Overview
overview
7Static
static
36240298911...18.exe
windows7-x64
76240298911...18.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3$PLUGINSDIR/nsWeb.dll
windows7-x64
3$PLUGINSDIR/nsWeb.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsWeb.dll
Resource
win10v2004-20240426-en
General
-
Target
6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe
-
Size
60KB
-
MD5
6240298911fb95e6d3cb19a18fe71554
-
SHA1
64c1b608e110e0be9db8f811d8d0df2485bb2cce
-
SHA256
b4de6c8d557dacbec32c0af0e223c0f5a5c9d0ac80b44e165a3805678f7070c5
-
SHA512
874b0caba849b08e2067db53101366f51567182e56639b3be6f17ebb1c8248a924e0d2486cac0e8fe63ac8843f3dabe97109f7ce028f1dd16300537ed14832f6
-
SSDEEP
1536:6oLDYsacy7mHMowHjXJtB5i7zxp3p9JtnOndzikh:6oPyys5jXJtB5iRp3Odnh
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 3008 6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe 3008 6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe 3008 6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe 3008 6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe 3008 6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe 3008 6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe 3008 6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF9937D1-1745-11EF-8414-4A4F109F65B0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101371a552abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000009e43edaed78cbe4d0675b0127b9dadef1154e74d25e88f26fd75a8b687030191000000000e80000000020000200000000e9942875c792da5feac5abccda39927da4442184e627164f1b2ac10d1751e792000000030de04fd0090f41d76b9b977989346a1bf387af57c97eafbaaf2d06819f2b28540000000f9852a23f1a42715b0a220b662d983a86a86702f601b4af57b63b79d6cff6ecf0243a48e7cd3d4b17fe312f2f53fe4ab5ba804337e0c17bb5cc1205a0d6c3845 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422439275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE 1624 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 2440 2560 iexplore.exe 30 PID 2560 wrote to memory of 1624 2560 iexplore.exe 31 PID 2560 wrote to memory of 1624 2560 iexplore.exe 31 PID 2560 wrote to memory of 1624 2560 iexplore.exe 31 PID 2560 wrote to memory of 1624 2560 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6240298911fb95e6d3cb19a18fe71554_JaffaCakes118.exe"1⤵
- Loads dropped DLL
PID:3008
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:472068 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD551d9311907a6d37ab5d5ca5c5a4364fa
SHA1bcc32813d4dc90be31adac28ebb04de4aa8eb99f
SHA25616c12ced42b0aa2c27b7c1234cc2915a21ab5a10954941f1c01fdc37f93db2fa
SHA512591760a9b3d6dc70c7077eeee5e717ca21479007c4537fd9304d975d9dca237162f2e4388b9bbc3083724a5624aa6626f8a4d53de150857c07e74b150c725f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fed999d524b2b591783bc19bce8d9f5
SHA1b7f4c321dacd857c3cb749332b495b6dbdb25f1f
SHA2562231cc9c702d1ce1326bdde0fc390ef031aee1a0dc30225af9e2d111dce42b3b
SHA5128e6d9726ce9f2da69d0303e1337443d46ffde5892e7257f3d842b05cef23ea5520800b42cfe0880bd8db45a8361e86586f68f72f1577c39300b5c73bda6ae3fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d02cb0af2d87047dec0ae53b6b47fc1
SHA106204398d3eb28bfb218410b3419b88cba05b02d
SHA2569e30d6566f38ba15a8428a11a77bf9ea8bd9d4252357a98c07b10adc7dee9e6e
SHA512a9610570b312ca40c2fec47c5e6aeaabd3b87c8376ccfb68fb69f11988f789e6a1b2b469dea7e9e30993ee338400d61f32c7451cd6f3fbd0be522b9a789b31ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb2aec66aa3c9e416178f3579b33d8e0
SHA1b344497093b06fb1538b5a6d33e03fccbc00b01e
SHA2562f7e1beb2d9fcc37c44fd89e8a0c838a8c6979c02ca7ce8a87edf648c96ed92d
SHA51245629ad50d5b3a216182d957039071ba64f452a3eba6c8f02fe4205095e44db631d4b80701ef3996a5b03a2def9abc572a860a76b6692066a6e6885eb12fa67e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9493815401de9c0a2c80c43d39f3bdc
SHA11f76e21332c10acca1fe7fda9b622dc0286cfc84
SHA25658273761192c09fa88b48d0bc73b8c521762b3cb87969bf4123a15bdf2b52687
SHA51236bb13292d1a9cd35afa9a996d42bd0a6850c125ae47939a4e84417eff5e53d21794620422c54d85dbe9091be657321af57b8d93587fc6a2abe9cffae17f3152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550dbf86d0ab189a703c7366b685b4e41
SHA1d4de1f52001343f993d75a40e2fa1a99798926e3
SHA256ba66f87e4caa45230e8f4d6b436c78f9adfc21d2a76857a66ba2164b684f086b
SHA5129b07a0c02f9d39e184f76f30147ff71344510e8ef3167cc85ac3498acdc28c28067fd96cade6b86649e00c4c920a4ec9e7a7f0ec74260efe2c1e292f358a7d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5227413e65b2dc56c6436c289455e07fc
SHA16f225c0d2a17c62472b59fe4c0e5034013e05bf3
SHA256fd5cba24bcb34b397a180b309de29528c25d15f4c2de57510c913622e3ce89c7
SHA51249429ae71cbe487157db03da648a711b7d5c1207953f9c8951d25f05594460faa9f746e47bdedf45f31f5c9f7d21f3e58637c73ce9836cb12b9e1414ae12a713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f3b62b9d4aa361ddeb55509dd8237fd
SHA1b7fada033aa9b27196a576ced0af8fe8a585fe52
SHA256c770847b3288612a4799a30b3b52da8ac059b7e15aa6d350ea0bb57a35aab570
SHA512acf64bec4d1aea7ba118c3b8e74cea10bdb91b937be94d39a0bc8907a06a39f0643118b1504efb6e366aa55e8244febb7f83ad3109ea6f26287b42884ab1539d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cede0b2c5ebf3c68afbe7029e0069cbf
SHA18e8b38c8cee151754eb1a85dacbb1708ff5cf513
SHA25649cb0e857d70314dfa9afe6624c221ea4cdf21267f361263e631c4132cdcb0d8
SHA5125bbf192cb7475dabb866eedd5e8a5ee787172f853f3884db62d67c3b0dfca060d3c7f33387c8f1dd6f055fade14c0414005ee324e1d057fefef71aac561ad3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5895f8eb7d10ad39a09b03e21b3504322
SHA1fdd4422806fa70133ca12ae804b679d2d237eb63
SHA256a725e4ec05d1e2548bb423667bc975599c080e01e14379a6f7272839c8011ea8
SHA5123d67c01c0dd8be11ecf181746f139d09fc156a4b27d638da33c699973653c46dc48afcfd54180d0e220198062c5abd80a5a98fb405571df9baffdb00e610399f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50acf2c7519b1ee210d363bec4bac591b
SHA15b8786dd5106972f34212811c9372ad1c16e0c22
SHA256c505a9c8c3e995200b36f0d3c6127ef991f1d158e302b8a89d27527a52de60ed
SHA5126e963ef341ffe2c8610463160add6b16b79c0343dd4aa978c2c4d8d070e3c586c8416024f43415b2d1fecd26a315bffef92bcc9b33f388967f46f5be8131aa09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c05661eeb1b7eb4a04678df269bf1a5
SHA151c22f4ebc91bc004d7cacbf61e9841ddf59efd2
SHA256ce8fd638e8b6407071264ec58ff3ab95cd9dc4f1639f5fcd6e3b3f2ccd4a8f1e
SHA512917dde9a68c44c45706a57d33550e755b0c04f23ef7eff154d30e1e0755d454c2a29c862ee6a7d935ad1d566cfbfa7a4e988d3b008dbd54c7001f88bbccaaecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58f4bc5e1ac7521b6a65d46ecb3c40dc0
SHA1c1883e3421ac2fc8ad67b99505aea0024c934575
SHA2567701f3b6d7442cdb8d2e1abdd8348aebac7437753851d1e1fe5ce8d25605abf4
SHA5121a342289a226249c3405f08d82462910fff5d9fa9a3b02aee584e0e89bd2fb9c0a812fe86b2c281c8bc0bdcb4eb2827151af8f404157ccbe12fe603e5490d9ae
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
21KB
MD5d7a3fa6a6c738b4a3c40d5602af20b08
SHA134fc75d97f640609cb6cadb001da2cb2c0b3538a
SHA25667eff17c53a78c8ec9a28f392b9bb93df3e74f96f6ecd87a333a482c36546b3e
SHA51275cf123448567806be5f852ebf70f398da881e89994b82442a1f4bc6799894e799f979f5ab1cc9ba12617e48620e6c34f71e23259da498da37354e5fd3c0f934
-
Filesize
8KB
MD584bcf3c71e70d5a6e9dc07d70466bdc3
SHA131603a1afc2d767a3392d363ff61533beaa25359
SHA2567d4da7469d00e98f863b78caece3f2b753e26d7ce0ca9916c0802c35d7d22bcf
SHA51261aefa3c22d2f66053f568a4cc3a5fc1cf9deb514213b550e5182edcecd88fadf0cb78e7a593e6d4b7261ed1238e7693f1d38170c84a68baf4943c3b9584d48e