Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe
-
Size
83KB
-
MD5
ad85c0ba2c09b07311962f25690e3018
-
SHA1
92130253b380bad429d682b915a6b24ed57ab2c6
-
SHA256
b10cba95aabecee360a0de41e5d9b5d535ded0befc16f8947174a6af6c9874f3
-
SHA512
492369bc5c14c7da9e1083807b9c6fa5be8983530057e163be5b7251c55daf53ed2fb7c99200c382e41ff7f5fcb33dbf957cd6271cd6e7966a852360c555233c
-
SSDEEP
1536:xQQ2aTmzPfYPZrk5SORqgNAPkL+Z2AQMs9J:xQQ2aS7udiXqgNU++Z2ks9J
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000072c62c8c58f2e49dba0b67146f4432de964175b9971216640695db6fb686992c000000000e8000000002000020000000eabd8240168c11fdb236619d7e4a7e1f14d70eb74cb50eed474957130e44c7172000000005768b21e9d18d0dbbbba8f3cbaaaeb7f73b62d8b1f3e680b51f8684923c0d2540000000c88707c279a20fe16a97dda037a8234226a31120a0a422175260b7297936d0217d36317c69cdc7e25d8a5cef89bd248c61e44cf382bbf9b5f797212effd8a18c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0382062a7f2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430282204" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8D8C2041-5E9A-11EF-BBDF-EA452A02DA21} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE 2124 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2784 2272 ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2784 2272 ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2784 2272 ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe 31 PID 2272 wrote to memory of 2784 2272 ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe 31 PID 2784 wrote to memory of 2392 2784 cmd.exe 32 PID 2784 wrote to memory of 2392 2784 cmd.exe 32 PID 2784 wrote to memory of 2392 2784 cmd.exe 32 PID 2784 wrote to memory of 2392 2784 cmd.exe 32 PID 2392 wrote to memory of 2124 2392 iexplore.exe 33 PID 2392 wrote to memory of 2124 2392 iexplore.exe 33 PID 2392 wrote to memory of 2124 2392 iexplore.exe 33 PID 2392 wrote to memory of 2124 2392 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~3DBC.bat "C:\Users\Admin\AppData\Local\Temp\ad85c0ba2c09b07311962f25690e3018_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.nutritiondomain.com3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5d6c9da91c2393ccc4b9a419029eb96
SHA13521394d817d95a8036cb9fa071ad9e4ceb9d0c1
SHA25674435bf3619ec379d4736b0064bb53157859dc93574c03cb949be80c8f20824a
SHA5127ff2761fb4326e0fb432a158aefc44328d69ce5c5f4adea2e5cb801acc08e6c0c81798a413e2729e948c1dc2710ccf20d244ce0ca7f45e890d2fbfe7b3723a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50101cb6c3829c8ff06f98073f1442c64
SHA11fa937b3155954661b591889a3ebf4f549392bcc
SHA2568498255d5aa1421743da13347fc172cbd96cc5bad4ef045ff67e96de63ec6843
SHA512ff4946ccbec51c55ccbbe65366717a193f761ef996fac6b30ed51bf0a119f159d4a0b7000af9520afd3c5b96bf06741bb1f0a444a1f37fce6640684ad28f4833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec6460e2170c599d32d2b72b59e5b39
SHA1dabd25e4d50bcfb0710a4ed1dd717c757030f229
SHA2563f719cf6973558c8207722162fb87a22f00434e9f4b6d269d2a39abd05abc2dc
SHA51215518c40bd78130998aa9e050c2615c325ac91bec761cda38ad0c0b7f49f94e731c795d087ac7b49496fb88dd40a7b46861edd36fd54c29743b6f3e449771cb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcafdd7f209a849abbb969a4254f8765
SHA1144b969151bbd2ee6253115c53fe4059928d75b7
SHA256805f041e8770db100805ad6659f6dac6a3951f67a914301c9ce85570c22a5de8
SHA51260a9b621943355fc532baaba7222cb25a450863a0fb3f4bdf9a90cf851253aebbfdec6cf4f151503f11930f7435e2f55fa1cd9a4f7a6ecfcc53d498a42c4d646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1aee6849f7747192eea952d1cc82e0
SHA11c093766b17ed7abd93a5f48cefd1883634e3087
SHA256ea7b6d4787197315ddc4e7fbf01c2698326e1f26b6b3537980f028eb5caaa77b
SHA512f932c5b9e2e6c340c04355ed1bac9383a0067a25a9e516daf827c52a068f9bba934574adba3bed86986ebec53165f97b9c87601e182cb8fa5b712ff12db9b555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55267905311c61216ee888d02095f6dc1
SHA1f96c912c2267162ddace3d682bde8cdad8994f62
SHA256aab8e7c07466fbdeb688523557e9d49046d5b27347c4c7a37452ab8c2400dc5e
SHA512d2ba1a8fbdaf5764649b475b2d312aa35aa9f104d8445dec223c8d645c11576e209c98a3f315d52ce913a9b38966006ca6da2ce3e7f04399190633061b9e5f7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f975a8471daf50fca00a1d1936e70a
SHA131fb1273ae4f77c5cb68882e179211496ba526d2
SHA256a0b63aa8b83b6b49a8c2d7156c808c1b092a266e5fc4a355b69ad685e2aebc32
SHA5128b99706a6ffbe921b2c629852fb953e12eb8796e423759e2634fff4984fbaec9735e355b47707accd6ec9d020f9b37ce07089578a57a9a8bc9302dd0d9b3ccdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d2c3a91ce6bf9c2b6b79771be01196
SHA1f3f9588ed075088b7626529a54abfbc8d5ccd40d
SHA256b200ae0cb0d7d6f1104e444afdb53999f31aff3c1f7eff50d7f6e1e077ce0823
SHA51240b0b54cc0b5549c5e4d7b61286b9b90c2b0fea4eb176186a267dcdcd6c91250addf9b13277858687ee8b3455170e892fa7bf96cc709bb3e34ee8cc6a73649fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f5c85f351a2a79fa85264578fec2dcf
SHA16d1d8cbca2777b7c41f4a679fcea016e4f5ca6b3
SHA256c1ad395d52b28874eb605f8010aed293776853d290a2891e1a070988a8f10ad2
SHA512602c27b61327f6a6d448ed779e1f5dc2c672496d2f035f58bfc1a6a8fc056b6b00f8ddda225665bf0a15739d182f18faa6095d56035f51c4b493e606b8d1b1d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543e35cd9213eb52300463e3f37850771
SHA15c4f57b28744cd5460971334fd4d5a29c8afbc2d
SHA2561236d360a941f4cf289f14a267c47d17e6c13b7d1a59547c2867b6d9cbc70127
SHA5126be69b590f5ccda63e90029725c9fbee32a228e0a7d42cbf0287cd44595a7238c5ff588a9535da41a50afbfc8ef0eecf3199380fb8c134947b29cc492a9943b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c95f1d008feabc8abbc83651133162
SHA17bacdcbb1a8cfa2a4462ae40e97b1df67ac3392b
SHA25663fbb689571697702426fbee2ac5669d4ef2b1d80b5fd10188c111169ba4f9f8
SHA512bd6fada53a8799b6d6ca6e6431e9eb6d893c32b4ae0e43860e98b17989e282b24796416d42169a69da81fcada8e840be267f073f0c4ff4228272314ba0a5d303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5957f48bcd53e8aa74c6670143f159834
SHA16737aed859c40f97d8e2fde0e8fbe8e530807cbc
SHA256b6b35a1d6fa4a7efcaf42963d2fff70088660b0ed9baa62ce087eb5f6083a88c
SHA5123373c018bbcc1e78eb3fb1306c5d696bcc75b16fce3a27c2435ba87c46ca73a4d76e01c1d6a6e0803c82f2a51df61a9f37fde8f8d83636d4487dda35085d103f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d6d56208649bc2fc130fc8056f14c4
SHA116daef73cdedbca53eb324497abbd030d5e07208
SHA2566880fa1b4bf49e3d36773ffde0171f3b076bdf2c8c902800dd4ec3d78ccb3e4e
SHA512de94db4a48ffdf768ac70ac788c9c107ace10797cd80df16da152f39de6350fa23505cc9050a8f51545237c9f17bdec1ce07d40f7fc7fd6d7175de4065c0d322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4bcd35c4ed1dd6c6bd8bbb89ae4bdac
SHA1d86a92e2e73839f7ada02ce4e6bcd0bbb6d3f867
SHA25604809589db05870f5f2be200eca2ea7df75f5ac6a428df0b0feb1590c5f3fd2c
SHA512428afc5660632ac04582b63b34cf88beda55e18264eee83bacdcd37c2cbdcf045d33bdf7ae4457b6237d4f4a66b9c18132b494c70fe6dd12f1ee140dab7dc645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031041a4b469c488e2e54841dc5c07ce
SHA18d78ab1cbe5068b956fa8197c9e0d56912c55261
SHA256754a859f5f05b031f4878b77a0c9cd0b4f83b836aa362174fdfbb252492052fd
SHA51262bdf1629b39a6dc43e01508864aa7e91c3684294d4b8c196b8cd711274ff57d1f95076606b182208b226be09b26cbba699e9f95dd13faf8e1524a458e816d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3a41cda419e33d5a59d6d51bf77360
SHA1fe9c374ba9fa58a07ce22a4d18affd49ce25bd31
SHA25606794e4a822e92e3e873b16722fc4649d0abb8015379b782113185f2109c7010
SHA51243461df2a4bdb7db2281ea3501841e242115e5861a9c2bfa3da9b0869da9fe269264e08c37dd45997381eb12aec66d430a13a8b477494dd75c1dad9ef087d966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0de760497b163d419214b6fed0674d9
SHA1522d326e960ccd63017138e735cee6a8ddb0e1f4
SHA256f242f663e047578df9437513ee52c53527bd9395028aa2a2e0fdfa0bcf918973
SHA512e29bb31287297670773e3953254f40c539f4390b7136444b16380214286d4b28a91ef40c266daf7a7256a980dcd19a6aeaf9742f09888025ae311b9b0f10a469
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab04fd841c43ffcb976c6266b939c52
SHA14a67631c4c153b763cd1c5b2218535d6aa9e7d38
SHA256481955deb90fdcbee418c664347038f7ce503c0b4e4fe328f6933100355e6708
SHA512a5334db0a713eb5c0b1366a355e54cadc6bd5010f04d77b6f2111edeadb26f098924a16d3e8af4357cae671c32275ec4a172fb4be2c7afa3a6d4fa8c691b56fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55B
MD51f662fb5273391439ac076f835fe5507
SHA18f68c6943314b11f393f882fe04116eb12abb356
SHA256b6867cf01c3cd46a0ae5941dd3970db18d816681a38394bd9b9097a2cbb65435
SHA512ded8d646aeaeb86093ad5a2a23b193a04ad59a7fe8a000c9d2ead2e926e71bcf7221899bd037a8589fd7be94c192493015a7624ac4e9feb295cb0ce1fa7c05d9