Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 16:54
Static task
static1
Behavioral task
behavioral1
Sample
dacdce69e730f5b5d077b43d1d4f83b6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dacdce69e730f5b5d077b43d1d4f83b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dacdce69e730f5b5d077b43d1d4f83b6_JaffaCakes118.html
-
Size
31KB
-
MD5
dacdce69e730f5b5d077b43d1d4f83b6
-
SHA1
12940215d83ea5eadce2327d6666e14331081b1a
-
SHA256
aa4f39e08559cda6a82ce10dc5b0394e35d3d770dd1bbaecf10f8a9e04174993
-
SHA512
d28025a5be5fb0e29ae7fb9d136290277fae483cc3dda8fe734052682a07fd6cf5f3302b9d1db429f468038dac96ff509192a5602558a728824062e92b76880c
-
SSDEEP
192:uWLnb5n+VnQjxn5Q/5nQieENn2nQOkEntT3nQTbnBnQSMCKAPRyFLqDxcYLujZQi:bQ/zQKyFuVpLkZQiKJqCsOQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d4fc5d95549b3d9161cd6bca7db33ec81d018069d8e83c08fe62a45596114dc7000000000e8000000002000020000000cfaf670b00f58774ce8df7bfb6b34c6cb98d54cc5ed8c8dd306e533d5064d43c200000002afa2de9871112c03092222af4dbb0376aea5a124812a66f37a63c1d10006c2840000000b34bea8339f52b4db80c11b82dc7b2ff3ed6257b963f4d89b0166b8e6384b2f51798ee414a120c230af5fdb14d58cced5ef27984de12fe5339228781cd7be310 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000ffb676b04db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F0FBFB1-705E-11EF-98DB-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432235533" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2536 2000 iexplore.exe 30 PID 2000 wrote to memory of 2536 2000 iexplore.exe 30 PID 2000 wrote to memory of 2536 2000 iexplore.exe 30 PID 2000 wrote to memory of 2536 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dacdce69e730f5b5d077b43d1d4f83b6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907e55f15f99db681fc33bccca092a9e
SHA1994ea7cb913d25c0c9be18f0e753dc2ec6cb546b
SHA25625cbae370086026a8fe64c143c204a92e43e38ef2a61f97c8ae35c93343ccfe9
SHA512997bfd14eda1b78845fa8982c6e2bf0aa438a428670c9b0cf8de43b95359ac6ff37bb5fc18f8f4a2199dfba6a41b284f78c8a456b826bc1a31781f751387b40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faafd0047907763fa601facccf9d2261
SHA19fd691960a692ef1d14f69772270d2e0b33f1e0d
SHA25686bf0728d7c92564037b11c5dd7295f4950143d5dc69111701dc04b068e0e034
SHA512590d0e6b4af07d179a7724719166fa8f61c920a337606418371fbeaafb868a55b0c72ed1dc09104225da32df7f0a5aef09b09be820af2bdcbe0377b793969233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a551c16fdb0fba9e95eda90350f1e6f5
SHA195ee8b73138665bd2e2be3e1323f50737c53352e
SHA2564906f0be74600992c034fec3283cf315fded1f21a0becc4c6f269670a02c136b
SHA51258cc59db262a35162bbfade8fecec852d9d12f7b0c5ebd7e83ffdbfeb9f29d85688e0815639220a82c67bd35c446a56066468c500ff56cbb34e34d1fd99d7b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58317c030dbd9c4de757448f042e71bdd
SHA1cb2a64f544c69c289f8298146008e7682c8fb0be
SHA25608a08dc234eed185a6103f3469ec7e33846dfe7ca7a03e5bb2e76686d2f4c1a7
SHA51204a943da453b4b5de8a743d450183e5c3d0c439d34d339e21c346a589610b07d9f344fda76c768fa106d65900b82ccf2c4e8467f76f21de226fa1d8829791d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58881b339a6bb9be967f48cc8ebb924b0
SHA1b38a420900dac62f739834ef8c56b2e09d7d63e8
SHA2567867b7c60b26fabee968e2a4c166b4225fc246ddf3ab2c7d8fa61b8dddcb2df5
SHA512af89195998b31d141f39b5512cdae927c602959c4116c79285fb861bf1437afdcc30936a7130cf543940f708a4eed3e4be0cbdf242a6e6d6c5e92081cfe95fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f0f1a304fda3ef3b8705d31266dbb2
SHA10c34e7a32ec5f3b540e866fcf23325c6c701e1e4
SHA256fe88f8653dd706a912fd3458e4b6cc2b60b1a11ab6d2d6436f0f1bd135174459
SHA512a8357bb1fede9cafdc510233de5cef9a44d1ba5a7f73b2259de541320bf95dd02b4ecf2618c0aff028dfca6d825b6c1b3a7b052ce4d55946a3caa2a85a05410c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f81a543074adb1575240266eca5944c
SHA19cae68b98b54a841462e803bf15385771bd62a4e
SHA256323eae36ea9f71d6610d83b2f456ed9ac9707dcf1d1b9a3ff6da219569b22168
SHA5128fdc99e297c623f860bd6503d00e48aeb2f5301038db65ffc4d62eced3f443401a4d62f026e626ba9abe96ba0a3eb5137944a4250e6bd40447a49d927aa727d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e383f60402f8d31704eb3949297c348
SHA18abfa4d03e2ef98d3d35d06b9b208e117fbe7cbe
SHA2561de471f351014a362063cfa4cf1b43c7e8ead832cbcababa35b65c7060fedf0c
SHA512c37077e1b31f20f6e6f56296e3789f55cc0bd7b22d15578255c6eb8efcaab05f3a9ee9ec42ffe9467b729f388c950b40be59e910bfc21f8cf0e5b94bb1d828d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5131b9ba78bedd211686d478beb231982
SHA1f3c1a33cc3d78877416886b56c3d92e5fb327bc3
SHA256196a3ef37b67899d429be20c631bb011a8f790902c0cc1f286f8faf8a1f693a9
SHA51250a75daea87ec464ae25833ff428c9114280edbc176ce7176f3188f91d4f422da3dc2a27552e34c6ee9d1d9b01b60e324fc6f8cb45c976ce2bef180c6486f72c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb533763853ed8ba28d03a654aa5a7db
SHA1b545cfbef33b07bea7d3c3cb5b4f30edef49f1fa
SHA256e31cbe5b4a79ab627c5d376c07b7c723e7147dc1a5b6acc07a3494424f0657f4
SHA51273de0c80ab6b741c811a1563a318af93bcd5c2dc3fea4737897d1ff838ebecfd19e619846058bb43c8de7af9db18712d3fc61bff55a59a93224a7ff3b8409db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531774e6c39a0fd1a7702d432d42d95a0
SHA15fb649d057a20f8e05a37330c57ab29ed5bd2c39
SHA2565c5f28dc9c1467e4200689e74ae9d3799a787836ae44deb738c1cf56b5c077fd
SHA512481f5d3fb73a4ffa9dbaff02281649413d415a20f9c7a3912a53b93f9acbfce91b2638370d72bb4c871336cd9f9dcab34dfc295b2005323122aef407e8bbdd3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc004b78a147c5cf38f1cc0719186282
SHA1e7adfc734a848dc3bd0316253e4d2a5754cca3ae
SHA2564a4e093507fb0846bcfe045aedb0de1bc29462a77355d437c2f0ca491a6657ba
SHA5121620daa6f0bb67aa754dd75d095853dbbcd0afc7ded9a5f0c4b961b48cb072c3c3ea2b4a87562d6dc5325b652fe319719bd40f7292bae40ea30608b95b9bebb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c958af8bf0930391337ef2599692e06
SHA1943f18ec505ce102a84524850f39e6769f01c33a
SHA2562316520099567a9bae206da3a1d1e181f742112ab38ac80c06a29c4f02829cc3
SHA512ae6e38f0da5f5814fb79f3ae2489a90da6f30a3ad6d50c72022b384fd511213fbe59f372e3d13e8faf641b3cd27f6a75f1f5c2b412d9026ab9495ba4d79c918f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d2930ac0e07b60cfce13e80cecfe221
SHA1bb7f760af29ce5ba508a1759b7fddc24ad31f67a
SHA256adb11ac2a774782051e66c58b1777a86f13c3451aaea19e90d05d6caef189503
SHA512217899f093fe04091fe62981f5bbc58e2d734085f3c426004c91e182c445249da9b4d3a29009b8a1e1e8939c5f950625d7c37ac228734b03d5ed4acd14707999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa89379f7695f5b0fe0119182709764b
SHA18683a83ec0176074a082b02f828f8d7a904e7429
SHA256161cb5f747f9725d7cfcf496bdcdd410c9c851ef29a94b66c8a3f378434da6ad
SHA512bc54a518211fe3c6c880803a11e93299f12b1ee22de802c17d75a7cd1c2a140903d6151a975c17e6251b9c591e8efdda08f504d4806dbf3711e4615489311132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52125045de5d934bd3afc812a17a26008
SHA10cf204e746d6cdf60997817dcfad9bb2832ccccc
SHA256cef2ce585965b0ff8ab86df8d73836ede2bf07fbeea27ad35569a0c3c88da4ad
SHA512c8b32330c48ddddcd4f5411550f8c3191203bb9a7ae549e7cc3a6c5c23f53f9cf6c081af97b6369e47887b63ddfc624f782baff62a1842315a83a90d052d9f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5176d609cf722c233c63f4aaccd91ee59
SHA170fab04b02e18de3f1aa06e02f31791c9c63946e
SHA256593901b8dd155d1087c3f194190ae18e25ecac248aaf97c89665457e405674bf
SHA512e10207545817e1d7f4885cfc1e3b037c8292e2ba93b8678f3b42803ecb62b919add38120f406103be9df0ef68851e1488f7e87de3804b09d06d1c21e97781a6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faec064f92e71ef16ece2c7c4f7e7158
SHA18912a0b01cf6f18e9b53263201bb9022f5c4f69c
SHA2560027a4f732e0af1477bc538c3b4d73c10d02607ea13993b5eda5d031784742ba
SHA51282706705897ee9cbce28e740dc41d4a6663035bd2a72393a735e20d97ee90a60297368e5404ad7a5701a6bb53660e0477e5250cf7b40b7376d0fdd6491731e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b10fb73598cfa8a73532294522d3313
SHA1206c327e4afb6dd6b9a9b94797a6486b7c13a8cb
SHA25676f52b5053c60719f53be1d718454c6e816a238bbe6950501d2eeb12cd3d943e
SHA512f67b87a9d37d5734f781c7ecd8ba1576c612bb9c73806ce341404e34094ab3df6a06c98c8c7ece1bdce690e4ec18be6a78217e60c803b4c2f03732a48d14620c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b