Analysis
-
max time kernel
12s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 13:34
Behavioral task
behavioral1
Sample
fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe
-
Size
516KB
-
MD5
fa7ee2803e4170f1a9c6055410fb9f08
-
SHA1
7beec9c477ce767060efbfa1157a0475c47f8f65
-
SHA256
9cae1475f72ead9c1d59361ad45d167b1c2c92972bed3188de2f96981c87e883
-
SHA512
d4583ba4fa6a2f24d6cda7776e9a59a07055c0ab44fb201b029c73e5999aa5669ec17b0c8de06bf524a2f853cf8569bb2a033c765ad557f63e35ea485a63d69f
-
SSDEEP
6144:kTnjnvrM3mjHGh5Doh9Z5cAea4Jv81E66Hwc2Fq4t:kHn438Hwerea2vEEFz2F
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe SCVVHSOT.exe" fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Loads dropped DLL 1 IoCs
pid Process 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\SCVVHSOT.exe" fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 28 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\r: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\a: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\p: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\I: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\e: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\g: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\n: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\E: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\o: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\q: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\w: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\s: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\u: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\v: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\x: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\b: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\i: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\l: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\m: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\t: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\J: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\h: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\k: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\y: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\z: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\G: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened (read-only) \??\H: fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\SCVVHSOT.exe fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\blastclnnn.exe fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File created C:\Windows\SysWOW64\setting.ini fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File created C:\Windows\SysWOW64\wd273296.dl_ fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SCVVHSOT.exe fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File created C:\Windows\SysWOW64\blastclnnn.exe fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autorun.ini fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\setting.ini fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File created C:\Windows\SysWOW64\wd273296.dll fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1548-0-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/files/0x0007000000023c8e-13.dat upx behavioral2/memory/1548-52-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-53-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-54-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-89-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-90-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-91-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-92-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-93-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-95-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-96-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-97-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-98-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1548-99-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File created C:\Windows\SCVVHSOT.exe fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe File opened for modification C:\Windows\SCVVHSOT.exe fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1548 wrote to memory of 4544 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 84 PID 1548 wrote to memory of 4544 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 84 PID 1548 wrote to memory of 4544 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 84 PID 4544 wrote to memory of 2924 4544 cmd.exe 86 PID 4544 wrote to memory of 2924 4544 cmd.exe 86 PID 4544 wrote to memory of 2924 4544 cmd.exe 86 PID 1548 wrote to memory of 624 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 87 PID 1548 wrote to memory of 624 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 87 PID 1548 wrote to memory of 624 1548 fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe 87 PID 624 wrote to memory of 4388 624 cmd.exe 89 PID 624 wrote to memory of 4388 624 cmd.exe 89 PID 624 wrote to memory of 4388 624 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa7ee2803e4170f1a9c6055410fb9f08_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe3⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\~47b8889f.tmp"C:\Users\Admin\AppData\Local\Temp\~47b8889f.tmp"2⤵PID:4956
-
-
C:\Users\Admin\AppData\Local\Temp\~ac215690.tmp"C:\Users\Admin\AppData\Local\Temp\~ac215690.tmp"2⤵PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\~f3d9f4d6.tmp"C:\Users\Admin\AppData\Local\Temp\~f3d9f4d6.tmp"2⤵PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\~6468d4a0.tmp"C:\Users\Admin\AppData\Local\Temp\~6468d4a0.tmp"2⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\~72c0fd40.tmp"C:\Users\Admin\AppData\Local\Temp\~72c0fd40.tmp"2⤵PID:4928
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD508947ae2d3c65af810560dae3c5f89ca
SHA16437308a4218e00073132ad18ded71a35a014f4c
SHA256086588d3918111abcd1fc047c1a0886539291ced0bcb1fb4f9ae4a8f3e4a868c
SHA512d2abe0cfbc1ea49f297034b1cb16ee2687cedebabcd981c52fbf793e326bc04b6210ec01ce0d9378bf9e0a5683da441b682841be41ef7e2494cb82d31556a4be
-
Filesize
66KB
MD516875f251a7381c81f66f9c4cf1d1433
SHA1df2ab65e2547405aca0642e8d8afe0826c8016fa
SHA256cbbef400e14f6dfdb1480aebcb140c3a079cf4cb5d832778ebbc9da197277994
SHA512eeeb0a982e632155fced55facf9359c4ec46c1af103550eca3fe10cbf707fa3e7eca71e1636c6b494c49d5cbf271bae0ed0caeaacb56d0e06535632ce1348fed
-
Filesize
66KB
MD54da191d0b79865de679b4745f32de5f9
SHA1986e58b0dbf07ec7e3cde512356f85f06c9022a9
SHA256a7d835c093256b985d0051c8d6c8ef10851c9d40c12398e977bc57b7de7738bf
SHA51247121e6708f61d2cb31ec9b13f5e259802e1feaf4d1d6ad1b8f01a92b61a075f5c5af5e2e5203372df254c9992b96098bc5690f1eab426bbf55aa483360b4bc1
-
Filesize
66KB
MD5c3e2e4d3b06a0c418ccde0d235bc2b10
SHA171ce2c21814fb3f6587029bfb029541febbd094a
SHA25692360a6f19cdbfb2a7d99a03662bafcb4f3db8c660edf4ab86fb41a5c5da5838
SHA5129084d1a6abb9b8254c0754a57434476e7d5189ba12bb8053a38ff5a8ac61518d86b835ad387cd94b6a35dd931e11d99ba1b504780e27b9308ca49d77c0c038ce
-
Filesize
66KB
MD5da45853ce6a547fc0b9e08bb05443e67
SHA161fc4d97171bc97f58d4192cf7ba86ffabc0053d
SHA256c9bf3431b0c67b82ed97b9d4a9f2c9d158d3a2f371ad41f1706c7a8a15342e9a
SHA512b1748e533a9ec728259da4472fa296b0d1436e6092ab94450b1bce77f6e70d3cc52206b6426247a651c10e5a14b131295f4d0d5b091cddc79c480e9f6f52437d
-
Filesize
103B
MD571ba948ec18ea42865d9a953fca1eac3
SHA135d35b1b2ac08f0898b036328f18a96de87ef2b4
SHA256d3d3c8b704a1176512eec636590c78467c9f3873f5fc74820130730af7338e14
SHA5121ac98f09cd05c8798bd54a8db067935efb3fa530fa9d1ef85cd24f88f95e938cf31f1c40676d0be1192b3d32dacd087e76bbf120219acae59b8334c2c671838b
-
Filesize
516KB
MD5fa7ee2803e4170f1a9c6055410fb9f08
SHA17beec9c477ce767060efbfa1157a0475c47f8f65
SHA2569cae1475f72ead9c1d59361ad45d167b1c2c92972bed3188de2f96981c87e883
SHA512d4583ba4fa6a2f24d6cda7776e9a59a07055c0ab44fb201b029c73e5999aa5669ec17b0c8de06bf524a2f853cf8569bb2a033c765ad557f63e35ea485a63d69f
-
Filesize
149KB
MD5264ecd0c8b60215ffb5af78c1d96e4c6
SHA10c56e0e590e466b3d07db1267d05950654103f3e
SHA256a49d7b5b982ef255f6157e7af0f8bc4fe951afbc011a6e853339b96e7b792429
SHA5128f772bad3c1a62b57dd3fe30fe4228ff7aa2d8a41ddfe4fd9419f5294ba962ab5f2e145d362383bd0e678056eb8bcc1b156c022110d7d5c985da605af1e167bf
-
Filesize
80KB
MD59b02808f4e0b8a5e71a37949b6db062b
SHA1715e45ad25db0fd7d2c1d856906637fd6467715c
SHA2560c8f585418bce392ecbd330bae9a3535a4d92a2c9283e031024612935641cc30
SHA51291844eb4490713c328704a0e4351fbce976a72136622b21f56fd9ae6f821eb5aa445c61ad07d885e67b126a2e66c3bb73d8e90bc305ffb48c94dcac650c6f415