Analysis
-
max time kernel
69s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe
-
Size
684KB
-
MD5
989fe32c814a09a49cbb56443de5d1d7
-
SHA1
ccdf0e1e4365395016533cf162a2e434879dd943
-
SHA256
5d91e845ee3f9446a24ca36ad0e215c44164492efd2fb0e5d8eb423645a8968b
-
SHA512
921c281be5dfe1c4d35e39779b9321ed913ad3c1f49c909e7acfd39601bb3625f810790f0f088eb6f8b40b895a05c02b792b295608ca3239c7fd7c1b0950d8ca
-
SSDEEP
12288:C6HgI0cchRB19jEfo3DPtITbL4kEJXqQUDVGMUIA:CB1Dl6o3D1IXXEJaXVGY
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 10 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 4644 bcdedit.exe 4968 bcdedit.exe 1212 bcdedit.exe 1072 bcdedit.exe 3900 bcdedit.exe 2032 bcdedit.exe 3044 bcdedit.exe 4960 bcdedit.exe 3204 bcdedit.exe 3588 bcdedit.exe -
Drops file in Drivers directory 1 IoCs
Processes:
isocex.exedescription ioc process File created C:\Windows\system32\drivers\e587f6c.sys isocex.exe -
Enables test signing to bypass driver trust controls 1 TTPs 10 IoCs
Allows any signed driver to load without validation against a trusted certificate authority.
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 4644 bcdedit.exe 1212 bcdedit.exe 1072 bcdedit.exe 3900 bcdedit.exe 3588 bcdedit.exe 4968 bcdedit.exe 2032 bcdedit.exe 3044 bcdedit.exe 4960 bcdedit.exe 3204 bcdedit.exe -
Executes dropped EXE 1 IoCs
Processes:
isocex.exepid process 1092 isocex.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
isocex.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Isocex = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Morayf\\isocex.exe" isocex.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exedescription pid process target process PID 3344 set thread context of 4560 3344 989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exeisocex.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language isocex.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "66" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exeisocex.exepid process 3344 989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe 3344 989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe 1092 isocex.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 656 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
isocex.exedescription pid process Token: SeShutdownPrivilege 1092 isocex.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 928 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exeisocex.exedescription pid process target process PID 3344 wrote to memory of 1092 3344 989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe isocex.exe PID 3344 wrote to memory of 1092 3344 989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe isocex.exe PID 3344 wrote to memory of 1092 3344 989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe isocex.exe PID 1092 wrote to memory of 4644 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 4644 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3588 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3588 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3204 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3204 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 4960 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 4960 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3044 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3044 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 2032 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 2032 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3900 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 3900 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 1072 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 1072 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 1212 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 1212 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 4968 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 4968 1092 isocex.exe bcdedit.exe PID 1092 wrote to memory of 2604 1092 isocex.exe sihost.exe PID 1092 wrote to memory of 2604 1092 isocex.exe sihost.exe PID 1092 wrote to memory of 2604 1092 isocex.exe sihost.exe PID 1092 wrote to memory of 2604 1092 isocex.exe sihost.exe PID 1092 wrote to memory of 2604 1092 isocex.exe sihost.exe PID 1092 wrote to memory of 2620 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 2620 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 2620 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 2620 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 2620 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 2368 1092 isocex.exe taskhostw.exe PID 1092 wrote to memory of 2368 1092 isocex.exe taskhostw.exe PID 1092 wrote to memory of 2368 1092 isocex.exe taskhostw.exe PID 1092 wrote to memory of 2368 1092 isocex.exe taskhostw.exe PID 1092 wrote to memory of 2368 1092 isocex.exe taskhostw.exe PID 1092 wrote to memory of 3576 1092 isocex.exe Explorer.EXE PID 1092 wrote to memory of 3576 1092 isocex.exe Explorer.EXE PID 1092 wrote to memory of 3576 1092 isocex.exe Explorer.EXE PID 1092 wrote to memory of 3576 1092 isocex.exe Explorer.EXE PID 1092 wrote to memory of 3576 1092 isocex.exe Explorer.EXE PID 1092 wrote to memory of 3688 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 3688 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 3688 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 3688 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 3688 1092 isocex.exe svchost.exe PID 1092 wrote to memory of 3892 1092 isocex.exe DllHost.exe PID 1092 wrote to memory of 3892 1092 isocex.exe DllHost.exe PID 1092 wrote to memory of 3892 1092 isocex.exe DllHost.exe PID 1092 wrote to memory of 3892 1092 isocex.exe DllHost.exe PID 1092 wrote to memory of 3892 1092 isocex.exe DllHost.exe PID 1092 wrote to memory of 4012 1092 isocex.exe StartMenuExperienceHost.exe PID 1092 wrote to memory of 4012 1092 isocex.exe StartMenuExperienceHost.exe PID 1092 wrote to memory of 4012 1092 isocex.exe StartMenuExperienceHost.exe PID 1092 wrote to memory of 4012 1092 isocex.exe StartMenuExperienceHost.exe PID 1092 wrote to memory of 4012 1092 isocex.exe StartMenuExperienceHost.exe PID 1092 wrote to memory of 4072 1092 isocex.exe RuntimeBroker.exe PID 1092 wrote to memory of 4072 1092 isocex.exe RuntimeBroker.exe PID 1092 wrote to memory of 4072 1092 isocex.exe RuntimeBroker.exe PID 1092 wrote to memory of 4072 1092 isocex.exe RuntimeBroker.exe PID 1092 wrote to memory of 4072 1092 isocex.exe RuntimeBroker.exe PID 1092 wrote to memory of 1480 1092 isocex.exe SearchApp.exe
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2620
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2368
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\989fe32c814a09a49cbb56443de5d1d7_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\Morayf\isocex.exe"C:\Users\Admin\AppData\Local\Temp\Morayf\isocex.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:4644
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:3588
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:3204
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:4960
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:3044
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:2032
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:3900
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:1072
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:1212
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe -set TESTSIGNING ON4⤵
- Modifies boot configuration data using bcdedit
- Enables test signing to bypass driver trust controls
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YVNC271.bat"3⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3688
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3892
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4012
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4072
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1480
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4112
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4800
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:2672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:3320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff88babd198,0x7ff88babd1a4,0x7ff88babd1b02⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2308,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1868,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=2788 /prefetch:32⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=1728,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4216,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:1348
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:3924
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:664
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4828
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1844
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa391e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD536696b4ebba1f51d880ff98c3de39cd5
SHA1ee2f1013d95e7dc3a63f72a9b09b45fccfa60aa1
SHA2562e8b470e9d4a616ab7930ccffb45f9e13239ee2d78c9597313d0975d61ce53ce
SHA5127bd6479d49b2ca6cbf4c4b57846240ffdca9c45647ebc3b26fd5198158e7563cd3ff9f9bc09631bffe82448479a67f875506c9ef8c47bd2261ef9d73d11eea71
-
Filesize
244B
MD5ff70815b479a0cd61083efd6fd6ff2c1
SHA15c4e67186331dbdf8bbf251515da0780e188e391
SHA2566d7c3ec8bfba3a3fc7bcaf6e451cb64555ebd9fa2b3b7297adafafb32c467230
SHA5126d284f1470d6b7d9180d8f52723efc71e54a0b6c32cc063762ac7ca229f7d1e3f1d90d9dce0d3ec7177b7e4e90e52d621e71762196a82423da50dcfc32dffb52