Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
1959c267fcde8910dd65a62cbf9f17b3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1959c267fcde8910dd65a62cbf9f17b3_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
1959c267fcde8910dd65a62cbf9f17b3_JaffaCakes118.html
-
Size
87B
-
MD5
1959c267fcde8910dd65a62cbf9f17b3
-
SHA1
4acf59e329eb79e757322ac4a38e1cd0e547afd2
-
SHA256
df6cd6ea83c3a6c6ec5b18b1e298dcd581936595bc5b7f10f289d424ae7abf7a
-
SHA512
d068ae31da703d511c5fce9a9b2eb8acaed56b5e0307c10f9cf7626cf15c42df8830e87572316fb36da7e4e574f9b37041434be661aab517556be553e150375c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3c08dd8b467c94dbf09e57b276900af00000000020000000000106600000001000020000000747402212530a381ab59835663a7ff44feb9160b572c6e1e1e2ec1f38c26e0cb000000000e80000000020000200000006bffcdef516531ab1ce15855df416d9300de0f797b3f18770f46587aee888d6c20000000b8ee2bb5624bbc7e912207937b8130d1db1c68355334f03a950f31f49fbeb94540000000886feaaabae1b7f7dfdf56facc36b07add2c71c4955df22a8fe7320f06ce044c2fc0f7905bdf17c32a283c31abe68eca3ecd768e889e772d190c32512e7178b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B54B641-3523-11EF-8356-E61A8C993A67} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3c08dd8b467c94dbf09e57b276900af0000000002000000000010660000000100002000000062fd964ee272d8eaf0d139e5f778bdef29e9b263290ca9f763f23798d1432a26000000000e8000000002000020000000e85f1a958d838ea76d084ece0d3c635825bb6b456581c448262be4a8f27158a69000000050d2b1c3bb59263f9ac9caf9c6fadf0e53827a3bdff84b75bbbd43c98e6c2bad3f0fb7fe5537b82f2aa1e9952bb9f2540c9c260dbd4da5462e390d6659fb6eaaad7e3596b66c409cd904811c456c29d60a69c267211eec2bc46efd914d1560a287eb61afe1a8fb84fdb0395a286e34db72f0684b1428e6f54306abc51fdf7130e9f7a6539a5cfb5ab3e1b9adc78d6f2640000000b6bb94fb32bea5261b17b4dc00a7dfa44ba27c99560f753bf2b45a76e5e5e0883f03e96fdfa43e4229e478ca2bb819c42bdf32ab494e070ac022d46bfc8ca4e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9081d33f30c9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425723039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28 PID 2972 wrote to memory of 3016 2972 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1959c267fcde8910dd65a62cbf9f17b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df36d8920d7741ae28aa6531d3fe937e
SHA1bdb0a5031f0be1d78db3e42dfd738a09b1ddfddb
SHA256903ab7bdbc10993a2fc8a14236093855d0b4abff1a67cef6b256de0dc3a24171
SHA5127ea562b67a06d91a1ac98e752da519e8c47fcdcbf9f16fdc82b23516a2df23c46fa1b2acf911162c2a218c5fc49ff88ae1c2e4afea4e3e6641942c7620cec645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1c3bef2f14a274f8f403123e868e6a
SHA14abd9f2c8ed714526222ea58dc5eea0212c44beb
SHA2565ec7e9df2d6ab8e157b140ec77cb098eb3fb83f57b3d6744b07f61eab57e8009
SHA512508667263acdc4ed341d9db1ac71cb9334a848ba0d0df36b3555086783447db5513f847941a830487d287d3db75a9cd18d29d7a4f65d3e45b6775e7671255675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59343edf70b846cfb9de83b92606d31f9
SHA116c48219f5d42a8164076e3c3b2ef0bb8e494e84
SHA2566a2128ee8e62a548b94d3237de3118da8a8ba89c03ef11e1152f0f9eb68f729e
SHA5120d0aadabd93ef361c260dff93dd6462215f492c6b2b4eacdd94f098741a5fd347d74527680d48dae6016f227de540daadee247c3be8ac75a51255a2818457858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be5e9a749f551b86eab8b83e9024484
SHA10e795133fd91be81349cea7dfdc050afcbde8e23
SHA256c2aaf4b09a39df8f6e6744ae0eb209b9cc4c8faf73ee962ec05cb8a340699139
SHA512b5d878e348964d5c6efa90a3d79ff0fdad20bf07ad23387742f55b1d476c193547e590bb0af73033209b7e001f2cba646fbb526b3dadcaa26d34cde1c305fd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e75029b47753d55c74447e60bfb89b
SHA151eb0c60f232a9d36d0f40651cdc3cb9df0ebdec
SHA25618d3d6807b144c3b8c922c41241d2c4f3371655c3490cc84ab15d680c81b37b7
SHA5123dc46b984f79131175babb7215641288c17c30290f42399ce6de41c35b93dbfee38fba37dfc0ae9f6b1dcccc699173c1b0dc23cecb6341e8b995b73685a22c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d1090c417e977589b881aae72d317c
SHA159a4108b84ff544665b21be53d92af5c39319804
SHA256ffefbd60adf0bb0390f6eb9b55919e96b6c9d3e61a20d3aabd990c792c45867f
SHA512105cb88d84495f53a3938c1aa7ead768576ff5faf28e845240cfb62f750da3768d67c2a739e8adc6663ab15907024b72ebe7996bfc423a7803ccc47687bcef99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567502226018cf1517445ea8f4ec36419
SHA10af3ff370ff152440b09587465dda1f516668050
SHA256b53103e82b194d802d54dd55dc0277112dd62ac00652565b880859ada12e23cb
SHA512f78dbdfad920984691cead26a9f4db71c50990db416a77775eba99f82427ba3f69b551bd1cbcfef5b2caa32700b2974c42ba3da138299d6e9d73ea5ef26283f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534fdd3f0759929bdbc2812c5a667c7f2
SHA1629f65e62c23cd3216040b275fccbbbc42e90540
SHA256b3ae23a46f60f1570cfe4d9cebd30660b4052fcf387e5629438fd81e0b466874
SHA512ebb8e56db21e615f9e08b392e6bfa99cf58e00e994d2ea8185faa2c6af68bd73abe79d3d681040bf2a87ac9a4ba14016cc801187d8c62f6a2c56c84998caf594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58775a2bccecf1e0484354ae3261ba0c9
SHA1117cac89698e66ae3e726b1c083d2789670f0cf2
SHA25674200a40a182b68b554c921e27017881d09ed8637871cdcfe212ac9ee10b930e
SHA5122ac125bb0b63f75e393fb80a94bc065e284f1a55ae61bacfb1d7ac0167bf6d85b1f29eedda4827fb906c99be27073efb69e2ef040c0ed13cb955b31ca38d8295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0f0085f26abe37c1f515c3477b1584
SHA19f56e1739f008bbdfd32297349bb9457e433335d
SHA256df86f706312d53bf8f90117656fe6a6c0a33ed90a8b9e0737c12bca488a82559
SHA5129cae9501c7f1be0badd8e58d381cb2e3408d407f2f5caa3275ff80ed09a6ca9b74bc4dd71781a3e3389ba275c63050cdfb0fc3a2fc141ec9dca54622a9192522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c285047a555202c76a3413855196090a
SHA114c89e381fd266abcc5df515e5a58128fe4ba823
SHA256ba2c52827f4d4cc43f6fcfffa572bc615619ff61e621facb7a0198a6eedcdf26
SHA5126b11c7f2fcb101d4f56b8ce2002d676878ce65cea074da20d780739ff778a0922129941e68db5b1fbcf60031a0ef259ae7c2b6b96c0ec05672b48f98e86d7859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd69efb49932bd83859f6a25e4d457d
SHA1c95aec4a0f065b3ec27c4628aaa49bc95318edef
SHA256d531409e3aadfbac1d12c38cafe180fcf4556dcb1e05eb640ac45b93460d5d81
SHA5122cb530aa5d561f462ba5df93feef19beaf0df0d07edffdd7c314cb90f6e1f79c79f95f03d6223e804cf049e8efcf287985da20c178a6e99d4cb66d1122ab69fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da6339abf127e1d1a6ff7e82e3a1ff1
SHA1ea26d11c482622876585a3af5c109b21fbeb45a1
SHA256273dfa4e08f80af675f237518cdc7a5d5197610b396f1a124c9cb29a39b9b26a
SHA51288f523fbbe07379f2edf5ef75976615c54884a8cbb6e6958bfe397cc4bc31481b109258af32885eecda5661bf6b288a14f06bdc5fee5bc45b18bd0dfff7f938e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a8d0c583d1f02170d08da1a12a7c116
SHA11506cf526da841cbba2c5e5c9eafa6f87c309552
SHA256b04f028ccea41e5820e64024dbc7d9807ecf05e3c561d7fe521c1922c5954505
SHA512a090fb6cf696c97150ed09c6e3a225bb9e74e5ba3196a58b84d1aeddd4cce0237d2ff2c95eeb484b06545da954ccb357f0617223abebed8a9c23fb2fd4f6bfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b282b10c66ce2d4f9dd453584d66ba65
SHA1e2aa42c2b0693be6204958cd6b4ea52fad7421bb
SHA2565611fa89a8b02abf841d72240d58c1ec958ca1fe32e3f42e2eb35e9a4c1b75b3
SHA5120ab089c72a0296409949f3c86d1f9152255fb8a919a8c6f9c9073f759097544ebe1924852b22efce53db4d39fea2be7992823fc1cfe5d3c113896c593ff40b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa2daef7c2f40e51ddf19d5fb74f3475
SHA1de0ed6e58ba56e29ea8fbf83152ee62de81d21f7
SHA25690921a9491afab19a8049386a32dc648670fa65306de8541c0933f2ec98dcdd3
SHA512575886e1ca17b16a3d03c1a871c3bc72ce19de0962b3d8970f940dc1cf6bbc01e1103c1800f1fff3f09621d27c0622fc084afaa688f1f86b932af5635d1987f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b584e24249ef7a8622b9fe4d5357cb2
SHA1f828cc907e360857ea5e375a030568c04df49c54
SHA2562977ebaf7b4b02e1324fe6a211cd0f1285b19874d151bace5e3df8cf2b35f3ac
SHA512e51959247f3f27ad49ccfbc9e060e1318f5b5ca8e6cf5b70ce89eb12b62de29444a54d93eaffa1112b3b6a7483f1ee3af020d96d01645a42923918cb668bce3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c2a481ca661352b286b2d8635097d8
SHA11a9402ed0f1e2dd7b4c667bff92ffb1b585720ff
SHA25605f50b75a1f2e38cb2c7b0859f2b6c07d427cddf6ce9fad74ccef7bff4d05d13
SHA512a2a99f218c10c5f903433bfcb2017692c108646b99f98d0de74980a3cd99307ea6ae7011428c3f2d75d738214ffcb3a0cdb203c16d0afbfd094238142f2e9dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59914ba0d88133223bb8489081c865a61
SHA16ec8d4975b3560d3ade258d940229828da8f8c91
SHA2560265e5065fa14a2bc1887eb39da316b0672cfcb8ec3c02595ad1176e4438f5af
SHA51288e4bb2a006297d10dd7e27eee2e4aa2abf647c18d5118ad3e74bc6049446229add3dac423108b11dc48d5ff92ba71e1f6cd34becbb9ec91b15347974185c7a5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b