Analysis
-
max time kernel
142s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe
-
Size
482KB
-
MD5
43b1d475678c4ef7147312d135474edc
-
SHA1
e2afb011ee5fe7c5f3fbb63d6cb9079aa0800547
-
SHA256
8c699f6317e47461b9feb29702c1d0ba4c635364e68b17e9af1ef994cee50179
-
SHA512
b2a87f8bca1c814b39a6c0bab9063e3db9e45c7ce413aa7bdfbbece22f58f2af053403645206eae60c734908cd4976b48cd7c8004c3b6787ae0c9e223434a4ec
-
SSDEEP
6144:gDCwfG1bnxLEDgXDCwfG1bnxLEDgXs9HNeBBNlpZPIoD1B:g72bntEDgX72bntEDgcKBLWoD1B
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ZTSLLRFH = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ZTSLLRFH = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ZTSLLRFH = "W_X_C.bat" WScript.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 6 IoCs
pid Process 2232 avscan.exe 3256 avscan.exe 2252 hosts.exe 1560 hosts.exe 4068 avscan.exe 2032 hosts.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys REG.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager REG.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\W_X_C.vbs 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe File created \??\c:\windows\W_X_C.bat 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe File opened for modification C:\Windows\hosts.exe 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avscan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language REG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language avscan.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 9 IoCs
pid Process 952 REG.exe 3444 REG.exe 880 REG.exe 944 REG.exe 3900 REG.exe 2156 REG.exe 2932 REG.exe 1492 REG.exe 3468 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2232 avscan.exe 2252 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 2232 avscan.exe 3256 avscan.exe 2252 hosts.exe 1560 hosts.exe 4068 avscan.exe 2032 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3768 wrote to memory of 1492 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 84 PID 3768 wrote to memory of 1492 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 84 PID 3768 wrote to memory of 1492 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 84 PID 3768 wrote to memory of 2232 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 86 PID 3768 wrote to memory of 2232 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 86 PID 3768 wrote to memory of 2232 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 86 PID 2232 wrote to memory of 3256 2232 avscan.exe 87 PID 2232 wrote to memory of 3256 2232 avscan.exe 87 PID 2232 wrote to memory of 3256 2232 avscan.exe 87 PID 2232 wrote to memory of 3204 2232 avscan.exe 88 PID 2232 wrote to memory of 3204 2232 avscan.exe 88 PID 2232 wrote to memory of 3204 2232 avscan.exe 88 PID 3768 wrote to memory of 1716 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 89 PID 3768 wrote to memory of 1716 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 89 PID 3768 wrote to memory of 1716 3768 43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe 89 PID 3204 wrote to memory of 2252 3204 cmd.exe 92 PID 3204 wrote to memory of 2252 3204 cmd.exe 92 PID 3204 wrote to memory of 2252 3204 cmd.exe 92 PID 1716 wrote to memory of 1560 1716 cmd.exe 93 PID 1716 wrote to memory of 1560 1716 cmd.exe 93 PID 1716 wrote to memory of 1560 1716 cmd.exe 93 PID 2252 wrote to memory of 4068 2252 hosts.exe 94 PID 2252 wrote to memory of 4068 2252 hosts.exe 94 PID 2252 wrote to memory of 4068 2252 hosts.exe 94 PID 2252 wrote to memory of 3032 2252 hosts.exe 96 PID 2252 wrote to memory of 3032 2252 hosts.exe 96 PID 2252 wrote to memory of 3032 2252 hosts.exe 96 PID 3204 wrote to memory of 4968 3204 cmd.exe 99 PID 3204 wrote to memory of 4968 3204 cmd.exe 99 PID 3204 wrote to memory of 4968 3204 cmd.exe 99 PID 1716 wrote to memory of 1076 1716 cmd.exe 98 PID 1716 wrote to memory of 1076 1716 cmd.exe 98 PID 1716 wrote to memory of 1076 1716 cmd.exe 98 PID 3032 wrote to memory of 2032 3032 cmd.exe 100 PID 3032 wrote to memory of 2032 3032 cmd.exe 100 PID 3032 wrote to memory of 2032 3032 cmd.exe 100 PID 3032 wrote to memory of 1060 3032 cmd.exe 101 PID 3032 wrote to memory of 1060 3032 cmd.exe 101 PID 3032 wrote to memory of 1060 3032 cmd.exe 101 PID 2232 wrote to memory of 944 2232 avscan.exe 118 PID 2232 wrote to memory of 944 2232 avscan.exe 118 PID 2232 wrote to memory of 944 2232 avscan.exe 118 PID 2252 wrote to memory of 3900 2252 hosts.exe 120 PID 2252 wrote to memory of 3900 2252 hosts.exe 120 PID 2252 wrote to memory of 3900 2252 hosts.exe 120 PID 2232 wrote to memory of 3468 2232 avscan.exe 125 PID 2232 wrote to memory of 3468 2232 avscan.exe 125 PID 2232 wrote to memory of 3468 2232 avscan.exe 125 PID 2252 wrote to memory of 2156 2252 hosts.exe 127 PID 2252 wrote to memory of 2156 2252 hosts.exe 127 PID 2252 wrote to memory of 2156 2252 hosts.exe 127 PID 2232 wrote to memory of 2932 2232 avscan.exe 130 PID 2232 wrote to memory of 2932 2232 avscan.exe 130 PID 2232 wrote to memory of 2932 2232 avscan.exe 130 PID 2252 wrote to memory of 952 2252 hosts.exe 132 PID 2252 wrote to memory of 952 2252 hosts.exe 132 PID 2252 wrote to memory of 952 2252 hosts.exe 132 PID 2232 wrote to memory of 3444 2232 avscan.exe 143 PID 2232 wrote to memory of 3444 2232 avscan.exe 143 PID 2232 wrote to memory of 3444 2232 avscan.exe 143 PID 2252 wrote to memory of 880 2252 hosts.exe 145 PID 2252 wrote to memory of 880 2252 hosts.exe 145 PID 2252 wrote to memory of 880 2252 hosts.exe 145
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43b1d475678c4ef7147312d135474edc_JaffaCakes118.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Impair Defenses: Safe Mode Boot
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\windows\hosts.exeC:\windows\hosts.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"6⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3900
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2156
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:952
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:880
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
PID:4968
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:944
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3468
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2932
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3444
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Safe Mode Boot
1Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
482KB
MD53b855aa1c63c4ca9e1a707acb2b11dc3
SHA1f59b603bd9a619df6f278bffc69488b868eaaa8c
SHA2569075f2a41dd6827f181278c15df7bf3ca8112847b6acfe63a83d5236673dd47f
SHA5129a26edcec354195d4272b26b2a5616d58a0d94d7b33eadc715cb27193d9475d232bf771e49c27ab3f13c45aef83441fe3108003b6d433d7de733c3eb5e9fd153
-
Filesize
195B
MD5cf0c3c4d1cfde4ae4bd2841efd95456c
SHA146c1689e60cdea314b197bf489c4079517c9b834
SHA25672b796e24c5e22d9780a44f6abc051cad66c5d6ead97e3856709509954e72575
SHA5124fe00e6e317432796fa47238e13d6ce5f3d25e561fa3d1e21cf95cd0af46fc3d461c2b4badb2da8d671b2422bc7b39c536e7cba358d84bf59f8801d5470461c0
-
Filesize
482KB
MD59420c0ccd66ad026ba0eafd5120ad114
SHA1974dcb6ac52abb5b43eaf8873a8eb8061f9f2930
SHA25606c85a9a83dd701a7160c814c69f44da3267284b9ef2fb3a7a490b5189a8a7d0
SHA512b23304da88d710117681ae5baa9b00437de79d4be52698e9f426262325d07f51fb6ebe32664ac43acb0d97fd418ae56bf533024ed0a7b172befd1f063c626417
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b