Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
4679650663b7b14bfc1b0899359adc07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4679650663b7b14bfc1b0899359adc07_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4679650663b7b14bfc1b0899359adc07_JaffaCakes118.html
-
Size
23KB
-
MD5
4679650663b7b14bfc1b0899359adc07
-
SHA1
a682c13201af24b4821f05291091645dcdb0a84a
-
SHA256
cd94c76295dbacdae55b35dc700e35413ad66207149c65af9718fd9b9392c2c1
-
SHA512
90b503f4ea24cc74424273d810a869ec2680be6b4d828ef2cdc069727c495ffe33ec0152cbea786d1cabaad5fa68d3d9239cac5cc900f43905cd15d7dc6b8b87
-
SSDEEP
192:uwv6b5n3enQjxn5Q/2nQie1NninQOkEntmUnQTbnBnQ6v06J4RnQNjMBVqnYnQ71:MQ/Lv06kPK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000083f41018a9eecb283438d20a3d7d56fd46e7c71e68c3937ac2a3f396655951c7000000000e8000000002000020000000dcef82ff20af05fcf8d40b58cbc5670fa48d418e824a5e55514a1a57161444d5200000000c47a7b629d57177fee9dccb383354929be9db4ceed70c2e7cf84a46308645dc4000000095982ffffc007d63631ffa6a5c1dcfe2245f32f91cd4e10c925fc6fd59db59a8c12a273b5cc5b4058d8fcd52879452d48635af27a012ce87514e1335ccc6f073 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a056c056d31edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{822930F1-8AC6-11EF-B2D5-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435138933" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2768 2692 iexplore.exe 30 PID 2692 wrote to memory of 2768 2692 iexplore.exe 30 PID 2692 wrote to memory of 2768 2692 iexplore.exe 30 PID 2692 wrote to memory of 2768 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4679650663b7b14bfc1b0899359adc07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52514ecb5f5b383d94fe7c1f36591a3b8
SHA1eb9a8634fcd560edd5b6bd17a0174ee90b49327a
SHA25609220c92d2b59112904addef1002e1a38c80677e7e9e1e7031d6b06c99ebe20f
SHA512ba51dc68e9eb23c216aa220e78e3de9133db4131318fe70d315488517242266b98aa661a1f2412f39f8222bc5f4f2d2af29e02fc4e31fdd292ceb534ce527b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144c74cfd16c7655bc9d085a5d7fb9d2
SHA1e3fa43a0e20a855d10ecb0c7d53561e6b54d23c2
SHA256d76efe2f629231aa35499596a37dc72e5ddc4a0ed704cdc74ae205d8b89bf7e2
SHA512a6e41da021f29b19b99b4b4698d7d956a98ab4bdf9774cbe89d5d0746bf486972dc7f69bb29c99dafbe3437d5efcd2c821e48bf107676aeb18a399d8719b60a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895c176885c7cddec8f0cdcfd6cc9acc
SHA16133bc386ad5723e6966a9d68d80233a9c873cd5
SHA25649768ca6b0d4e5466f9393ef2adab21479907d478677020277b56184478f7827
SHA512ac94c05fa7b1b9d254330403e00cedf30fce8b32f6a053b2423fc213691e9bc0ba18edffc9486072fa5747bc3aafd52ae447739a2fcd2d9fe22fca0eda001a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e72e00b57bd9d1c8affc0bf94c426e
SHA1a39bea25a76e20a42fa82f3ef1ebae62625d5607
SHA2564a1da13efb4b3da2c2c326c43195926e304e854b9dc8229a8be87292a3bd79ec
SHA5126459b70ebf88a96ee41e92ca59f454eb5cc161f4f17f0f933f1ce77591875f026cf3c6671cd8c3e51d1732230fc34cb661e35c38619b22d909e91f12873ce3f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d5575926bdc473ae61df6e9e554f6d
SHA15274da81de45ddfffde26ede990a36621237bece
SHA2564bd432b9f63be71ff26a56252f543966a55e79ef77d3f65bea31cc92542e6c92
SHA5125abaadc897349c59fd28b7b8a3d1ba216f2f65f9d0ffe598e2c1e56c2cfc712e40bd27e59909c5ff050487e11a259cab62a74e8a3d33030c54960e042eadd2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a16197dacd6fd29805c476f49494e3
SHA15d3c5a862b654c3305fef29742ab08ce37fba49a
SHA256e2b8e6b13b071b137926e38c68d0da64b0412434d369817605ff2072fcfcb172
SHA512075a7498334a7743b212dfd87b9ec1b027b6dfdd96014661d829731abef53db97122a091d39569bc721c5b94f69fd51c9e31a2df440b7d00634a1738f2794690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5162f16a5d59ba30be3797b36907beef2
SHA1fe3582563045d2b9feaae1bd79872cd317499eee
SHA256ea98343bde82796d1501dff865881d290b3247679054d7ff0240ca9ac4582cfc
SHA512ec697f56aba30f50f398e593f63bcd2f007b4f3e7e1fc681f144648ef6b5b6091a11b0b04ab8a414a9d956c7d87d95a56958c482c98df59fb48c0db02e8e629d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575ce8300e52f8ee19d6e3c82ad3355ed
SHA1f19a08c23b1b9890967b0e500295638daee07033
SHA256712535e3726651a48fe1df1a21c17817d68ccdffd15f5685d03fbd5a97876b1f
SHA512334f06ab4fc3d0a14a0c96a0594b6bc582787bf0475c165a0dbcfd973bc4c18b1363c76f6013f288be2a9fe5a46b8d8612a0d128b0d20a50547de4f3f5c1c9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507ccf37086e7dc634d73c5859aec3d1
SHA1a69822171649bceafcff815ab173f0250f7d4e62
SHA2566336c6c6815290a9e2ed399de512bbf0a3ab2d2546942144ce99e83d0fdd5688
SHA512bbc30b11c474af233d4c7d0b551d85cf82e379f0d756384f6c2b05caebe8a385421bd44eac9aee417fbeaa7b952f859e199da450b426680afea77d5555aebd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695222f9c09edfdbf523773d70b6930d
SHA1aad820930a493a5946f715201e177a6b85c2bc38
SHA256ec5891dc097c501b801242aa063a936b245624bc900235e42ccb4ae47908fcac
SHA512dc2dfafc3fa1d95ff0628693144255b7971c23120802ae6d865ded7e22f84daa159736e434ab650dad195dcc6f0b17da1ac7c11ed29de4e054fe349df4202ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e59d3dc5d316024fd34bd556acec80
SHA1c70ee6fa59a3a0a9c019239d58fbb3e796543d41
SHA256b8234d56636479d6b1985f7985e1f8d499c90dde4f8db5a7bcd01fc4d64431c8
SHA512255a0d706a1bc2456b04b83605b896e5f5d3df224a7d6c944a707e56299b739aaa2b2f2e40470e6aab283b16b178b6d1cb6c1cbda98b42bdcd04e52ab09a0419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f711de2339d498ef4fb648fffef6c066
SHA16d42bbc045cbaab824eb5ef09e00e5666c605bfa
SHA256f945645b7d0e08895498774bcff6264ff2b2a0ddbafdfe34dcdcf74b5db71c71
SHA512281676f7ac145e5a8fbed15bad1fb372014151246656fc07e1c66d5e4b4f58605d1da97bcb806fe90f02a801d21957c1a8136ba0f1f7ce1391f78ba054e983b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4470f9ddae755ed333bc38c4271109d
SHA18ded47d5223ce71cc636f3af7141d92ec30e3360
SHA256976f6db128ec249d5ee68a8ee04c005a854f1531f641556f81300a73ce3a88f8
SHA51245bc1d9365f88e16237d3dcf58537207dc7b953ff52444fbf07dbf5ca4b17f814e666098d05813c32d663b6d6c4a5ffe90f3847b91de49447ab505aebba8b755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82ab49d614678f9672c3dcf42f13a58
SHA19e6d412a4b788659d0c7d42bdab514320f2e9b45
SHA256fe107c70d090afcd93fd9a5f3b695aa84b2562bfcb565de6befdf028fc2f15a5
SHA512c8f6d22c0628423f85d009e76e371e7b77d659123c5c7381c6891100c6a72eb3a4f56d76484b80edada664d064ac7cd23b8eb2fbf3c382726a6cc70dfc2b6f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa9f8bdc610c18e30cc0d229894605e
SHA13d21a89a7c2d908dab8a66d828f9cb62e146b4ae
SHA2568b68b7387bd4fd7ed9b9d9a53621c1e9da90521a73a1b41bb21822a9a1a9bff4
SHA512be5e6f904045d496acd28d9dba529e42074efa476e57f5a86bf998a09ab78899daea248237c6629b07657f6108563d9e3ecdec8a421f336eb9689a37926eaae6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1d9eed21f7d55a417aac5aac44a20f
SHA14d1ed07434a54a46e4080c0863018d4b62a9b82a
SHA25623df75307ce70c3a335dde622f064022ba19ffcf8a40d2fa0903c8b1960353c3
SHA512d4bf5efa774ff4ecb85e4731a93d2b0aedafa5dfd7c4e2f2e91fdf91274df2a4e46696ee1a4138a7ded1ed10e8964b80049a3c92a406992759662c4dcb5bfd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d953cefc30c2ee6893e1c1659dc98e3e
SHA18b6fdf44f083eef222ea0b102a67cbdf76ed8544
SHA256c59782fe1781167a3dc25aa39e80a1cb1b8d7695538258fba59654ed20aa6dd8
SHA512751a595c950be888842bc2e5c5571739c1a1326e0fbdb961b70dcb4011fbcc1c13d37b4a4840a16b361a11457aeff0d8129042be55b8e95f739e402123b1d930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5763dba84aa23411985c9f96ed54b81
SHA17c164333894d19bd808fa29b7c3106e3065ca7d7
SHA256926498cded2bacf6ddc2311f688e5b1aa4d855132bf60d49752bc6bcf4b8e58a
SHA512f7de0159ffcbc1d8186f1af4734ba725f0248a4609cb68e1816d318e2ccda8e4ed86f56340a7caed5bd790cd2f44975743f3996c5bea3e53681dab500ea696bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060b2d64f4969c9244a1b30023134efb
SHA18f3729eb3d10327b876efef776b4f8c4c5ba95c2
SHA2560bd8a5d0ccc46adefe208a0bf34177c5afef89113f3417feee3c7bccfd94bcc1
SHA51258cb57c1e616fcfd7169b93aa6a3151c247c94581a81f46cf0d644a8e0d1256a21270a8ab89faefaf65b51f7e9d3b9722b990344c4ab4e1ba68df56f82efcf85
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b