Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
ff393e2bc10956ba91ededc8d7d149f8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ff393e2bc10956ba91ededc8d7d149f8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff393e2bc10956ba91ededc8d7d149f8_JaffaCakes118.html
-
Size
138KB
-
MD5
ff393e2bc10956ba91ededc8d7d149f8
-
SHA1
679eecbfdebbfe8d726d43fae069d0db158de28f
-
SHA256
0d20d7c700a228ee2cd9dbcc330e1262e29e70b1bb7371e23f4176301ebbe4b7
-
SHA512
18c9663aac4c9f04ba51c83695b99d136b1cc4de1b08d043008655baffd064a9d694154b2c2a8680469dbffdd94889eca0943b850a5aa7a0787f44f41b9578ed
-
SSDEEP
1536:SE3slVlEyn3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SEUl3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000034aa8eddda3c11344304828f82d635c200a45b4d9e74e5be53deed5c8768874b000000000e800000000200002000000080c57c4144d7a505558ab307bc30d1889388f82fa5faec4cdb31d24a46787e2720000000d7d15e717e59e6942f5122b39cb774ca4ac263234ba11af66136d1d47e48a941400000008891135910ed3345cfe65601de9eb13f391f678693a68fdadaf60efb56bf541793892576a469cd8fe98f987ccf0ed509cd33ef6f15b214bc9352458d1061d2b0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bd5f5da912db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45394DA1-7E9C-11EF-8650-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433801379" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2560 3060 iexplore.exe 30 PID 3060 wrote to memory of 2560 3060 iexplore.exe 30 PID 3060 wrote to memory of 2560 3060 iexplore.exe 30 PID 3060 wrote to memory of 2560 3060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff393e2bc10956ba91ededc8d7d149f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a3c9768150e918290300f336985f5c
SHA1826c6bbea14520ec01eec8df98cb032664255f65
SHA2565545ade99aa01dc6ffdc0ac4208034e6232dae9411f889d3df6df1068daedc40
SHA512b2da25b19f43c5f705ea8428a972ac8dea0482ccfc3a5811c703e02670ddaf26519c41b232694a1fdb0b9ca9d679d16289268752ea109ef7fdb695f165c22489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856cb3cebfe0bc08c03bcecd7e91d99b
SHA1bcd2f62b55ee7d0ef2ccfcc66595144e60538d87
SHA25683fd2cec00c3805855abca48201e5552ed7e66f18129730762a31b5ee15d784a
SHA512551317a8c4b33de671898e05fa80f97f95348c11401579b5edac36ba69a320e0411d3a701c11c7d34c97caecd79aab6934b1b5a655579eecb7ead6a22b66999f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d861e1d7bb4167f06de960747002cc7
SHA151ff430d7d49c3ccfb25bbece7ba48a70b838e1e
SHA2567390de36546a833eb8cf38da32829a9aa36a43af6fceda1a7886d86350709bbd
SHA512431f296c647fa3f282864fb716cf117b77ed38467904104b93790cb8f6bf4d8aed088458ef6388c02748be160b21e9e7875517c6aa43aaf11d5e0f4d6982e9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056f2f8ca4ce7d1e01bd3d0f84fed3eb
SHA191f3ff3dc66d63619238c52e191eacbc416cbbd8
SHA2566d714025dcdb829173f4b6fa32c765a835a1f26d2e8199f61ac07cee2b9cdeea
SHA512f2f1d157dedfec1642ecc0d200effc0151176b662c454cfae086b81e95697218e8bf7856db7e31c77c19cae526e2f1597f874d3aa3767e5c30cda13d46435dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca539d895980266e862f3b1fe9f7de70
SHA113eecf5355c3ede9c38ab0bd2fb07ee96d559143
SHA256828c2bdea4c3b1932d54ecdec77107410b7ab3dee4ee40f35a5e23fc7b0dc26b
SHA512a74e27c4399ada8c42b9677b05c4f392c703ce87bc11885abe95e7b213025ed71cd32ca5cc27134e9fe9ddd5cd0f8fbd95f78181d7c280df4b7bc4f4f8cce75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b43dd0a63953a0dc141254660347eaec
SHA1c4f903dca3528d357bbfae8486feb0b43e6ee880
SHA256e6845eb8667bcc390dc2b6127f0476ab6c718004aa3851425c4ed5a7175d350f
SHA512cb0d98af3682375ab7ed4efea1a218a9db3009807a8456f6abb8cde24c24b7f56300c83ebca61eb65264d0f435aeb4d6112962d82bc86fe67642415381473e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc90db40d138c82404d2bc82d998574
SHA1355b1976cb6dff6d784d2521bc00669f801b8c79
SHA2564dba4d38639d680169c478fc6bedd1e0fcd75c9886623198c6a2617ad8b11d6d
SHA512bae6ec05fb28db18d60a2fa98752f052fb42b33e63741ca18abceb95cd2526d9b30ea51f8f86133d0d7ebc2eec45a1819ca1a71bfd16681176c2d47c26ec4a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1c1f3a7867c3e8fde3d072849bac93
SHA10655bea26770d9a1168dcd4460ae04dd58cea2fe
SHA256e8ad301c754d6456e8deb16b7092261f8f0a6aa4c8a5e226a268a3d0594d0e1e
SHA5127da7c42b76007c035aea6281866405579a598db207c4f7d7cb3aec9435ebc024c10f864cf44a54754f36f15f34d8ebedee235c175b5b60ab1efdbc4654e0529f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53367c1ec07bd0a807f6e73af64ada9c2
SHA12bbe412c371eafc078a1787b651d24cae4d5bbfe
SHA256eed658481cd0214207ccb18a1cbe34bc4f3029725eee88a15ee3df5145f947b7
SHA51214ebcd3a6d8908fb328b3306025784549351f0fc5bff6f88bfbf3cd62c492c427ebfce86eda712e574dcaf576a8102b627b132fc84d07b70c098c62063cfcc7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20c4673e3cdcd40c3619d3895e65844
SHA191b2e9e463280ddc269fac5445f3e71bdc5134a9
SHA256d56ec3b4825fdebb51c4a110a6c4cae812f49d54fae9c920700ceb6432abb51d
SHA512b61fcfcc2f1e98f11d0a7de2e302b04422a5833464a00e9ce4019d6030ef932d0773f87b07cedd2801c35ddd32021859525775e8e012c332e0f0acba4651d9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52e69b37557f4fd473ff0ff1c6ca671
SHA115d09ca518f235f40b515ca0a617671b54a9fc7d
SHA2561b61a5f0786b30b9ff321451dc60411344b96517ee0b88060024a312162e9da3
SHA512dec76ed520f62ed72cfefa371458a9e83c2d563d96fc272fa8ac6b12e712a47bec87c982b73738d7e81ff01e239924d7d87c2c6642236a600e4be5e026a84dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf5b62a3845e102cd25abe80cfd310c
SHA156a645e1dc3a3f5d6e7ff1da0092fecf317597fa
SHA256b13e1976fb9181397f1041cab05c34acfb60522ccfebb0bbaefbbda2e4769a90
SHA512a3860ca1ff9f5aaec48031bd82df7229496b196dacc98ccb3364e4df201c2ee5dc70d8b619df44c7d694eb57d19eba50d9788b19b223229dd3290459991799f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d00a06352aef11c5492f0c359213c70
SHA192df603156c3ce34af905f327208290b1bfc8c2a
SHA256fc1bbcff2eeab0b6c2ca0c2d1a6c920d3dea30636ba53f9f52d1b05fb5047979
SHA5123ced4d27972fcbba58bb0d1938912853bff6688b19dc27dff05d03d26a6f1ed1d934bc09687c4c3d83eb1a08c503961daf952e205901515687924e9616f5386a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c78774d938c938eeb2c4b021b511b17
SHA17551245642d7a70e4815329e16d0c58f951be67f
SHA256f458fd2514b8f6454a7f10d09bcaa9302a1402ee7d65efc3ed48ab4d26b41f3e
SHA512a8df359423344045f320f4b546e2e780bd9f425f4b28054032c7cdd2e7b4c61adacba34b186ce146730641f0b88a482f327b28acdc4ddd653f96e46acc129ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a63ab1a6b22f3cd6fe50c15646f5f09
SHA15f316fff7839d83cc38a71a3af6b19dba02b6a08
SHA25625e98e39ca5fa21576c61f26ba40acd3e128cfb3f7e8ebd9498741ca0bfaccf3
SHA512cf8fc0cf41c40b40c837ee07f17ade793886f31f7b947fcda21780f3ec6da2dd895e18cda7401fdb10ce08cde4fb6a4dd6ec2a22912ec18333b05b86608a34b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423aa8b8bd353cc33cc37a1db142bd3d
SHA10af8b101be134730b0a745d140efa5c1d8fa17ec
SHA256b5c7945bdefb11d4faf91e86ad410b7a1c5bc294b7f5dab7855395f8ead2bd71
SHA51277bb3aed55445f3a42d6c7f3ae16bd98c92b77ceb8a1d9b0dab54242eece271e6ab734b2a90dafb42a30581ff07966fa0a918d874a5ccd015f544e8df1785e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5452c7585c8eca2aa224723f7ec82a
SHA1318a78de1cb659a248269309bd33c63445e23c7b
SHA256fdf8fad22e4ef97ae152cc888dd5f51d0857e6010e4020ce4b64e888fff34c81
SHA512c303ca088fcf9c3946a59ce3d212d1ebb70acb876ccbf7d2a6fcb95c1204ab6db5f2650a84463cf3a84ad98e065b18a5359d18c2572f0e53d317b3494b8af505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5041bb4baab3b4cac567d01ccbae813e7
SHA15fb5d65713546da534452783d2f1d4dc99325313
SHA256edc68ba713abe5e53733b16aa650aabad3c970aa3a2a12573ab0b1efdcf6aad7
SHA5127de7437e1da6f06942c9151167b2dc56f4bba55118ca51bb1144405bb45415fc14e42e337a7a9318eba15c901f275723629e2f3c278cda35f09042b8fb145af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e545db64cabc329a7e2ea4ffb748af
SHA1d72c1d61c2637ef263e2170b823e3da6c3ddf428
SHA2563d881e97ec9d11427ae62a431be0cd93cdb2cf4f4341756232ede4b17af22bbf
SHA51246c3918676ffbcbb6c2f091e7b1037269adab6a77d415da6cc7cabdcb993b2cb1414fc575c0a40bea384da185868efabf2cec75cac49f40e34cafe5caa768e99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b