Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
eaa8ea39d3a984a1ce72befa0574999d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa8ea39d3a984a1ce72befa0574999d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaa8ea39d3a984a1ce72befa0574999d_JaffaCakes118.html
-
Size
461KB
-
MD5
eaa8ea39d3a984a1ce72befa0574999d
-
SHA1
c4289a3652be4bcb7b66a4ae651899d9aca1eef8
-
SHA256
2f1514eaec4f3ff8d1d190da59173841ed38fe7d530c862a2b96b2168c979d73
-
SHA512
61ad6a0692ce79affc434e36fb367139ffff8fbea8175b33ac6b5e04ff4d84046c53b67516ad81948e142a545b753a6ace4111cb1de855ac883bd586066347f1
-
SSDEEP
6144:SWsMYod+X3oI+YUsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:v5d+X3k5d+X335d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF9E1BE1-7646-11EF-9081-4A174794FC88} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885091" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d1b4b9530adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000016eb37daa156b38113f70c0282720785f52e6d236279d9017b76355f783b9d7b000000000e80000000020000200000003870fc9e76994b52cc9a0bfc39dcf8bc79db0cf7bdd039d8abe74d261fad52b090000000a0677884b3f6496f5b918901ff2622c910f1e87081ca749a8a20b28eda14dc5d44e23a7c8d33a279960fea2a6cf9dcd3cc3439af4b1760a14cbb5f52715e1e6f9202c13fd3785a50509ec82622055f75f026d9ca21d1bdc642bcef76faa3e6321529b9144167a41c7176166f7ac6985299fa170e0f66f001f62af5d5c2c9ccb61329a703a9b2509c012dc7eda42db99b400000008fc4c6d4c2ca696ef4a9b5412a2a667400320a8f09fcbf2061fac8c2b589ba4a679178afe1b51c2047d584fbd197f0927bafd0222b534b4a71e38427b3cdb513 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005255fd99e81018e7988e8bcd6df2abe3eaa3a09c97a04e25260a896fcd25a92f000000000e8000000002000020000000f00c12a351efeede372acc0e539069ea47045dcf322f45e586e490c4cbe21a5d20000000f532b6d48065152c89be44c0fdcef04678451dc47b1c6565d66634eeec79f2274000000019dbdf6f2ca718f9a9319f30daf8000a7a5f66ea61adbce5e872eafba5ed8568155e43696e7358af8a50b89e19c1576489ac3ef886dd2a3f3a5ed24fb49398d6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2092 2692 iexplore.exe 30 PID 2692 wrote to memory of 2092 2692 iexplore.exe 30 PID 2692 wrote to memory of 2092 2692 iexplore.exe 30 PID 2692 wrote to memory of 2092 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa8ea39d3a984a1ce72befa0574999d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895b784d4a4877b1fca48b430fdfe0f6
SHA13b967ea0c6b6b2159e682cd3b58e7b6eff86ace7
SHA2562ab65c3090ef09eb74e2a29bb21c1f78ed000cdd84d08ad037b45b46e0ea78e5
SHA512b716154e07584acbef43d70b1c47f927e8edf40984f6b42b6872c8293927f5b593562b45dfc9d7f98992650668030ae2fc2714851fc1b7948c1a06b374e01ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ed7c2231551860d930d8e7e2f975f9
SHA195cb4a9d5bdd9f6365ea936ce421de4465c2de47
SHA256657ff52c9a4aa03ef27f68523809130a12461ddda73e2222706c95e98d8ef46c
SHA51209a56263f0f538254027f817e3a306a44b35f13cdd8bfea157b759fc65bc68728f0ddda0c3c5279012114793204d98e2c328138fed70c98bf7ac272accc9614e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54049ca4ce2fa2bdb6e9016d95a3750d4
SHA1bab61dec174180d1609c8e43a98e1aaa5a54fea6
SHA256ecf9cca7bcb628094e1b62c40f2bfdf87206bac229bd9b0510d2f14456a45ded
SHA5123d677d74b88d115862a2a9bc4f2e8502240ddc22de3f81f73fe004d6894b6936482f1a2a9e23fcd8cf73817aa0f8343f2b09f6bab3dabe77e9f03cdc938666c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c1553319317397fe1f7fd56015ea1e3
SHA185631df58542420d073a0ad79bdf2af9f1bf4366
SHA256f9bfdb1cf2cc31a669a9025dba1e3bf6f797ddd293a2eecce86be6570be065c2
SHA51211ddb43bd06844ecae8831c8cd9469ddfa6c9f214144f99f844cd813b070c3e6c577d3985046edfe5e8fcf9286003d4b7b9963b2678edfa443b826de2eea12bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d3876e56e38e73ec4c4422391fef9d
SHA1aa7dd3f86b500e6c5c627807e8b58ffff0df15cd
SHA256e5c02ead219c3a651b1ff7b86a83221f4860c8b490d1124dabc66ed627687454
SHA51285a134ddf308fe19509275d36bf2c41b53aeee7b371bc9a18b85636721d97ee6a45dd856c2d2666c150587af0ff6b255ee21c205dad24881ee31d70b44f4c553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa54b024d5d2b9dc142cced404f4614
SHA10b030416af819f723f1c15105917272c7aa37298
SHA25642c91250025d8b9c3899b6663b75df6f9a76b87fca4ede95f041666caf49465c
SHA512ac81e2c4624baf70a5017e948a94033fee52065c827b9d01c7c21090a3cc3e7d4324d3cb06fd4b2bca37679282799f4f8e248e0b38ed7d10ab207416e461d63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df7690718ea9918fae33db3d6e2f264
SHA1a43ccda50d1fb7fdacf7e9e2d4fb57c3c805db6c
SHA2562a927e56fc8e4084518aa82787e0e3d659605cda53ab81797b8f1fac3f03cf82
SHA512971907fc1a379745327c32615156113f3f326158987918bfd1c15b33e65b4b0539c5158e9ac41aa088f6eb26e63fa63ef986ce92823724af3d7c3b9f6018dd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544285b99522f7cb971d84276d9bb4c02
SHA16aaba0cf87341ecccfc3a65f81e1349aecb78294
SHA2563f613b20802dba7fc97b2e2e7c115737c65759f641b6facbf1456ccad375fe7c
SHA5121896741e209a5c96c35c80cb036700e22398499f38733f3fe6040e95849ccc52019271c89e8a5b0492f70964b38add822cb65e8c3421e49dbcce84d04962555b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514cee0f543bec7b182a53c62d27d57e7
SHA12445a976b06efb0f62ac9fa8cc3a52175ee7c877
SHA25635422575f4cbf12a385545f5e111d48d2df6be735df78db47ad7e15d8648d94d
SHA512dbe9e702e8adf70a77d551083c7b6e2f569d0e23116f166dd69a4aa86bb96267c7e7251c52a3ee716ce0cd9713f17c441b6005649dc51c7ff2628e790ac88fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e508d99e832bee0411699bcbe5728d
SHA1ce4e4a454aa9f5e7c5047c30769b9c323b26641d
SHA25626a3ab826034d011dace29d010be6c1655851338928d60e542126101e1a2deb9
SHA512353c820a8ed935019b67e38152d4390e2f1fafcc15f692f1e0c89cca73c0b8a0f30bf4ca9bd738300777b905d68ee0eb694f7a7da1319e50b87ee2c1db44642b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913c6e427087ac8eb8f36eeb0f68a074
SHA1ccabe61b87f09d87992239c4986ed46eba9dd7ea
SHA256bca7ad1d62099633f59dd4e31037e634245a1c94c613bc7c1653e668d3e45beb
SHA512b727614b2a9a3c9cfccde520ca735b07e02b89cbd6b8d490ca6930f1ee64e43e1e2e6749fffd509daa1cf53e9c6214c60029bf66729593ac5b94edee67486443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cac3b87939896545bfd1d721f2f0fb22
SHA1d5e3365bf6b97c445a757a6f209205ca81cfb083
SHA256b64514cfa30c46f32399231efa4517127aa8c4f0d143348b7a4dc9df8b58db26
SHA512d7f80ab67c3871d0ededf77b2de56816cc38c27e562c7c791055cf9053a4a7894cf9541d9d8977d916fd0e6acca2a18d619917e2d2924c50d3f39ce4571800a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135095d0d84ec4bd61b225caa0e5851d
SHA1571d42ea3a064a1be917a4c6ff6973e391beed41
SHA25670d5fb0e015f0ac32e5bd31e6ac1f73b2715f10348a9dc49a9a9ef1d89d2ea2a
SHA5123ece9a5d6a7dd3341b4388f81b90c74e0c72ee7998db2ed56a7a3e7ecc43384f5ac94a5d0e1218d68131db3d051fcf79099050e9be93386e4c390e9327418623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ca162642e4e8df09a159edc19bc013
SHA11853d3b6399e9c07a5b7eed013e84c2381d395b2
SHA2565b7554f4f033b7885d7aa7374535c0c207565a0d1b4868a7a663bf01de7dd450
SHA51281b447013cfe6797bf214cc95b1ad8e847e67b7cad06c40b27c85f59ec73dfd7aeba644779c077d1d71276d4041423cd22fdaa9a715b299aa7a3d939b9e3d0fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5182ff1ce79a27bca960a6202d02e947d
SHA11cbd9042b1dad3e0a13d9f29b2ad555680f776bf
SHA2562e5d763c83959a4640d44c20d7ec5a99e78d4f119790d47cd8e506ee5c8bbdd1
SHA512fb3efc7cf3c7b3a3ec3b62dce48bf9c393c79f9e19d3fbf6643b4236f513149a046d666f027ee4a0a7b91d12495b34d97368368457161315d737ce1bfe9eac40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506503588e506462f57f652ca00cc6cd7
SHA159d13a104e8682a5c7ffa5d32b807d97f8eec541
SHA256585bc755f0bdb4f3cf41c27095557929f6655279a59e12c00f2e528d588eee57
SHA512f5d1d7656e40bd371e8a370ed2c66ece7c24b0dfc569767ba900f87bf28991e93af7a75fe3c6fbe6fa854aa03b2d44a2bae31eca394fbc52f1d360e92eea6ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785c87adaa52c967cdfc72f36bc35e52
SHA127b666ed97095be25b88df5a785cb4a289f334d5
SHA256fe1714b9956e7d1d91c124e10e3460ec5c2897cf24838440ad36a61772f32465
SHA5124ce46c6a03b721d040914d0937d9ae42f8b8e9bd3b614ad7a64a189642180ce028589f1196a49da1050983b8c7140b2814e5e35aeb96f83f975edda4115bb278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a22c814395c64df9adde362e3875e8d
SHA1bf33b66f071e37665b07c06ff54fc3e94c535c29
SHA256a91aa000d5ffdf54d06cbbd3f07c12b9b4f505950976f70d339cbcccb7ea3edd
SHA5128de2d35cefd94099791034ee09dddbac82ea3baed5d49f7f7c8b39a9fa7be77e92cfbc8d1a01c6fb606162edac40fa5f764d815f44c8cac4dc49184fe0885dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e934e39e1d1f9e5669ec01a2d6a1b2f
SHA182e40ee475d99190ce816f9dcff0ac3483d5ced8
SHA256c871f817bc8c2b42d8fc84b27dcd6e62d6b61bcc3e2b853d42e596cc06d2c079
SHA512c6e6c06d1c08a25c7c66d3c7c422f072cb3859f2536a37c3564d4c79ccf191df683d129e540e98face432064cbfe7562950c7533a72d408782cb66c5a959eaa3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b