Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
eb005635365707d5151583ab3af2acc7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb005635365707d5151583ab3af2acc7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb005635365707d5151583ab3af2acc7_JaffaCakes118.html
-
Size
121KB
-
MD5
eb005635365707d5151583ab3af2acc7
-
SHA1
350dec83dcb3bc46ca25bb494565e92e1ebe08e9
-
SHA256
39124f224f61d2ecfe80e0720229db37a50a30a90301bd010c44b30c4e1aa081
-
SHA512
5fb9ffb99539129a194fbea66f63ecad1b75b5645b68ce4c8e27cfafc870fc08e76c13d4839ee652df303223b67f40b650e2a2307d58233069b55f740c54819a
-
SSDEEP
1536:gWawZOyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:DLOyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000027f196a71015e3bd1e2c03f2e53ed7794e013115a4add57798581758bca2ee99000000000e80000000020000200000003eb86aea3caf3aa0994842e6f526d03fab6fe5a3cb8731302e48b85e69a4f84120000000a39b7b1f5608bb2ab05bfd9e37c2c2e76d0e0decff9c425de9806d1bf2999a9940000000925b88c5a83e1059b12a2e2ccaea55bcec2f4425a6d3a8af6728a3d6e3fce0d2c0e7186a80f49e9297cbc7be3629ef863234c59296f309f3446b0b9bcc23f018 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432898568" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FF4AC61-7666-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50158614730adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb005635365707d5151583ab3af2acc7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039e52ca6c3e90c1e5a63fa948ce7a08
SHA16ed150527dcb922ad7b0cf3991ffcfd37bc2d8d3
SHA2560d0f0620b7b19bfa24a666104e3552b9d963270e9bcda4aea97484ba0fcfbb6e
SHA51287e7eb65039c559e7c55ddacd739c8756eae366d16060c6da855aac07f6c7bd46fc48fa8ce31c3d387aa1629f5f4ab82f519fe565ce5a106752d4cae3e974883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f972af80d2c00e1f1e915c2e1e565864
SHA1fd1d0a515969981321ed0bd3a36f9b9a90c7c931
SHA256e3b303a2e88ef9ec0fad61c975498698a96ca6d54c565eeeb39804622a166f53
SHA512826127feba1c9e6101a76d3adb7d4f69acc9498fcadf360822053a544e4fce1b2a7bc02fb66f838556f0ba6ed79b4067e807fefe5e8138392e4e0aad63c8ebae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535f6c53caba1ef7af8b671c8a26b80fb
SHA17f004eff743b1147ebd7dab314276224c5043782
SHA25614a18d7b2211ce05f056e1e65f1a0f7c81cc75add57a1e4f18faa6d55a1baec8
SHA5128eb79381b67c1f6f55f716aa2c1e4c72de23cf592d9ddee57049e613d0ce50f289229747a3cbc483d91fe791ff395c21358a935d7f360a71c7031471e6e94dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc9c00178329c258d3c5ecdaeb0c136
SHA1dee3bcde34ed9c776349307354d80ccef05d3509
SHA2567eb4b2efc7ffd01f22fcc5811f250a2f856e4566f1b6d1fed43150d1320a655e
SHA512a9be7887234e8dfea6947c805b786ea7b9c90149dada6d8fbb522ffa4f652d5109883e8cf7d088ad5fc073fe6798f4ad0ca7d73185826e8e7e47b66c8719cc80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d38d8f8d6cb99534c20b84753ce5b1
SHA1fe5f5392d429783fca657c97b095f4db7a0e73d7
SHA2569acf4f2ba547535f0175e85e6a0d3e0e10c4a65abf5b14dbbe31ef85faf3a570
SHA512893bb548a632deb61ecafc0c7398fab543ffbc0171522963256cc56188344e6d755228043fa5a0830db1878b2346e7b08206150d9d673b840385027b6aa84dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d99773bf4b10f50a1483ff52f1caa32
SHA1d458f11840e9f6b55f85967b294cab9b99b639cc
SHA25642b63eb76f7f37b0460f89e5083a52e185c0615c7336832157650b06475b9e11
SHA5121e9dc44a0dda1bc5008f33c04d56640d896c864928db5689bc1c7a833080a5ec02232e57b3406d212c046759bb1527cb87b6a6b031d6524fe39898c032aaa614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65638dfde1a817030291e55a0c624c0
SHA1ccf2d5445e0e17e9a061c0b9d82584861f7eeb39
SHA25679d6044850ea5c306bd1615b737ecd566f9793aab1bf01fde9f846af0aefdfc5
SHA51290474d643c3558642e1aaf88008fdca21d73b22ebb669cf780566eead5f907125e90d70492e646e8947bb02236383d9587730f1588a2f521efaec031af0c4823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbfb00f03c3df3551657664c6c4f297
SHA1ada574d811f6b42aaf6d3630ccf6c001b896f8ed
SHA256a16de06c745e5b2db6498420d35d43f5106f93f2af17f2bb18b203042fdd1d1c
SHA512795a9e9c4f78cd27ab6e1c2f6d0984b5b5fa03e00dc0c230460504cc68e6a87472bc94b4dfb7940e7e5b657bd36f679c4d2625c2c5fba48d254635226f4161db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2797a8b101931af6143ea71f283ebac
SHA1f204d520cec2ecf1755a8b4a781a22b8421bf2dd
SHA2569cbce5c2cdf7d88ba564b2477d8b9b6fa133074fbd1c1c85c6aec5c217cdaf74
SHA512f254a17a69b75a522c7edec0f25eff9df7731b8f2c4144a3e8ed579a9aa4c7fbe90b05b32a7017eacadaabb5ff8f76a3d7105dd9f552dca7f171e69840db4211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53354dd6b0dd90e1fb4498eb9b85774b5
SHA18c6ac7b187abd3eb57a0c6fb2b0193ae587c3359
SHA256de3f14e570bc5e8c590813c7101b98981ede51f2ac317231041fc2fb9ac4a811
SHA512b5e67ac232bff0cf0c59ef30aba4083ce726d5c43ad53b13060a5d349e00647c908b042eaaa9ff9fff21abffef778ba8cf246d692cf0c70b0b7271434fb471bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc4fc0a1a1fc8475dae5e2b9dd141d8d
SHA1da319b84e55c30deb2269b8be33525e442d49c03
SHA25637fd30c336decf12ef6a768305abf0d109cb2aac90946d539cead47809c0ba9e
SHA512496b1feb76b08f27c2c8dd628c5713080bdb783dd04901195e89e3ac0aa6bdfcc359e8125a37fed127d4b35ec37f03654e03580611258ba5790ed28a7da8a5ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52093530d1557ca56e90e26a359a3ec92
SHA1130a5ced9bc7c7388eaa7483d19ff29a7ffd2f19
SHA2560dc8490ef0a458ddbb3419c30ca75ba3790d391021d95417b8c90fbe99f2e0a2
SHA512bed814672e6f652a26daae5e001a463047cd5b3ffa10861fc04f3f9953ee7b69aa8cb661cd2f6f7553ca6fb645449a38de15909fc358f0981b5090a546d0fce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68e76864b8a1b92d390f41856d75494
SHA10d276061ea2884be0174c4c8e26f372133eec32d
SHA256c61c70b4ffddffe3f9ace0c070d537449221b48cdb3356c335e2c61727c49d23
SHA5123216a58ac72f877e5fbf8587c745fda1b516340cabaad7cfd21ad2c0206d9e1f915d3742d9a7e15723debe0f3ba0ec946a41916a7a278a2e9b84816b9f388e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140e91dd4e2f535378b83edc3973b7ef
SHA1b2ce3fd0add4e9c789680ebad3d4133182e48e41
SHA256d36f5347d648e50b38cd2b25ea878422b4cb2864c457719ee4ca1872c9c03695
SHA512e360683be89cd83d5a8dc6c689e723dca6d95863785374639273cda3cf63a081bfc45c8bf803cf24fdd361b8e2550268c12cb92eb9380dfa37218a3d5d95bb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9de2cf00ed48c549b62d49bb56a213c
SHA1f2a0a4701e39238ccc416714976cf4e16b328303
SHA256d25eadf83893f60100bc10ca527b86237e26964f0e5912778a5477bfee154fa6
SHA512da5df06e722048dfadbb8867444f77b226f4fefc9acc06533417e628eed74725917bb5577658f36b00f82cca704974b5095fdeefe3d6c391c6e20ba5a7718ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949389db3dee4812ac83c3f520d61f06
SHA1dd1c01d8c12af2743628ac6740592d7d2e51700e
SHA2565a9f1e008ab880a4916f6d1b1d1d2239bb7cd2bca7aff13746e4ee7f5b91dabc
SHA51236bd8a72f296c9470682b71a4ccb40dae5c655c5586467b85156aa677b0dee0d08c1e99000f1b78b9ddf80f163398d04ffb43c71e5876d352bbcaab6ec0a66dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a3921dd3570912ea54c69c7b0572b6
SHA1e942932f59817f8927cd0f8d5027542a2236489d
SHA256c53592a5a7e5e84b0c46d5591185682ef46fede888503c5cec112dda1edf7b15
SHA512f1cd79675cc607f319da54910ecaef30914753b541e628c253aa1d20cd10699e97a9ea9269c0de283b4121a115b8a1373a5f78c499af3b07ecc839e442d4aeaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52895c13784cf0ba15d9819667f18daa4
SHA15695843ff0e0a4595386f741da393b9259361b84
SHA256bd37d858704eb429bac2b32eb7c2a4b44f9666bbe71fa56e1de3d0c29d9f9499
SHA512bfb40489d59215e34e9796a0ae06eb193ad84b5b20319648e1b8388db59c9f280256e933abcf1cbc900635f36db5fe30f3a73dd215a932825efdf5e8343cf62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2955f31532a1f55ccd89d0d92f54d49
SHA1cc47bcd20dd34c50665cefed0cc9ba24da7950a8
SHA2561d80070809a213489d809271331d6b16a66101dee1c1f353e3673453b8f7fd5e
SHA512eb9efe35afdabeada948516749a8f0c69f88ad8a95c7ca435101f53fbcd2abf11f8550a60f0f4393d5a7b8f8c435b5195cc029e7fed35bb0438e9a2a456b22fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b