Analysis
-
max time kernel
124s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 07:54
Static task
static1
Behavioral task
behavioral1
Sample
89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs
Resource
win10v2004-20240426-en
General
-
Target
89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs
-
Size
1.9MB
-
MD5
89cde7fa5c181f10cc9a21fb961f8de5
-
SHA1
a1449eef635ae525e6ba3167f4978bbfde9c73fc
-
SHA256
3a1ec5cfa213479f5f7fc25d46672b489ab64d50e687253f6f388991b0c50b43
-
SHA512
a44b5af5c92fdeebd25de21a08b1ff8138d3092a6131f750f1ba01717c80d729da020e5778419835d1014b29c29951cca4d69eaf0456640c759727a4f495e7d0
-
SSDEEP
49152:j6rXNinXYXKRat360hlkGHkUxyHUfCllJ04MGo2GriKPgOU1eODlB:F
Malware Config
Extracted
qakbot
323.79
spx02
1567678709
50.78.93.74:995
50.46.131.145:443
98.236.87.243:443
72.179.13.59:443
73.226.220.56:443
75.177.172.209:6881
192.24.181.185:443
206.51.202.106:50002
108.184.57.213:443
67.10.18.112:993
162.244.225.30:443
47.23.101.26:993
47.136.226.219:443
96.20.238.2:2083
68.238.56.27:443
75.131.239.76:443
172.78.85.20:443
96.22.239.27:2222
76.71.76.131:32101
60.254.82.182:2078
203.161.179.185:2222
173.22.120.11:2222
76.85.30.25:995
70.183.177.71:443
181.143.141.226:995
76.116.128.81:443
96.20.238.2:2078
67.10.18.112:995
12.5.37.3:995
75.71.201.170:443
50.100.214.10:2222
105.246.79.4:995
68.174.15.223:443
99.228.242.183:995
70.188.98.97:443
148.163.2.101:443
166.62.180.194:2078
47.146.173.204:443
184.180.157.203:2222
72.29.181.77:2222
104.34.122.18:443
181.126.80.118:443
90.252.105.90:2222
24.184.6.58:2222
68.83.59.107:443
86.97.43.189:443
199.126.92.231:995
2.50.171.216:443
98.186.90.192:995
76.93.179.66:443
67.246.16.250:995
173.163.24.169:443
70.183.154.250:80
76.6.64.52:443
67.77.162.13:443
76.64.15.78:2222
12.5.37.3:443
116.58.100.130:995
173.178.129.3:443
67.41.197.173:2078
65.116.179.83:443
67.183.144.204:443
184.74.101.234:995
189.160.191.239:443
174.48.72.160:443
12.176.32.146:443
70.166.97.7:465
70.164.39.91:443
75.131.72.82:443
98.224.57.108:443
47.214.144.253:443
209.182.122.217:443
206.51.202.106:50003
174.19.109.195:993
98.236.87.243:995
186.48.152.170:443
107.12.140.181:443
75.56.175.129:995
71.30.56.170:443
217.162.149.212:443
24.27.82.216:2222
181.197.195.138:995
47.153.115.154:443
50.247.230.33:443
216.221.88.160:443
190.120.196.18:443
67.214.8.102:443
186.47.208.238:50000
166.62.129.86:443
159.118.173.115:443
23.240.185.215:443
98.165.206.64:443
162.244.224.166:443
207.179.194.91:443
75.157.194.173:995
68.238.144.55:443
24.111.196.195:443
47.54.254.139:2222
74.15.32.205:2222
47.33.217.253:1194
70.50.221.166:2222
72.16.212.107:995
108.160.123.244:443
47.49.7.42:443
65.30.12.240:443
104.50.135.193:443
80.121.136.202:995
73.202.121.222:443
47.153.115.154:995
72.29.181.77:2083
104.3.91.20:995
73.104.218.229:0
190.144.81.158:995
64.19.74.29:995
65.94.90.23:1194
173.172.205.216:443
70.183.3.199:443
201.188.107.81:443
73.232.165.200:995
24.180.7.155:443
99.241.22.53:443
173.233.182.249:443
137.25.72.175:443
184.191.62.78:443
47.180.66.10:995
73.137.187.150:443
75.113.104.27:443
47.153.179.222:995
67.200.146.98:2222
71.197.126.250:443
47.148.133.120:443
83.76.50.72:2222
73.179.178.78:443
201.152.159.159:995
76.174.122.204:443
186.7.117.189:443
98.142.44.78:443
74.197.206.71:443
24.42.250.18:443
67.186.150.213:443
35.136.74.103:443
190.120.196.18:995
1.172.91.225:443
98.181.182.13:2078
71.182.142.63:443
73.37.61.237:443
173.172.56.79:443
172.251.125.166:8443
189.236.138.168:443
24.67.37.137:443
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Eactoov = "0" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths reg.exe -
Executes dropped EXE 7 IoCs
Processes:
xgIWRvnF.exexgIWRvnF.exebwiindui.exebwiindui.exexgIWRvnF.exebwiindui.exebwiindui.exepid process 3860 xgIWRvnF.exe 3428 xgIWRvnF.exe 3608 bwiindui.exe 3552 bwiindui.exe 4796 xgIWRvnF.exe 5044 bwiindui.exe 1992 bwiindui.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gdxsrgbgi = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Eactoov\\bwiindui.exe\"" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 18 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
bwiindui.exexgIWRvnF.exebwiindui.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service bwiindui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 xgIWRvnF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc xgIWRvnF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 bwiindui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 bwiindui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 bwiindui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc bwiindui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc bwiindui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service bwiindui.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 xgIWRvnF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc xgIWRvnF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service xgIWRvnF.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service bwiindui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc bwiindui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service bwiindui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service xgIWRvnF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 bwiindui.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc bwiindui.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 5 IoCs
Processes:
xgIWRvnF.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ xgIWRvnF.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" xgIWRvnF.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" xgIWRvnF.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" xgIWRvnF.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" xgIWRvnF.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
xgIWRvnF.exexgIWRvnF.exebwiindui.exebwiindui.exeexplorer.exexgIWRvnF.exebwiindui.exebwiindui.exepid process 3860 xgIWRvnF.exe 3860 xgIWRvnF.exe 3428 xgIWRvnF.exe 3428 xgIWRvnF.exe 3428 xgIWRvnF.exe 3428 xgIWRvnF.exe 3608 bwiindui.exe 3608 bwiindui.exe 3552 bwiindui.exe 3552 bwiindui.exe 3552 bwiindui.exe 3552 bwiindui.exe 1420 explorer.exe 1420 explorer.exe 1420 explorer.exe 1420 explorer.exe 4796 xgIWRvnF.exe 4796 xgIWRvnF.exe 5044 bwiindui.exe 5044 bwiindui.exe 1992 bwiindui.exe 1992 bwiindui.exe 1992 bwiindui.exe 1992 bwiindui.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
bwiindui.exepid process 3608 bwiindui.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
xgIWRvnF.exebwiindui.exexgIWRvnF.execmd.exebwiindui.exedescription pid process target process PID 3860 wrote to memory of 3428 3860 xgIWRvnF.exe xgIWRvnF.exe PID 3860 wrote to memory of 3428 3860 xgIWRvnF.exe xgIWRvnF.exe PID 3860 wrote to memory of 3428 3860 xgIWRvnF.exe xgIWRvnF.exe PID 3860 wrote to memory of 3608 3860 xgIWRvnF.exe bwiindui.exe PID 3860 wrote to memory of 3608 3860 xgIWRvnF.exe bwiindui.exe PID 3860 wrote to memory of 3608 3860 xgIWRvnF.exe bwiindui.exe PID 3860 wrote to memory of 3300 3860 xgIWRvnF.exe schtasks.exe PID 3860 wrote to memory of 3300 3860 xgIWRvnF.exe schtasks.exe PID 3860 wrote to memory of 3300 3860 xgIWRvnF.exe schtasks.exe PID 3608 wrote to memory of 3552 3608 bwiindui.exe bwiindui.exe PID 3608 wrote to memory of 3552 3608 bwiindui.exe bwiindui.exe PID 3608 wrote to memory of 3552 3608 bwiindui.exe bwiindui.exe PID 3608 wrote to memory of 1420 3608 bwiindui.exe explorer.exe PID 3608 wrote to memory of 1420 3608 bwiindui.exe explorer.exe PID 3608 wrote to memory of 1420 3608 bwiindui.exe explorer.exe PID 3608 wrote to memory of 1420 3608 bwiindui.exe explorer.exe PID 4796 wrote to memory of 532 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 532 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 4276 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 4276 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 3468 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 3468 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 208 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 208 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 4644 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 4644 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 2952 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 2952 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 4608 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 4608 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 3744 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 3744 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 1392 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 1392 4796 xgIWRvnF.exe reg.exe PID 4796 wrote to memory of 5044 4796 xgIWRvnF.exe bwiindui.exe PID 4796 wrote to memory of 5044 4796 xgIWRvnF.exe bwiindui.exe PID 4796 wrote to memory of 5044 4796 xgIWRvnF.exe bwiindui.exe PID 4796 wrote to memory of 1628 4796 xgIWRvnF.exe cmd.exe PID 4796 wrote to memory of 1628 4796 xgIWRvnF.exe cmd.exe PID 4796 wrote to memory of 3408 4796 xgIWRvnF.exe schtasks.exe PID 4796 wrote to memory of 3408 4796 xgIWRvnF.exe schtasks.exe PID 1628 wrote to memory of 588 1628 cmd.exe PING.EXE PID 1628 wrote to memory of 588 1628 cmd.exe PING.EXE PID 5044 wrote to memory of 1992 5044 bwiindui.exe bwiindui.exe PID 5044 wrote to memory of 1992 5044 bwiindui.exe bwiindui.exe PID 5044 wrote to memory of 1992 5044 bwiindui.exe bwiindui.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\89cde7fa5c181f10cc9a21fb961f8de5_JaffaCakes118.vbs"1⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exeC:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exeC:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe /C2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:3552
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn dypsdsnr /tr "\"C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe\" /I dypsdsnr" /SC ONCE /Z /ST 07:56 /ET 08:082⤵
- Creates scheduled task(s)
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exeC:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe /I dypsdsnr1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵PID:532
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵PID:4276
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵PID:3468
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵PID:208
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵PID:4644
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵PID:2952
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵PID:4608
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵PID:3744
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Eactoov" /d "0"2⤵
- Windows security bypass
PID:1392
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exeC:\Users\Admin\AppData\Roaming\Microsoft\Eactoov\bwiindui.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\xgIWRvnF.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
PID:588
-
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /DELETE /F /TN dypsdsnr2⤵PID:3408
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD5ee012e5a6dedbad726af12e7ba9374df
SHA11429e28e9c78294b6d1e96b9cb40da73ae51c23a
SHA256259e8c4576444287f43218b2f6754da1d50339fdb4c4d8c9634ff72e6e2521f5
SHA5125a82377e13242a7ab5d257a7f7f0c0856904591e5b583089999772742046b3d2857bb43f0937b4ad63cdc8e65e8519f0e6fd831b7c598b1ce13587934f9275d2
-
Filesize
63B
MD525e60d4dce767250e58db51b7fc2f21c
SHA1c9d66575a343dbd55e7233642e5669aca1fd5ea7
SHA256dd8ab149e766d6cbb362a8a210682cc10c86cff86df41d2f7f11f096c3e2b590
SHA512bac4c9aaa33f87b9b70ed905506b6ceb31aeaa5420ce51e4ddc42108ab7252bb4fd41c2173a6236b037383b3f2213a75c264f22df4bfdf89cf775cfd96915d5c