac84c68d46c749411516a084e210f45a08d0a7f129287219927823c8d242745205bf8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19b71b17d5946e828f3c352e0d3b843
SHA1810cd7fbbf3e66d63ccb4e008a5a1bc857f50ed2
SHA256dad87322a222218df93febfd05a00cb2ccebaed066c3b9f1685017a45d5d44c3
SHA512aba11f7329c578375aa210e8ce3d81318567938bef5bb705aefac7da7a0901cafb7668f84c68b9835b29915a548ea5cef862be70a4841a13ae60d42598d02ce9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a