Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
e11f1e6bd79d5e12885434dcfd703ae3
-
SHA1
dffa2772b1f9edf18586d70fe83716a032634570
-
SHA256
371f46d6159d5fcba2d1531a470938fcd195840aeaf1147ec894407a7387431d
-
SHA512
05db661decea32032a418e185a9bece0cb1ee6e06e23e7b0cbcd54798c387b3e2ce800c31b5a947570fcd14d63478a2eb862e60060700a7c6f534c6135a2d0f5
-
SSDEEP
49152:+UJ6ZNXox4SgJhBsfHJq/nCFT4Mv0Pt97NfY7+k5K1fyqv+ih69:+tR4xGnCtvwNSK1aqv+4M
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
Godwin@1234
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe, cmd.exe /c start c:\\windows\\wininit.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" wininit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe, cmd.exe /c start c:\\windows\\wininit.exe" wininit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" wininit.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" svchost.exe -
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/388-65-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 516 icsys.ico.exe 1192 wininit.exe 2336 svchost.exe 388 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 api.ipify.org 32 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4428 set thread context of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\RCX5E86.tmp icsys.ico.exe File opened for modification \??\c:\windows\wininit.exe wininit.exe File created \??\c:\windows\wininit.exe icsys.ico.exe File opened for modification \??\c:\windows\wininit.exe icsys.ico.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.ico.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 icsys.ico.exe 516 icsys.ico.exe 516 icsys.ico.exe 516 icsys.ico.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 2336 svchost.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 2336 svchost.exe 2336 svchost.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 2336 svchost.exe 1192 wininit.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 2336 svchost.exe 1192 wininit.exe 1192 wininit.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 2336 svchost.exe 1192 wininit.exe 1192 wininit.exe 2336 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1192 wininit.exe 2336 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Token: SeDebugPrivilege 388 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 wininit.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 264 wrote to memory of 4428 264 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 85 PID 264 wrote to memory of 4428 264 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 85 PID 264 wrote to memory of 4428 264 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 85 PID 264 wrote to memory of 516 264 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 89 PID 264 wrote to memory of 516 264 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 89 PID 264 wrote to memory of 516 264 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 89 PID 516 wrote to memory of 1192 516 icsys.ico.exe 90 PID 516 wrote to memory of 1192 516 icsys.ico.exe 90 PID 516 wrote to memory of 1192 516 icsys.ico.exe 90 PID 516 wrote to memory of 2336 516 icsys.ico.exe 91 PID 516 wrote to memory of 2336 516 icsys.ico.exe 91 PID 516 wrote to memory of 2336 516 icsys.ico.exe 91 PID 4428 wrote to memory of 3696 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 94 PID 4428 wrote to memory of 3696 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 94 PID 4428 wrote to memory of 3696 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 94 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 PID 4428 wrote to memory of 388 4428 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe 96 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" icsys.ico.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wininit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wininit.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:264 -
C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bBNRIXym" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9E3F.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\e11f1e6bd79d5e12885434dcfd703ae3_JaffaCakes118.exe"{path}"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:388
-
-
-
C:\Users\Admin\AppData\Local\Temp\icsys.ico.exeC:\Users\Admin\AppData\Local\Temp\icsys.ico.exe2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:516 -
\??\c:\windows\wininit.exec:\windows\wininit.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192
-
-
\??\c:\users\admin\appdata\local\svchost.exec:\users\admin\appdata\local\svchost.exe3⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
603KB
MD5022821920ac46b52a44cdf0196c1b469
SHA1bf036ce07db9edd5128319c1635ce05a1a611f0e
SHA256257f5dd7532b70252668c3572d4be15938e7d2addfc825af0d545e2be750db35
SHA512c074c5e4bd861be1322fc381a6238389f6f633b9873f9bc5701d858d15aa592cec91df67f8dfa218f0a7c910529cbe726f48f2495407c912bc0b3dcc4cd295e6
-
Filesize
3.1MB
MD5e5f7631a65e188b5e4c712df3eedfb4f
SHA178182de0cdf4fd956358c96258fcf9c897109fa9
SHA256d35558550ddc97df1b77c3d4d1327e7282115db4d83386894e756a74633096f0
SHA51283523b3d75c0c292c2e48d7037346890c6451433c5c23dcd77df271b80a4b9fc07fcfd42c9c1047892b11c91b49c9366c7c1622a7604581bc728991f02911b9d
-
Filesize
1KB
MD5f0542e53ab6aa0d88c3fed33d4f6ce19
SHA17f0fe2077552541d44f09581ff09ab6321400cce
SHA256050efc441cfa16c9f101c08abf1ceb2f2194cd8b4f7bdaaa4aec2fad2230bedc
SHA5125b6cd2fd3d3594f802e5f425b74a3eeadec77dd65cddcfd875f0a56c658de65571258b061ce2f0200cc52f5739e6bb6173941bbe3955be5dd4ce4722c5d3795b