Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
fd2fca02e614028a41d0cd1c6bb8817a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fd2fca02e614028a41d0cd1c6bb8817a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd2fca02e614028a41d0cd1c6bb8817a_JaffaCakes118.html
-
Size
6KB
-
MD5
fd2fca02e614028a41d0cd1c6bb8817a
-
SHA1
361c84183033f25837a7dda31b4a654d4ca28d1f
-
SHA256
0fcdb18959b8e50de07f31586ead56b09edfe0055f22fb51935cf44c9d800b4f
-
SHA512
9b91967bf55a656dfb6324c2faf6f0164cd38f9d7e35868ee9327d6bc3d3d1faeef0da2946460ccf0bf1dfb581ecaef0105065ff17d16d009ec4a86e099665d9
-
SSDEEP
96:uzVs+ux786x0LLY1k9o84d12ef7CSTUOJgwjNTVcEZ7ru7f:csz7Vx0AYS/Ccb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609a2571ee11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433721208" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006cb01b0f170e90693ad4ddce1e3284a08889a9bf8c18d5a381bc1a0b434337e5000000000e80000000020000200000001145aee97014046da9db30f5574a508fa9cd470f02658b016bce5c04798a159b20000000510dd372b52541c3a056f5cce23974a46518adc990ef21fc310bdc0a1f27eae14000000089c2f4ed1db76e10458b6b5d6521e057b2f4d72d7e9352781e61d0a71d8bf02e7cd4813a8b32018782648ded214f38bb0d0b8ce11d948bd1113790d8c76e4766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C2CE421-7DE1-11EF-AD51-4E66A3E0FBF8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000008725e38117d2b1901e149e515c9aa5923e7cb99f204daad245995b07a8fc85b000000000e800000000200002000000008698bd8a4a0fe369fb994609aa4ca5f94d0da2d20dd14f1a13844d57765d1059000000015644921a4c567824c0562f3c796c1d9e9cbe05f8211c964d703f773798ff12a6d8bb4bc5a248b5f7c88182049e1840c2331f5f35f35682efcee4ad756e7d035e2cc71dde4edc7c161d9a991175d263d6abff009d04ae74fbcd5471b040ae307a98021ab5526f97634e3cfc38c4f2c46e296ceedc937292fcd8e54d2f2abfa7b1e77528c375c6c694732e0ab3c1b612740000000314d8b00f545d293371b9ffa3493838464006911cbcd970e3e10eb08efd2384ecddde6fbe9d359d699ca77c9c67912ff3ca799faabd4f9eec439f626e0bb5581 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2056 2360 iexplore.exe 29 PID 2360 wrote to memory of 2056 2360 iexplore.exe 29 PID 2360 wrote to memory of 2056 2360 iexplore.exe 29 PID 2360 wrote to memory of 2056 2360 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd2fca02e614028a41d0cd1c6bb8817a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835d0f36ad872c1d7710c87265ed8c67
SHA1f1c34cb1da4de8c50604b0fe8ca9fefc4c6b1c37
SHA256dfee467d736dd2ee6695c1b125b982bb19cd736cf2eb126ffa1ed8aca597f2b2
SHA5122233ae737c0a69c9845238f3e4051583c51e943d6c4e3e185ba0df0695ba22101e6c8a7f3cd9a37e09153cbcfe4c21f5f1751388438aa0e6ebcd54fb9655638e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87fcf0a43589cb210c9bc11d393b164
SHA15a32b41ee81ab613c11784a2504e4437a8d19b38
SHA25691d127ee7e36907736b8ca22581fd5dd50fd10dc6eb41803cc72fbd284cb82a5
SHA51287d26cb0d502de7302cd1fc92ed46740c9d78ee98b228d2d05cb5bf9aa966c40b84aa94c4b44f5a4faf184991a20c8b9544f40360af36b6e7e5348b2484c1ab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5733cc4c98cad20cf9864bf0afd555232
SHA1d55e655ee368b3ef0b2facd31bdf8e67dedcb891
SHA256e25159673409633d6abad9269e07886ac9aeaea29949f101d574e1ce1afba08f
SHA5122c0a31ff2c7d1c348e810483f54f353c9e6be1db991eb43adf312c1ca7479999322795c2e35a2403c9a560e33971711ae38efc396a4f53bb7dadc6c0d9dd6211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59566d09c14c48fed759bad78500099f2
SHA1df1bbb08f7b6da2e503f20c3cc17a9e685bb3d48
SHA2569381816f795cb76435cc403965f60bbf96f75e9f1023709272a2d9d98d7dedc7
SHA512aacc3dce88e1f6244c659eb4a15c00b8d84eb86fd3fb5163b2ec839443966451c2256d37e8d077213404f57c66095805a2b57af37c030b6986ecfdd0111f68a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d2ebf0c266de850b13676363f38df8
SHA10966694783c439dc10e36664fb6d1e0657b55609
SHA2561aa82af99632cd9dd63b0ea87e09a8c09ff70e3a26a86a50b093aa5abcea0f22
SHA51248656122271b563618578fa502a7ecac8ac8ef39ca6bd34a607df2e60bfabc6d50716106b894482f180e3219a6ea17943c5feb654a07fc0591d02444af4c42bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade15034ec201930a13cfdb279e6b17f
SHA1afa038cdfcf6692fb167245fada2a5a6a7dc6fd0
SHA256d48a1826c8155387a1c4339c39702784949acc6753e97bd15c94788300fb554d
SHA51214848a32f8d2ea3f5d7f03ac3c43ece9c34273e71d568a1d1e7e2b336d15223ff5c33e92ac9f8d185b49a65ee0f5f3428939267d47394f34cb173a32e18f43c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc258b30b1f9e1e711eb1732cba3e9f3
SHA19808e16d35f2c01ecd5502861414cb4b036e55c9
SHA256d45b5dcf644c832b58693de2901aa3bb076b9404ea523c52d1e614780662b3d1
SHA51200179d4b038ad00637bd74126c3b9f59f5e79737396693838972d7d91afbf1233ccae33bbad8b1673eee11db26b612b92c2c9a640bdbc0d013a9c0b7ad1a315a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5357c22e5b5bd6077be2ec2943c838457
SHA117af3d5548cb0f1529f9d74dcb7ed1998a74eaa3
SHA25641742183db5852aeb629ed8209ad3d50ab762d220158fdefdb6cd63084e3004a
SHA512190939a727f38ccab6b15796c3b18b3054165b94ecdcf9f9c04813ddda8067326a3cbccbc15c3d25281478aa3c9dcff43f9e6f5a3fbea1d225aa4e6ab0e6a401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5536a831c2c78128d745548e0edb5e745
SHA14b6466cbcd22f8721312947276ffb003028cfd58
SHA256b5edb3036047cc22f1178dd49991bca69276d99ac0b77808088c3dca9933c5f2
SHA5126c5be3d3d01cd16361241a454691aafae9b03c8148b6af451d00564f60e9595b29cf40e3e3c1b8c360cfe28ea059e88637f1495e26ba5d13a5c1340d8c940b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a8ef900259ca529194ffb1a85c6a00
SHA16bd6564b7a1694d6e4db29215f8a489940b5ec5e
SHA25698398b1c78ad9468e070ccf12412d6e10a785b300d4b47e3c53f94e963b54825
SHA512214f79c902982536ff1c3f50756bfc2185f3278fa1ec424421b80b7b76363756b9148181cef8140c5a70a1d1731e5cf8a2ef9e3ca5a1647d2847cfd7ed23e457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca03bd04edf9c9ba47d81b8120bb741
SHA1092a63cfd1d04695bccebe1e08c587a06343570e
SHA2566bf30fd15226a9086479a9a693961cf3f39c95a24b673d4a374175d1d09caf8d
SHA51242c13ffb69bdb5d8bb836b8ef7ef6618054ec112058cc174e8507ea86b870e9131ce1e9275e4dcc0161755fca52377afbf16c3a8b026268f0d633ee676c5a83d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99a241432aa0cc46fecb0f1a57dc579
SHA1ad38a9187c26c05e1f07b6051ec00b2ed515d95d
SHA256e3254579af9edbfec4aa5532416ea7bcda61022871d798160754680a9759cd11
SHA512d8fe2b70cffbe3c8963d3e1f7832694877b5bb3d3dc11fb41385d4e077ee700156c8a09b96776bfe7fa701b7fc6c68148cffb9b72dec4afc236faee85ce612a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8e902a341d7e29f5ff63961a4c886d7
SHA1c77343cd6f01d450d2b80c6187f566f3cc429d39
SHA256917eb05edb9f484ebc9e435040e0c7503c8fe7c25b78e1319749dff7bc462e23
SHA512ac572185deee49f7abe3eba572cdd47bd7aa987108cdff4f336633e4de15d43813ce91e7a77b5346bb5caa3ff2515223f2aaeed72ad3eac45cdeabc501bd9c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c9334c759560db00ddfdbccad70bf3
SHA1bc94810ca1ae4174ab81db7150a19add4a621946
SHA2567a415f1937098552123fd78a0f4fb70979334462d7b04b7ba5d01ce91cd6b9e0
SHA512a53baa733ddca08133932322e8253f3c43411cd35079bc4ef66aefc3b622c8f37b5ea4f9804f6eb73fd57ec86df40b4434b71fb3fb3e71a286587d3f862b55ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6d177ee90aa224439638b8342d06875
SHA1c5378bb42b0bfa817c846c7c06d014803d57756f
SHA25601eefb652ed96f8d82d6be7f301dac330eb324a5316f481036d832fa8cd9d7b9
SHA51243a0ffc53a6fe6c2c06c1839c8119a2a60fc532300f1928d92875a4665f9b58d421bfe216714cece218ffafb9569b896302d510e8691e072da6cd7d67ea29b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55da40a72c5fe9f66290c0ecf592c54
SHA1744a8207a1d5fc66593555ef4941872a778eb7b8
SHA256d2cdbcd771d0c424428efbf2ae8fbc9549dbea7ab63c823940927717537e3f01
SHA51202e7efb0bcd1ccfdf9d052ec303b492190b7a0a19adb392f27cbd6292c575a5259428543ffb7daabe349de73d44a1a2586766dca8d33b2944d2180c6110747a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baad8830c91768e4f0e75051bbe4dda7
SHA1428c0ee28b91b04b67158a0c3d2c1afa6ae00b26
SHA25674044c5ab0ff7ccc66d062a41a1115a3c342ad486a49d5ff9a679fba92d7b3ba
SHA5126b16558446ae207a1891f20744921ffb6adf739803d4e240d8d32753f245a05146d91b951d2cc5d00f3cd7b8293b9234f25ffcb51199be64afe4c4fad11815e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65f7798657aabf4db1dd69e4c8b2bce
SHA1c75667980319ec81ce31697fae27dad13a66359f
SHA2563de687ac4bc2eaae6cb3f5882d98236a477f20dc0891ca94571b7ff21d83c42e
SHA51295919f5d7eb82612942f70c8c11525aaf96d209f69e6282be5a51c10912dccc98c851e30ec5570f6f0056405df02a1e13c4c59af44514a45a43874e3a92a4a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eab1706a62eee0d48009f250a75164b
SHA1cb8c02db3b582c6a46318356f6c33bffa008d1bd
SHA256661d0148245ed5c8623e865cb13e01073db8c9c49713e3cf44125a78fe0618f4
SHA51240ac855b1b707daf8acb26b0897ea06f8ec55eb767d9833e0a08771cd726d2860ad4c093257ed76ec685ac0a42357dcc037e29adac8b54222246d0761777da2c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b