Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe
-
Size
1.3MB
-
MD5
c77bf4a7d08b1f7bde533391cb008cb3
-
SHA1
ee26a27ceec5c03b25f60f54b06ee4a405576b10
-
SHA256
34bcaa75c7286a2e7af087ebf1f8bc557066f3df80a8eeecb9637786e62a30d7
-
SHA512
4ccb0f49c8437fadb23a944cbafea59e6820d208c00a8b8b3571f3b89a04b6fbd091e06425b43e157e7335fcbb23cfe2ba9f72db3b85bcbab570a2c894278995
-
SSDEEP
24576:02ZYb+kLNJlsJeRKZR/rs8KTFw1tqwR5lKWnens5bNn7adL:02yio7lX89cwPBR5lKWesBN7i
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000023487-16.dat acprotect behavioral2/files/0x0007000000023486-27.dat acprotect behavioral2/files/0x0007000000023488-40.dat acprotect -
Loads dropped DLL 8 IoCs
pid Process 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3300-19-0x0000000001100000-0x0000000001111000-memory.dmp upx behavioral2/files/0x0007000000023487-16.dat upx behavioral2/files/0x0007000000023486-27.dat upx behavioral2/memory/3300-34-0x0000000002B00000-0x0000000002B55000-memory.dmp upx behavioral2/memory/3300-33-0x0000000002B00000-0x0000000002B55000-memory.dmp upx behavioral2/files/0x0007000000023488-40.dat upx behavioral2/memory/3300-52-0x0000000003260000-0x0000000003273000-memory.dmp upx behavioral2/memory/3300-57-0x0000000003260000-0x0000000003273000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\pzz.dll c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\QMDispatch.dll c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe File created C:\Windows\QMDispatch.dll c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF94624F-EAAE-47CA-BE5B-86FDBF0B2BBA}\InprocServer32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DF4F905C-0961-4464-8460-DD2A1F274D1F} c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction.1\ = "QMFunction Class" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF94624F-EAAE-47CA-BE5B-86FDBF0B2BBA}\Programmable c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMCore.QMEngine\CLSID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\VersionIndependentProgID\ = "QMDispatch.QMRoutine" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DF4F905C-0961-4464-8460-DD2A1F274D1F}\ = "IQMFunction" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DF4F905C-0961-4464-8460-DD2A1F274D1F}\ProxyStubClsid32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\Version = "1.0" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF94624F-EAAE-47CA-BE5B-86FDBF0B2BBA}\ProgID\ = "QMDispatch.QMFunction.1" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\CLSID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DF4F905C-0961-4464-8460-DD2A1F274D1F}\TypeLib c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32\ = "C:\\Windows\\QMDispatch.dll" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DF4F905C-0961-4464-8460-DD2A1F274D1F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\ = "QMRoutine Class" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DF4F905C-0961-4464-8460-DD2A1F274D1F}\ProxyStubClsid32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0\win32\ = "C:\\Windows\\QMDispatch.dll" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib\Version = "1.0" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ProxyStubClsid32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID\ = "QMDispatch.QMRoutine.1" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\Programmable c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049} c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\VersionIndependentProgID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\FLAGS\ = "0" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\HELPDIR c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\ = "QMRoutine Class" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ = "QMCore.QMEngine" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction.1 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CurVer c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\0\win32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D} c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ = "IQMRoutine" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CurVer\ = "QMDispatch.QMFunction.1" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\TypeLib\ = "{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMCore.QMEngine" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction.1\CLSID\ = "{EF94624F-EAAE-47CA-BE5B-86FDBF0B2BBA}" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\ = "QMFunction Class" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC} c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32\ThreadingModel = "Apartment" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF94624F-EAAE-47CA-BE5B-86FDBF0B2BBA}\VersionIndependentProgID c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\ = "IQMRoutine" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D}\TypeLib c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E6AD2DF7-46DC-417F-AE61-D433C510416D} c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5FD5723F-D6F6-4F31-A7D0-318E72D28E80}\1.0\HELPDIR\ = "C:\\Windows\\" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DF4F905C-0961-4464-8460-DD2A1F274D1F}\TypeLib\Version = "1.0" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMCore.QMEngine\ = "QMCore.QMEngine" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\C77BF4~1.EXE" c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EF94624F-EAAE-47CA-BE5B-86FDBF0B2BBA}\TypeLib c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine.1 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe 3300 c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c77bf4a7d08b1f7bde533391cb008cb3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5656524b4401f21e2929b78ef4c36db27
SHA1d91ff837d6ced5f0442fd0812b6c1079fe417906
SHA256d493f101ccd1d8804c0981f4fc630718b267d7155bdb575d6f619497956ea44e
SHA512d28b17c924fb5f172944c055a85003575300305eddbbc4c89460777108c87154622b39515ee1f994d713d790fe5b74a69c835bd00d0affc5292fa0150617c34c
-
Filesize
118KB
MD5ec6be2d929694596d883476b8f63a606
SHA19f7b7b21415e59d67285806582aab559c55d9d6a
SHA25650d88a903e8709dd10c03c3b989d66318c05c9a06e4825a63b5cc317cd3575ec
SHA512a072194b30e80db1d1856c8550d0cc23c269f3b53e7eaf603274caf04f0be658ff2c25dbe13480a77547dd2d1e95bf41f64fd260ee961953729a5274500338da
-
Filesize
172KB
MD597319b9509416a2570fd5e6bc3015229
SHA104d945e2b1c7f7bc3f56bf42f89e0ca59c4f768f
SHA256cf4e19241b914cf36965bbfa2aa2d325bf3e7b0d13de93a94f1fec7fb71a908c
SHA5127c0c74be0064b32712a3e08c46285619aa2607890f06bed4ffd39e6896f349a44235f76b521d063fe7a4fda6fd66446a09581bc4eeb3dda85e83a8bc1b9fb65e
-
Filesize
22KB
MD51b850c577115c99dcece5716890f663f
SHA145d833b9c7a68783398949e77af5fbd18d0123e6
SHA256dabc2af4d94dd7b43c079feafbb80b28f9f78e8be29e8f61fd94093608ee9b49
SHA512d4cb1748bdd0f6c19b3fd7013d0cf38fb21a6bec53421d45dd8b0929e6cb89f395a8b1e61b806fcf058461c322da6154008a966bb33d5682d832a71cd17293ec
-
Filesize
20KB
MD587e96b9b1540adb0c01aa48947967666
SHA1cf630e13f5ce321c54de09d6ed24792282b05aa3
SHA256f02409b2e367afd0e585a2e1c6ac4d10790fab5292d8d1c2b866fe04fab28d4d
SHA5120b0fd2d03eb7fb255e283b387b2dd08390ff1ce5f0d47ee5a698b809e73e1c4f484c6970817c64af00531ac938ea5f1970de2a2ccfca769f135adc011e96a3ce