Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 17:17
Static task
static1
Behavioral task
behavioral1
Sample
6046410e660d9afbfd55ad4517f0e945_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6046410e660d9afbfd55ad4517f0e945_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6046410e660d9afbfd55ad4517f0e945_JaffaCakes118.html
-
Size
12KB
-
MD5
6046410e660d9afbfd55ad4517f0e945
-
SHA1
63d809c7754ae80de2733386d7b7c276ce3341dc
-
SHA256
e3e74e8ad868334c72317a36f9a3c72e8c875a664ee31944401eba5892dd5777
-
SHA512
2c9f0966d96f747b8e8fb76fa04ec9249b7fab5a122dad2fc17bf30c643c8e70c79e687a8485f0a512862fe436e41804b8bb8b61ab73a0bbefcadec74991f4b5
-
SSDEEP
384:SIApoYHI4w24SJ9vKe4gO3jMxh6Aw8RkgFJY+bPowZJH:SRoYo4wnyOgO4uSRkgFJY+bPouJH
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f7298ec744e31c4da05212418c9f574d000000000200000000001066000000010000200000009fec27ad6af98a28c18b86ee0f8c67bb3af9d539a5e15cc7fa18da02666ee178000000000e8000000002000020000000795e502307d0adc8121eba6fd3ba65cac29ed2146b556f410932fa9309d4662120000000c97156780525fad66d79f46e7d2598bd6922aee90ce59f2591427d028fbf794040000000cd8aa2eeab24d4e2c5cc2de21995f0366990860472bdb2dcf60b468a565433fdbef759c9db6e7bc9e214b26c919f053fda317e040e2f0242af9c13324b089b6b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422387345" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6C67D11-16CC-11EF-8840-6600925E2846} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f7298ec744e31c4da05212418c9f574d0000000002000000000010660000000100002000000082bd411fdb39ee745c7eb691b60b5db76a26baea51624c50386cc65c0c1cc328000000000e800000000200002000000014962259d638672c4310d7be37f7e07aa41e05c67040b3ded45a5a9b67b93dc990000000ed9ea6f4b6b28be54a9920154357931748be0033a5f69d9b1001de09aa0597fdf146fc3123e02d5019e2d3dd13c300835bd135290344a7aa818c45098b27cb6a42a36f75be2e9ace52b875b4f0da11b82d977cccee021eadaa74d68b0401d1f6bfa5b021502a74ea8b5773c7346fc703842d0635cda456285f2e7736f9db7c4b8bdf7f10bfda608aa70c12701b9d220940000000a1a3edb0c4c186abecde6916727731a5c349db8b99e019ad0ffd3271145938b99bc934dcc7872d1f0068eb461bbbe5d103ccc0450cfaf0137dec2f4c3d42d24b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08d92bbd9aada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1668 2268 iexplore.exe 28 PID 2268 wrote to memory of 1668 2268 iexplore.exe 28 PID 2268 wrote to memory of 1668 2268 iexplore.exe 28 PID 2268 wrote to memory of 1668 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6046410e660d9afbfd55ad4517f0e945_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d745ceee6c991816d79af563c31fd4fa
SHA117dc4f5d8e26d959ad47d6ed95977d11c0955584
SHA25676a0d937a9d09d6a42878caf7047e51d85c7e7e6f520e375cb4c686c0c6d75c0
SHA5125fa0443728c6423a9970a4e347e937efbb11319aa42549accb2059bb934bb2ec03f34e552954a044339b76b2db46c08d8d4beae23fb06be431bf35fd3251b5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b179c3e02da87a8409c2061b13266f7f
SHA1f0ee3d722147228c088ae71eb473c7700e397fc3
SHA25655dc3fa8c9c1a3a59399ebc7cdccaf965801a3b47397710cc59f4585a171e669
SHA5122af884ee0190be810400629110f876206e2212dcf446edfee451a582a60187cb530f5d2cfc1416be1b138e9279f80560fb0228ca7df8299281c63a7f222d3d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b64c5f7fa15f0075404ae658a1fadeee
SHA14998af3620846f12c93d5e9ef3b56720e6e05398
SHA256e8017730e30b9010034fc62bd0ca9cb89d3c6ea364b901baaea2f183f70d3f46
SHA512c59183e768637bc818d0a746691d23cc32bd270317926178e635e1ec0a0374b5c82df329a4669e0eb82580fc52cabb47e644864dc4c8556c2f93af65825f34d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a0478847252c70c935118342b437f06
SHA15f195d67fa8ceeaedb62fb613bed58e4a8ee4e6f
SHA256e2d83ac9c30d0ced904be2adb44d72615cd6b2b24268522b15ff21a3c7385ba9
SHA51282ef3fc2a80c079d6e70800695720f1c016d21de29b5c0b76f4756616a456380e37d211afe681a96dbb7fb10624aaca17419a1c7aa69fe7f0bd4fb27bf0f5279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51afc52c0b4298d3806c1ef6475e81218
SHA17feff522dda9810580e9b07e3ede564b5965ced6
SHA2564dc1d97bcf46dcf80fcc7bf919c12554753828852010fda9b446c798dfb224dc
SHA5128c32a5531d03879a7d5854ad2c506275652e92c1d1fc3c09e18da0ee6adb57a1889b5e0f9790f1a50bb25dbf853c21ad382e1f8a708f0c8d688341718dbd3f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5278cf205117037057991dd1b996e6c66
SHA123e5182ca8c706aabf0ffaa9d82c6d6c0a7a021a
SHA25615fd01872e168055644e3bbe6a4a4ba0154a398dad324d1a634643fcaf7b84ce
SHA51240615dc3fd41a406ada14f281720fc378fcb52ea9c89636ccf8d72a9c16cf4120a9a82fef71a3501d3fbd43ceaea5309b8e6447309f4096bb1775972c87e4e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5026721b833a753a2f5ba7825d5b1fecd
SHA19406b4ccbe374d342e437dab46bec4de5f70ec8f
SHA256d35b130ae623f6ec8dd78af73c03f6ae9f88526a485947f166a6561f1ae3080d
SHA512183495fec5dd285f52c99aaf7df9cecdf51534c1f2ca22f12dc4311bd7b89ce160eacb34cf374d3d0fae33df80edb17dbe4681408fb095718001a8bd96f5d05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5428d71f79443f1c355e22c99ad62fe41
SHA121c48f61576ae5b035af79a5242581f6e2332143
SHA256bea816219395daf2049592b434d742244408f786fcd480a7368ae5a4341bbe32
SHA5123566566f498801972ca3716ee30e96713737cc14ce4f9d168989c719dc8760aa3eeb2829b8820ccd0db6153a5750feda2664ff1f66cd1169bb31413ce7ac718c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50316cc9c2e0e51c2fcb6f07e499a73a0
SHA14d630b4aa180d057361a3b0dabeacfcf698d8647
SHA256483bff3086722023a25f2e306b1d52576cbe4af509e53c13d19a25d0c518ff9d
SHA51216d6bfc40dde52342c36dfede4e952e2ff1f4f35547d65a8c241c9ac5337b3acd1839c51c0efde0aa5618df72df01ddbc55b47430b02b5fff7ca7e162b8d7a24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a3eb9790088ccbfbe3add112c23a7af
SHA15677261f3885f3e36f8172d9b15ec8bd28db246a
SHA256b2ea5bc588fbcf2efa75ee334d4d4aa3d783fb7190c5c14f45571e1bd23f73a4
SHA512cba8abf320ae7d69eaf0bb981a9ffb65ffa882cb39cde8cda294123c11149b797456dd78f81eaf3ad65bce07441f17346e906a4b4d3c152e01960308e8fd7eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1709cb20f3f481bdcd9cccbaefb1829
SHA122e0e2a785d6ac8a5088b4d48461b7c6e4a525c3
SHA256a8210eaec60a83672179c7fcea9136bc8d5e4e245933cc68dc2dd1a94b5c5e8d
SHA512a63f0cb8bc08c92dc5ad8212f3673f0031989c25bfe934c9a1aac25b473b3b1e567c488a8a78b2754c32c10c445915bf476caf5edd9a6632fee6379dbb160a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ace5eb11c61de5be9ad0c640bb418bd9
SHA1e1ace19edb8d261454fa3e97c0a64b7cb61f03fb
SHA256b20b574a8694a168b58fc6dedb5ca3f30e78f7e27a785d9d836cca64e624a8bb
SHA512f2e63ba1af71f6501ca06d2a3cc05db85ca5bee7a44c3c406402fcce69cc6840e69a04177f714dbf1ecd55a9e505c3e3323823915732bb8f9716e08bcdfdf193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aa91ce5be55f141326d0a22e5ae873a
SHA176bd5400c8dbaf31cd55072dad8799907ef8360d
SHA256d75a0b30d95a063fe3cc6160f335f0145794428cb2063acf93f3dc0d0749eb9c
SHA51287f6cb2db8472b76adb0200e06f2750fd5fc0068f856016055abc3a9ffeb048b035bdf5aaa6ea806a82f6d97b39042496972dbcdafe2758f403990bea9284e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab1d475f6658359b681a628f07e02e15
SHA15a9bb3b300a0d6ab12826901a427dfeb08912bdd
SHA25614624d0d5c6ede8ce59b9de35841309cc7501bbf5a127435b3d156ce21e65c5f
SHA5127e4a12deb59e69a6afd97d77857a5d4dd67a74c302deb1ae5828bc1da1dd8600879c5e65aacafb84b58d37fba78fa2fd99050fb4b7967f9591996b0d4ab4e11c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e78246a34bcc199a46445792eff8d74
SHA1436864f18f9eb8dd1395202f840795d9b001222b
SHA2564bf030da4aa6df253e8d346581ae19494b5149722b25ad4a7f1faca441a31701
SHA512656751d272949d1fb7888dc7752aa006b5efecc845494ec1e96cf991d9ddeb65f688a404ab6709e4c7ab34f5383d99545c863acd856021e5b18598c8b06eda6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5974f7dd2d653ce3cd4fdf2e5527ee131
SHA14b3d7993cfc80371416088a924c2a40967c75e1a
SHA2568cf011d5b73a73b89765e1880a2c5e3e17c615a52a620b6f432072d2b740fc14
SHA5124774f71242a9294ecdca761234256338b197ab8be64f6631a76ce3ed8b9a180e20502db98928c4fefe792881d849616e56a8d5254a600a9474054f85581491a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5850e4f10fedbc0b9b768907a2c0a13f4
SHA1e1510d0fddf2096d5e912f85880e0a3bf8139fb1
SHA25618e77f742294dc2bdaff1a187bdc89c2adfaac8a539fe74affce5b757c9cf9d9
SHA512099513977f7a6cbb33dc0ac754b9bc884589bee07d13da61310c70cffbe551d190cf1930c7691ef37eb64bfd660057abcfbaeec523727a89e28e4d6ba18021cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ab72ec6ea4bd433a32838c717d7b8ec
SHA153a8f5f423bcd79c5926447d63821b9dde3ed664
SHA256c8e993a053067f12f5a873858f92ba706172c12372b4e8be4a2cea149cc3d6e5
SHA5124bcb67bf3e6eb23f8ae3a6dc3e77230ded31868cbdd85d8d482c0fc0748fcaf875f00b631330706dfe6e18163f8265a28433e0355a62cb3fafd91eb3a80d4f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0a612d018ba06582fcf822ba0d8e3d8
SHA1cbd8a5fb6dba5b3d4a7359f339271e40f8ba8fe2
SHA25693fbdf35d60d5c73d04ead114817cbcb2eba2526fca1e54f0ddd2822957b6d69
SHA51250f0f865b75d1ed6c72991efff269b7a29617f13063f1de574f28fcebc00fbe550d14aa4250e1f53481e2b69f5093b1fbad4efa028a45f4af2557efaa46d7bfc
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a