Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
bddbb0457143dc03b9b48eb8b4c992b4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bddbb0457143dc03b9b48eb8b4c992b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bddbb0457143dc03b9b48eb8b4c992b4_JaffaCakes118.html
-
Size
115KB
-
MD5
bddbb0457143dc03b9b48eb8b4c992b4
-
SHA1
548a39804b9716dd77753a571378bd350225fbc0
-
SHA256
6d2a39a6bb65715ce5c85d1611ac192772f026e15af152f1cdd3d94f4662a1de
-
SHA512
7ca0c2ac160cedf435fc6383d789a72156fa4eb8b4cfaa6a0c6f76995e1cfc471927abaff4c8b1d87bcf7607b7854cc11c6ddde50bf9672f51f20c7794b03df5
-
SSDEEP
1536:SqYFnkyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:SqYFnkyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFE79BD1-61CD-11EF-B961-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80984bdfdaf5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430634127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004d65b44e4d6be36ef7fe98ed0033ba05e3449e3562f4af41d22b4244c18be5e0000000000e80000000020000200000009a9036d032a1751d58ea8cd7702c93f5a6c71ccda0e60fa3c33d648ce487958220000000fa7c67f2211120f65cf9940556da30225cc5706c97620b721021945ac0e367d540000000124aa7b12171e132da0e4baccfc0082d12c7def8c4f7d215ef8dd6757049dddb547e78372a684a27683e1bae6fa25cd31b8c139fe676c254896f2bb919ffbe77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 388 iexplore.exe 388 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31 PID 388 wrote to memory of 2440 388 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bddbb0457143dc03b9b48eb8b4c992b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a0be1be1fe5189de4e1bd0e2bcec24
SHA157b33394510c383dbc462b7eb3740fe45680ee3f
SHA2563d5b2fdbaac7ad8f776418b51040fab1ee5f478b0bfba07dc7416ccff9a7bd63
SHA51248485def63b24b4effcd6f1a26070a1a0604d6fe28c00be9433576054d705f2b8466a73fcf278d814508127f04dc4aa2cb304f550bb3b7c452ef6f4343e2093b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cae30e9040e58bedc83e7ff1cb7f2fc
SHA1b03f16d1bc94ad6b1e6ad3560097e9e1389db6e7
SHA2561b135284447bc293759857b781ee4c5369ed7a5f3ae2e066dfacdfba6dd38af8
SHA5123004956e3bd18c73b796fbdaf57d6a9618c92199a2c712121a5090ee421b4f5ac5d1bf41ef8d042be453c765888b82e64c60c588926cd78ac9eabc7ac3eb39ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4110abc9fb48ffa872e14528fa2d64
SHA1009844c1bdb287183c5e26d341f1f39c320f1b14
SHA256a7d3b16122950eae9bb0fcf4033824fb1ea4982103d75c73de554a5541db1220
SHA5123bc67b715bcc3820ffd0114816e61e34a2b4ce6ad8d325988a785ebc769b0c38de1f5e539e8ed55918b7f4494e62c965189ea2a1a262cc3d1c9e16b4a73a06d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04ec1b47aa000f2f6f4a6fed5a02d39
SHA1ad8e89c551bcc10ecaeb6f362a483be3e6a0817e
SHA256606744377cf2d8897e74d94d0ea2eebccd44a86175411e26c5b378611806272d
SHA512a9a01989d155a1ab0bbcc47652950e43b409a3a1a9e9d05827e99477b3a5fa70633adc3165b833d287be7f98eae5cc11f405ddb30c461fe7db790a3e364de120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b159cb334c1fb9d243c29f4432a5c3
SHA155add0c5bf4cbc0040685416e95e404eab724126
SHA25673ff63991ff87af213bba147c6c8c110e52d3f31a92be7d87207c7228f5cdaff
SHA51221d1ed20331ff13afe4316d646485797558443583f8bcbcc173a052fc2760be840796a7e33803836eea3db671bfcbc0683d4bd9d6a85142b5b296d0b279f162d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7e247eabaf619b1b45a2bbe087f51a
SHA16dd63210c39e0df4601a8329202ef9970363fc2e
SHA256ea4246c48901071b89459c0d8f05125db18e2550bbf65a78fd75577eadc9cc3a
SHA51243ef9551b18a9e1acd7d636096603da5119b910623b478b25d0b6bdf6dc312f61f54ce0205b235c340e58c635b6a9a2980553b6c45537f5559f5399feece738f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7cc1a3279b06bb66d86ac8118055ca3
SHA1924a01933bbccb1dae8d479ef4daf87bce771f0d
SHA2560ed4912899f8f954ad7104e42231289053863f5f47d6a460e627844429383b58
SHA512b2a14d305a64271301a13ddc713758e4871fd1b07a6f0c7439d0e2eab52c6078289e0388118b3bcb491cbb535af585e23b1e0a5afd26dc42a5981a14517ef233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ab35ddef3d5a97f5ed6e9d590ec2a8
SHA1ea421454210e76def0a98161d8dc983f124ac87d
SHA2560d67ff0733865f86f7050f342bc18e3a66f2b6d256138886be72d7590b8bbbd4
SHA5120d4270fc50451193b625f6d0aa31d9bdc05ae30fd2fb18d8fe8e84345b04f2eb8f04ec5e736448ab85f87f3c57a72c15690c0986d663e0e12bb3a7f72a2d8c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55612b7d0257f13e85b110480c20c78c8
SHA1b4185533412830477830b0476c18e54139c463aa
SHA2565a261b535e8f59bbef1bcc25aefc53c6232c4bc4c6e9f121c896f9709c27ba9e
SHA5125a04a1d0d004bc067091d062018232634ff4b121e476325439390a2df640aa073e13db48c1db7cba4cf0102a3f44f9a53667db9bf789461646977301407bb076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5750d897a314e430d4a5a14967ef7e554
SHA12e83248917d31c0dcea24bb5d0e5b39255a5b23c
SHA256e1398719dca1f41ed85438140a1dde629a8a22545a24bbc91071067c6e074ea6
SHA512704e4c0b43bf5437ba59620495444d27f5a9e1e36ac0fa1f85022afeac8ca3d802521a3e1f5675f47c15a875842ee560fe233c1a52e59b62c3369d4976e281a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1e587750be08f04194cd36fd6fca14
SHA13e4ee3153c80fa5fd53631e4bc1d199e6ba3ee26
SHA25691b1ec8f1dae8e0f683d34fd25719087ef0619d00b2df40a3d17ba4c07c24c87
SHA5129f91421982cadb46ea14573b371bd1428a6a1fbb40d721b679e889a30526393ad169849f2e28e7e0249237b6574b8b5558e8edff42c1adc8776ac57c4393099d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f030ac4b2eaed0b3a5f56c163c6c70
SHA1469249da6686a12e69a9bc4293059f83ddca355c
SHA25608945e52e2d8f3f7b088ee68a4d731e2f3a06600d2dee7ddd55c382f407b6633
SHA512533bc8d932d654f49251f2d2091654828eebea2411b7336d54c289cf26cd9cd250f1ebef609a299bb8d94bf088c1e1d161a383dcd7e3e3bd889da75d7503b2a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cbb1aef824e4c93dcda6fb01ca5cd58
SHA1374a1709e801131b0a58fefc0cb0335c1d06454a
SHA2569640bff28aa2a42c501f898ff794d2ff818f6d81ac0ad4a5f8b8e22fcbfb9b28
SHA512317ded04e8208177a78bdd81609b63bd84cf5cde95186a41e77555245fb5b7c5b0c832ae93d01f1882576046e0e2ab4b37592a2b5e7fa81b1d1b59b9a0254cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360143d66d433104a58fcd300ca0b6fe
SHA1473c7f09a16cdeef66c2f3053cf2842a1805c9ae
SHA256db7a72276b78a7c19b51a64150b85882f3d3b8471b596b07213176d408ad8af8
SHA51246594097bc7b666089b26c16308f95043ca55a4fa9181baefa26c9af2547c545935a09a721d3237aaa3306acb52becbe9787af71750f48dc498063a5da32f960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda64195eddbbc47cb0e1973f63909d8
SHA14201a5c99f62e2faa1546d98504195c59dbea021
SHA2564ab95afc33113b2d167467e823a603dcb0c40592c934bc5f8a2513411f7f3707
SHA512b595bafc09d61025f2a3f541c0ab10346a57ac8fc7e483f8701f917e7dcca2618f64f84fad56ea2a5c8cf497f7686f83c5a427be82c9859bbb7ee20a819dd4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59504e3d9322f173fe121f337cd02ca03
SHA1a96b6de310416278e84065b24583d4b3434079df
SHA256b976303001d00f2f7ec3b471956496d379a1da2f7467e98b350bd1eb2c066e03
SHA512bd876104b8bc3f3b8177738e8539e1b2be1a0bfbd378bbfd94df0a97bd29f05bbdb241da0e1796d8af229607af59432cd463ffb2cc0d53736996d5314b553057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098a69c43594fd89c15fa8b78cb8cff9
SHA119622df3d705fb7480bf2e706a55e338eb8d3c26
SHA25644064b92cded29a17da5cc33644261bb3d236342bd7e308508ee14b5b6b34986
SHA5124ebb9a2924ebf4cb5909ae7560cb960a5cc6935c2c7d06842bc6e104ae44e017b217412ff2fd41108acd1203b6f2fa1ac0c179dc7cf9e7430e67ddf8f6c048e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c8aebff42a2090458ff7bae6488f7e3
SHA187eae068851617d46863112de3c16bb377de9f7c
SHA256fc507853407ab11f1bc322bd6fdf9d4c00b788cbd97aa3e7b26ab383a15a362e
SHA512f4e54f10cb0c2522195952974e7de4fb2f85ca5a75d4e52039d578a03cc70f7443199fcb1503528c83eca8ca734d43ffbd825f6a99d505b1a4d8cdf13017fb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d8d8be31a9644a4ff612b6ad748399
SHA1fed55edc537d0f5ba11223d916a85cfc88a635f2
SHA256c86ccedffec904d5e4d5d62eab3c737b98341fd04ac5ad80d1a851639a3a6ed0
SHA512e0f60e118ca4ee6f15c41832a8238f14321f02666ad681904ab35ef518567252026029c1ae37cb1335b28e3b77c5ecc1aea0047017b09af9bdfbd9020de44086
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b