Resubmissions
26-04-2024 19:01
240426-xpejwaaa89 1026-04-2024 19:00
240426-xnq7aaah9y 1026-04-2024 18:24
240426-w1z5aaac81 10Analysis
-
max time kernel
98s -
max time network
96s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26-04-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
016268eb5a31a62631682b24291855ba_JaffaCakes118.exe
Resource
win10-20240404-en
General
-
Target
016268eb5a31a62631682b24291855ba_JaffaCakes118.exe
-
Size
988KB
-
MD5
016268eb5a31a62631682b24291855ba
-
SHA1
9f4b549156a17451748c8a580126a18d00ffe633
-
SHA256
c1d656f523274f8af119e05658173aa49c52d3bba63e083ca8adc7c7346f2147
-
SHA512
a3c091820409fb3637a0c910d1f7abfc131aecf3d27f13578e0187525d86d66bce5415ba84c139a17aa3d7f891f90ff88e6ee19d3198f097030a215dc6c524a1
-
SSDEEP
24576:hs48aycVm2RT3oy8sFKAWRN3KtCfJ0yhnSMiGr0+MC+bqF:h/NRI2tgsFGKkfXXiKyC3F
Malware Config
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2128-1-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-6-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-2-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-5-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-3-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-7-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-8-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-10-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-13-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-12-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-9-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-16-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-17-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-18-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-19-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-20-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-21-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-22-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-55-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-56-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-210-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/2128-637-0x0000000000400000-0x0000000000607000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
016268eb5a31a62631682b24291855ba_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
016268eb5a31a62631682b24291855ba_JaffaCakes118.exedescription pid process target process PID 4296 set thread context of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1405331684" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000057d4c4d27ce63b43a1a44abcad2f9831000000000200000000001066000000010000200000000591f0212bb6596f29bc57cb7c18098958c59fdbdf7a56bb53e6fb89be78173d000000000e800000000200002000000037e36600296c601975e75e662c741482322bd4d4dd65f2d492250a445d6bb479200000002da3a6c971ff0ba26f4be806eeaffb096c6b1271b43ae0362e0c73b6ff1b0d3d40000000d3bf2ab4855c74a8aa67a2fe261ba030f7b7866fbee7d2eca2e3a93f8eda17ac38b4b012b679a53397c595453bac5b5ceca9038ee385d937a08ef5c5bb407a74 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1404863037" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000057d4c4d27ce63b43a1a44abcad2f983100000000020000000000106600000001000020000000742f436acef19f40e69fdc61ac611aede077dcb3c3dd2a227ce1ab0f21dce8d5000000000e8000000002000020000000c28bcc4a982d5d457cfa934abba51f71e0185e0fa17fd76dff4b688cb00932be20000000f41bae4439b4e2f9b2755047897c183f5131b2aa8a3bc6a53c5ac4c8538a6747400000001dc9b8f50e486404a882920694a6ca2a4b82527f6e284b13ef6e9ea722952018bf0ef39fe0bd4d0c54d0b78a2a5e13c034877b6d15bb6591390aaa84e14253d5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01d60680c98da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31102988" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31102988" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31102988" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1405331684" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F3A0031-03FF-11EF-8A80-6EF3773CDC0A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d35d680c98da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31102988" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1404863037" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Modifies registry class 1 IoCs
Processes:
OpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 600 WINWORD.EXE 600 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
016268eb5a31a62631682b24291855ba_JaffaCakes118.exepid process 2128 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 2128 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 2128 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 2128 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1240 iexplore.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
iexplore.exeIEXPLORE.EXEOpenWith.exeWINWORD.EXEpid process 1240 iexplore.exe 1240 iexplore.exe 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 3284 IEXPLORE.EXE 2268 OpenWith.exe 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE 600 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
016268eb5a31a62631682b24291855ba_JaffaCakes118.exeiexplore.exedescription pid process target process PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 4296 wrote to memory of 2128 4296 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe 016268eb5a31a62631682b24291855ba_JaffaCakes118.exe PID 1240 wrote to memory of 3284 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 3284 1240 iexplore.exe IEXPLORE.EXE PID 1240 wrote to memory of 3284 1240 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\016268eb5a31a62631682b24291855ba_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2128
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1240 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3284
-
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\Desktop\UninstallConvertFrom.fon1⤵PID:4480
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2268
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\CheckpointUpdate.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:600
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\VideoLAN\VLC\NEWS.txt1⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD51ea29a0cc6d85595d47073870a07d42e
SHA1cce5c7b97cf667b82a4f434d6a2bef57c94160bb
SHA256c381ccee2031990ebd66f69207392bbfe80f2b9f61b25d6b24eaf60d637ae73a
SHA5126e98ef5191bf19caf5c9ba823664a5c533d105fd2d7826771f32c8a3c133a12e7158f88a7063b90e2103c3cac24824eba05ac0fd50298b3794bc7d1fd00d40aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize338B
MD532612382a8b4891f44e05617779955eb
SHA1bee6f41568c235dfd5fd790fa1b339951f2fb5ff
SHA2563bd6d869fc8f64bccb672db67e7ab0a61557c791e956cc82cbd3f71c6eea8c82
SHA5129f456b9b0e2577b1f92b41661a3507f4045fcfb26058b8838815017c21586e11d1f663beef11c2602e1fcba2692d5c7fcebc4a01f4d2395efa519cecbcb79958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5feb237d9eae646c08640eb4da01d8219
SHA186f6b449cd88e4d402079bcb1e5799c2546fa9b8
SHA256c92b0349c52efd7e82b4b344ee1cb5049fbacd31b8fc2eaa10f8906937ae602d
SHA512d894b7a97f86e447e84a7d4c38ec88d20e7477747de8afe9cb7573a565fd065d3071d5d91d6d46722d933f13c25d0d18edda9dc89006eaf20e66f62c7a2ce69c
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
16KB
MD58d716d363704f80eacc4bb24ffed7463
SHA12236674fd8cb49906017d776965ab4df39adfe4c
SHA25694a138bd2795cb6ad4ec8f3f5aaebbf1364de693e9775b359f5fd8b8b8ad082c
SHA512d0e86ff38bff08c3575c666829ffe07beae6f9ca83c07211901138b3440c6f9486779639f6c9ca5b5f1eefa9bd75f3a6f76fa40bc248cba20ebf6dac15f96849