Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
39c4260828e3f9cf34eef3775f7d1867_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c4260828e3f9cf34eef3775f7d1867_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39c4260828e3f9cf34eef3775f7d1867_JaffaCakes118.html
-
Size
36KB
-
MD5
39c4260828e3f9cf34eef3775f7d1867
-
SHA1
7f69cb35d751f344e3b74d500b232a1b9b6f03d9
-
SHA256
564f0b01375817d2796e59c131fe2742e583a6934670b971dfb6ebb5fa38d0fc
-
SHA512
03a14dbcd44d4fee3221501e8e37f00081f6fce9d94481850fe4537642894598c6866e945eea0de2c2906e772751e8d14f338d26b4b3d61834bae950502910bd
-
SSDEEP
768:SMYHGuvHMzWsKB90BigbSZ2wzXbPbDzsR3aKNUrV:SMYHGuvHMzWZ90U97qqKNUrV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000bb010ef27ecca532e491398fa38cdc68e71e4ed3820d1164f7e8fd12473d3d74000000000e8000000002000020000000ebd567c5d79410e38c18a02b2fb74b47a0405fac0d2016745d2734ebb8aa0956200000003c5bdf357e99cd05c3b78cc11ab841aa885420e2647fd578fc497c65a9f86b7040000000fd87fca2196f40302870a17eb5998dee1ac7d7024cbd02b02bc950634486d0615a84734e4daf24775217b596afed48dea56dfd142d867ff8ff79c8212e183e3a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D252AA1-888D-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2086a0259a1cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434894381" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2820 2232 iexplore.exe 30 PID 2232 wrote to memory of 2820 2232 iexplore.exe 30 PID 2232 wrote to memory of 2820 2232 iexplore.exe 30 PID 2232 wrote to memory of 2820 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39c4260828e3f9cf34eef3775f7d1867_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531716c947359018870a12c90baa5d078
SHA1b007a88c83daf7a03f9ced998087fdc7bb9f635e
SHA2564e5b4969fc9a13e6fa0ee70201b6d636d0af8d560c7a9aacefcae4e4b5e3b027
SHA5126c9d15772e83074870ff807fbb9d9d091d7511eee3a6af750ec165f2d490a74bb21a3ab04665528f3e3450cea20ecdcf0e96fd7b375c4a2f7f01ff77ea12c9ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d864ccdc52652f7386e6d42e089fbe38
SHA1306c912b7041f6a029ad0678421370ac0be3b2b4
SHA256ab23c5c360024535cc6d2455da8723e76c777984c0e1e6a963e3faca3289aadf
SHA51210fe940e2d21db40f9920d0c996f97587ed9fe26d835fc28091013ab4bd345d24361c2a683b0fef65b97ae3492a11cd14ca39d350434a51c288f26b3c74e781e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2a59a4fe78165ca15bc5f7a242e09e
SHA1835db215da9198d2ccc06c8c7288cf7144be27d0
SHA256a4edc1efdde25bd1b432a28429075eb94e53a174057eeed635a4217e3291994f
SHA512798e462fa2c061d3e0056582d835407b736faaa938b81c1727f66593a8951e1b2e4cba26b85fdfeabadb1271f3092ad98d5a3b1dd00219da7dbbda0de086a36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2556a435f2de932a1ff4a3a7a20c53
SHA166440b9c2f2a9974feb4fdf7f705bf097a46124b
SHA256894a57a67f5501d09e79cb74bc97178e80c708317850d7c027ab47628195e100
SHA5124fe681ab74a7d248d329f73a4d0d6a98b20399e60da92d4813340b17790a98aadf276f373e182ade307dca8199112673cabf9b69809efdeb3a114fb7460f7d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daeb2064f6cd8a36b3b1c979e1d61b89
SHA10786131e7babf258cec51680d994b49b7951d4f0
SHA256fb7cc8d07c9dacd70b3c3fac39f75c05bb683c8bce1d6e2ba7358dfb6c2d1599
SHA512311ccc6d7afadcf21125f61756c65478752d34c08653ca59e0de7caf67f2498e4a136ddeaaf7f87bed0da7fd5fb666a943ca5b0824ac469153fe2eb099fd20f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53198a2ac6d0c59c8d5b1fdff087d980a
SHA1490f2abae60e6d50d5706a91eab176020722d67e
SHA25636c118a72ffaeee8b542f523eac10cd0b23850f3e1d0f0c20e4af8c38cdee547
SHA512c35abc08869f3b3651eb6f78693f65e2c8fd3d88fd65ab71e65913e41c15d867ff9e344264e31d880386c5a86897b6983480ec092d07a16f961d6a87a188813a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2e8254a5f346a6926096a705aa17fae
SHA18da05c1e84da6cbe5cdcf1992131a6c58a660064
SHA256d05047de7953b685ea1a21ee25c68c974c94ece36e6750e69bfb27e15a97b308
SHA512109237abe7e964ee842eff9825f3acd3ec7fe240af8714ca65c3c082c4bb859fb306061934b37a65d27672703615c271b7037d4f7386a2b4243f37858dd2b9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6b4d3b295be463acc33ac3230afb06
SHA1896f51b6eb2c11aa88a6ed1b613c74c131c06fc6
SHA256ec1543b0e4fb50089ded015438396258bd4c8c674ce0467efa803e7441b5c249
SHA5125111a7b5cfd27a6e2e7534dcdd173bf09fb7b66baf3b8fa3033abc707786aa238dcaf621706575a679b6e023af2e1f62b98e62dc520919cf44f989ead9c6d9e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5befae98f9a6df528033696db5ce97f0c
SHA18cbeabdbaca89cf6809c461d8b4cefc4d70d64ae
SHA256b8201f660ef7dc943bf7d614fc58e73f4a0102cc86b42c0392e0ddcb6c6696cb
SHA512393aad1f29b04e4bb2d60febd73bf812d1e3ad6a4be819eb7783abc0c4bafe40a7b315503c7543ec6ea48bdaecb2807263c64c7fa0a7311d322c34e793ad6d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce164e080c4d62e9488adae46412061
SHA1ee26b43c485fb4f448f3b7e07531f1b3a88b3eb9
SHA25623eebe8fe7323ef32831f783dc3e818bf37dc3be1bdd4ee1b1ed2d9ff7ba029c
SHA512a815f12572e0fa854edcbae9df6800fceab916c40afce018c9c7fb72cb530e1c37c801d997b57a55ce168ee7b855f1bfe444eeca7e7d739476e6588dff934c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da266b5c974686e14c574409dc4d29ec
SHA1c6eef30f154bbd17ba34755d7522394c40daaf20
SHA256a4f94e8048839bffe625f3bc7cfc232fe0bbcffe85fd8f097fbe44bcf943fa24
SHA512bcfcdfb3d70a4ed2935e70da34454938a6f609bc89ff556d99c4ea738a273007b09bd2871ae5ffbbcb944e6456ecd198121fd67ed267b6e8cd1a70d57242e628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc066fd2169b19f441418f0f5c75933
SHA11b9de3f2c56a153cedd45a562f113448f3bea489
SHA2561961d2750da3f5e2c576258b97876e2ddb8725d7ba8fa4116489876afb63b84b
SHA512000152f47b539d6ca1a6f4d9b9de55bb43f44879813730c17b8b55f5bab5775d7213a6eecd5bb864b23dd228b88911d9defed29955ac42a4be1cac237683dab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52681839a11aa76d29a031f6a37dda8ac
SHA1ebad4d588e318c0c13bb04e9f7e9966907590610
SHA2560a9accd006024411a1f34547396469153dfef449e2f98f1a8fd172c92dc1c8e7
SHA512e46f9dcbf43b6080a3c82be372c36a5553232eb73259fae025bc9700b18b58a49c5ef3d15a21eaf5ce127b8b4fe76bca042e5126a53164e7bed0a8ce7eb87ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71ff18d0704281bf30f3bf13d9bf4d7
SHA162f68b2d58db6e40ade74bcc1e66e66616f59583
SHA2566ee97072bebd1a952f33f8db56a02c4bdc7855bf2f2d4a155d5c6e0f41682bfd
SHA512dbc981bc619a585adc41f9284161f90c7d5f4e177c4ac564ec0f599337e4901bcf7555fed8942a55503ded43829747258cb0c87af353406b21d029daad22254d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff50bd12688bf1615b85d6c0fd01af73
SHA1c4553a92a1d35456784c6f6db749dfd709205c00
SHA2569e09017d1d6ec7c88546e2f626f7122e607ab5ae62b61b1b83395981a6708690
SHA5120e693b91babe36c7d5aaa9f340d0b04f7d1647e2efe655b4ce63304792275c3ed6e9b9e11763bcc3f971f6184247df8b4ab633d5ec9cc25b2f0f60b14de8c7e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2a8d704e17334978f89aad928f2591
SHA1f948a34d79fb4e91f719d51382e99edc52215c94
SHA25695b8dd4f0a94d9f9c12331c6b59691dc934769d9851f6f12f502c11140a44e23
SHA5126d20e633e39b7391a6d634755d22136151a0b125d3e50d015daf890a5e048806b9fd1b817d98d443738a5ae093baaa91ac475cae87ed20f2cc351774e3ddf60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503440cdc646ab496772a1d92ee755794
SHA13bce823d764377ea26265ab19e0f5e81dfdb8600
SHA256330f4e3f2e32aaab5469f99ab9041c2a1a07c7e928650bd4f9ab6ae46be06592
SHA512eb336e4141fe3873841473c10e1684ebcc8ba66f556abc9d6fc9237092d1dbfc32ec73014eb32ea5762ac8ee99c6ce9a0ec0f4a371743ed94664cf7241e373f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a325643620d9d9585809e60d82211e86
SHA1bcde2de7a9c7d586a3c848c2a7d098cd6a03f180
SHA256873d7612d311375fed05db9a28e59bbaf4f9464629233b443f13bb6c4467a95e
SHA512f72ce95319c88eaf4c1b713f1cfc6b80e76f9e03b14c44ed6e975f4b91e0ba9d5e75ee52bfcdd45b87c87ef6bb8d00710ce2fd5d896d08d050c00522a4ea1c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588cf81115b26f3315022ed4a18095a13
SHA1c6d4f15d9b0f8b29626400f711ca95946e660a5e
SHA25692a4e803fcfd18c8465f5a4aa92b38809ce2deaf15e9e48e4a471b6d4a16c283
SHA512a648f4ced7813c21146da912254880c4fb98c4538c4daf6676dce4a27ce0c071a38b054774361a5692f14dc7bd25fbb29957878e30991e1927f14696e6675519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c92bdb110a0580e2ca722e2cdd9271
SHA1da09dd407433e94e1e3d2aa4ac63549f8359f028
SHA2564461ad74d8ecef48f20b12fc7debb46ed9a95741f9ed0d1bbb318c0c6eb7e0d8
SHA512e2894e5bdc0f4c991fb5377f6490c1014a622e5c0c4f01397ba4a063e0a3d2ff29be14710ec36bbc44de6330e01acfa2f3b9c0e249bb44547575f591407db775
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b