Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-06-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
91c4c81f751e828b1e1104122a782e94_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
91c4c81f751e828b1e1104122a782e94_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
91c4c81f751e828b1e1104122a782e94_JaffaCakes118.html
-
Size
213KB
-
MD5
91c4c81f751e828b1e1104122a782e94
-
SHA1
bcec800d5ea4acd043b58be2f315faa0b5a65c60
-
SHA256
2debab940289af098854c3363d6d9706b0aa70dc8f56d0ece4d322489b209169
-
SHA512
2633404fca5382eccbfc29d9ff0d6d52189a559904d64b273ede917adc097a795ec45ebc269a8463636dc5e14c842ee0815aa2e229e6c0b580bb38405b49f68e
-
SSDEEP
3072:/rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJi:Tz9VxLY7iAVLTBQJli
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000054fa49370ea22c498d07438c8939b00500000000020000000000106600000001000020000000cbd7dc8274f3a03e6fd2be61bffd5c934dc55285599e4516421d8b52a637d465000000000e8000000002000020000000819c20e57e62d6c455f30ff2a391648382dc109ed98d263e09417091b29653a22000000001a845aa9460a5233bf1b97ba56ff693e78a54fb4015dd860775a5167c5d97d6400000000912a68338ff3473f5b336bf9a15867e9ca30d418fa0279c7b5a317fb081ac6c7ed3b431087f03c881cb2b372e13e0f3c022d194693294989ae03fba1a52c191 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{016506F1-21A4-11EF-BC3A-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423579243" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a8f7d5b0b5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1636 iexplore.exe 1636 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2972 1636 iexplore.exe 28 PID 1636 wrote to memory of 2972 1636 iexplore.exe 28 PID 1636 wrote to memory of 2972 1636 iexplore.exe 28 PID 1636 wrote to memory of 2972 1636 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\91c4c81f751e828b1e1104122a782e94_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1636 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57219fed943fe9bbe4d1aab0f58b7b5ba
SHA1958457e193e12f9247073d1ca391c791744354fc
SHA256ae26f794a57db2014b7fb1cb3e315bcabf52f3c89317b17f751032530badf436
SHA5122c19ac540d50d579d8a651f80e5bb94cb0e0d010e8dacf2b9dc6df6b998ebf0a0bf11650f86599bda385848ea9a1d9bfa649466ac2f2e83e79840a369588aebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8f5bc385fb50bf994d05143d602a68
SHA10c47b242a51e42469be63951e6437d749f03780e
SHA2560f73c2ca6535f380da31cd16b5a14b85cb5d6ffad3ac7e87707a622f727e4e9d
SHA51239bb86e5072d63c202f4e1b17942b45a63fd9271df0fb04810a1733b2f2440bbecda0d8a4a021d9741f6a2c36e2da610b450b5a65640b8070469adb7fae2a44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bc310521e4b9e4ddb0ac002fecc117
SHA13e0808d5f33df77427cbc1d5c29845960a04b499
SHA25682e370f43ee3519a7a2a274124fbd9c7c9764cb6e8f2c0364aa8b22988639e5f
SHA512e93228aa4e59e4e399b30b45a1a14aa9d2769e1c11065c95c6ad89e90ffdd44feaa59d12953537e0ff4d6e9e94250cb4a7826513cb647e39b14b7c88a7ec6733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be1f7b8097382810d9ac158082da0b7
SHA11a96cc11801a6469d9e08e2f0a58bcfe4df7cd3c
SHA2565a0c45a603e1b61f102ff1175d69fb26a5ab295ce645787feea7b6dfdc5896e5
SHA512594b1ff3b8d6dd374a369324c9737b137dfd8313eff112a2eef8f5c2a006665c0556c193ceee29bd85c934b77a991e519b32ccb668b218713e020a58c899474a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c33a1a3de8850e370f205300d878e6
SHA167fd5b37557219412d7d7879987913618d9dcac1
SHA2565f4daae3cd934dd3ced2ae88af1c06cad355e4e1cdf1e325fdaf1080447dab68
SHA5127a163b045c3b9be9721fbf934527ab690cc9bef855662371f1438bb5ae4564ca0bcf90f2a8e66daf562bbdbc1dfb1ceafaabfc87ba29a323f4c8dbf4913bd031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099f5c8214c5a9a52585e223f2ddec05
SHA1eeca2ced7f8766f810539adf85848f84ad29ceb6
SHA2568c8aa1e3c43510526213b3bbf15ac826f8aca668451485a22234fe8d8d8319d1
SHA5128123a4798d4e5638ca9f14f5f7d1fd15392a8d936c7fe8c3ce1c4245189bc5017ca1f1efcf3cf8897fc8c77db989e37781ad9a1e1c434097a2364503bbbfdec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94e6f2e94f68f903cf4b37bc95e53a8
SHA1584169d73113bba707681564bde9a8784b727165
SHA256c66afb90ba24b802268fc103996b18e630c098a648a1a00e75b934af22f4afa4
SHA512a8c701ab71362b19de144b444eec2e780f768f25f356d78ab7979d8c117e7a05e829bf74ee5352007ec08ba5e0f9d519e8ab305e22f2d10f258eaaa435fbe62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cdfe6f1c13d60712340ab8c091fd5c5
SHA1e42fab1f001b0dd43de39c994a7624f5b9ffe8e9
SHA25632c98f764a5b633eb896d856a12899d7b4b4cb9647406af4caf41d942b5e7c6a
SHA5123b191467b4c165d80b493f0e36ce8fc5e5cbb17312dd929edb7cda9a1ff02ffbf0fdb77914fc32a9b8fab21c82320035954e7415d6506b73032adcde6583b7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f6e4f6ec099b0ae46ed2fa84417336
SHA1d860312e042835b980a079481aeaba3cf397475d
SHA256ef7c77683291a719c85fccf19e671188ea0185608636089af9f43d23cae02e8a
SHA5125219472ec3a2eb48cd88d93f1c0c04633b00ee89fb29c9862087efee530f06df58c2eb3209e07a3ea62b92dfb7a2b376a88306f6bbc31f655ad57f96f49f4585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a1b3245874bd9998c121e8f648088a
SHA190842027b79f7d7e749df3c0ff3675ffbb3d62b6
SHA256207570fa78bd6489c2b8699006da81f503f4115c97bad96f733cb54f97aedf16
SHA512752f2ff9e067931319f4c14da9a0aa27ea2796d9751294ef6e7fcf1e6b72e8ffb7299c1e86718e05b2095807682142d130275eedb90ffb047b7fd66e39396924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596ce8cb46afdf52c9dedfdcf65b584f9
SHA11b93f3368a876cdaf9d10124d258725a291f0129
SHA2565137d445df07f4fabd225a2d04d3ae7f4fbdd74fb8e2c87b47038eece0bd48e2
SHA5127eb01d5ac246d2a944efbfba5929ed7c3efc1e8b73a67459508fda81464304c34eddf66def9811da3a5ded1f6f6bb7255b743d3cc6f0ff0d25a280344cb77529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a88aa75f51de6e09f66f3e6a18b45aae
SHA17ad9a25f174004cd4c8ef92a9b23387683f1fa8f
SHA2562f4c22f37ccb9e4f0ed08fc35353b88d865564c1d67c82603489c8588ecdf3c3
SHA512a2fa53f326974f8e71077cd3ec73b7bc81e523490dba18452466fc6e22c75ea2183c1ad346bb44501888a421320bdd09bc7ca1cd519166e31621c191beedc9f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba04b323a408a1c37dc166c479d7ea2
SHA1f0a74b8d5048f1c668fb1624e17faa03635a68d6
SHA256eba68f41d10bf32437178d807b17bad98bd94cd268f4de85db16cc3a16b4e44c
SHA512e9f7a6c6670546e46f5e9c289c45e21ade5ff70e294627ab0902368e0bcf6364be257d05f32534f53530a6afb61a0993bc5ced2e0a622e931bf7b4c15edb6110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1765341e7e50f7819e3f3634eaae86e
SHA1d76525be3fd3ad7d81f5e5ddd0e4cb39c1dcc9d9
SHA256f51f2568a1919546750675af8c865716e7b7649ffe593b567b6d90c2614e09ea
SHA512f82155ca2d5fad66fc0af957e2ee00dce6b2b9e79b700e235670cdd67338d8937ac7711842864ab86f81a58ffdf440a79dda2b1506ba9283f869259f0c818478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54711d4ffefbec2f997158258b89a807d
SHA12a4c4fb1dc02d30d1f52a3c6ba2e317bfd1ba7be
SHA25685663f6b2357ebf5a81cc711f5094055f56843d083f25d7d37a97bbf38ee3f51
SHA5122047897ad13cd96f4f2d12db9a227ced91f15f068dfa3a3bd787ceb4390ac4ce601f3617f61d0a076fd27e55057e888d444f03959f69458a2d93f5bf095cc6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91b9952cddfd8fa6193515fd814a301
SHA12380f5ca755ab134e30c68b2d91ca4cd0cf4a002
SHA25664d92f308659818ecb60a33e08a5d72555f988e4db530ada8ade6cafd90229d0
SHA512af507ca69cd062a3fbc8418ba3713c6922da9d750a0ef1c028c8c0390de8e30d557f18c33cd968998aad274f008ea8ffa1a403b1268ed4bbc8d1d47bfd0f6239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f26a743c5b602ec19a645af377b974c
SHA1cfaabab11f5f6314cb3b5f2b9f42e004938b31c2
SHA25674a875c6c978418446f977f22c21e304cad411e84a14876715719ae5c543d943
SHA51289fb0d0b0ad1baf6c46e6e47f02d1aa452b9145fd3bb5bb411f11dee32b31ff3ba01ce805d7c3f1f48549e05cff2d5b721e1583bfbfc44f382d82e59f904bd28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fce6f5b2f95c2b80b4fbbdf871540abb
SHA1ee16ea8ee5e9d9a98b33f036782ef09908c85d32
SHA256ccebf1750b6874e1bb64f6403bd9150792e6521fb00c18d642501d4a02f20a82
SHA5126c9fb468106e93c9494d9128a8bc68a7d2a8be1fd1c8c70093f1c52657c7e5f5e3a1662399a25f351615fff91e6037e4566a50e7addf3de091318c008256afcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c32b45de6865339a5d94f5e18a36fe
SHA17c3999557a448fe28cb00543db1554d494b1bcde
SHA256438ce4abe6bc6f48c18e57e4bcae6310a26311f0b4b9f3482008f83eac1146de
SHA51290ba409bd0c2f72bc6173777e27fd0a70a37623c371f32a75f784fadce0e2bdf6f4c9f2b7c77589d8f169ed6d74070c978642f50d09933fef7d881cc061c30e0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b