Analysis
-
max time kernel
138s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
91ee8540ae559a08b03a6ca9e50858af_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
91ee8540ae559a08b03a6ca9e50858af_JaffaCakes118.dll
-
Size
823KB
-
MD5
91ee8540ae559a08b03a6ca9e50858af
-
SHA1
9990082c4134b8785092c5d331784edcba97883d
-
SHA256
693b73b89731bb9da36d57ac0119dbfadacd1aff7d70e56e88c4d1259fb6c810
-
SHA512
cc93f99bb258dfd6b76776a6d442634717e4d19423db9b1f4d648c948078282f654d804ccc82d3aa08ad9403a3af4440b43796c211c1702b9f9ba9a05d7b8a5f
-
SSDEEP
24576:OL5/rmRsmDWDPNuFhPvYrpLYHSfcoopooLY9Nu0ukz:cK5hPILYHSfeY9nukz
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2016 rundll32Srv.exe 1888 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1764 rundll32.exe 2016 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0009000000016ace-5.dat upx behavioral1/memory/1764-6-0x0000000000130000-0x000000000015E000-memory.dmp upx behavioral1/memory/2016-11-0x00000000001C0000-0x00000000001CF000-memory.dmp upx behavioral1/memory/2016-13-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1888-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1888-25-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1888-24-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxFEAA.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438575488" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA73FC31-AA07-11EF-9358-7ACF20914AD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1888 DesktopLayer.exe 1888 DesktopLayer.exe 1888 DesktopLayer.exe 1888 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1728 wrote to memory of 1764 1728 rundll32.exe 31 PID 1764 wrote to memory of 2016 1764 rundll32.exe 32 PID 1764 wrote to memory of 2016 1764 rundll32.exe 32 PID 1764 wrote to memory of 2016 1764 rundll32.exe 32 PID 1764 wrote to memory of 2016 1764 rundll32.exe 32 PID 2016 wrote to memory of 1888 2016 rundll32Srv.exe 33 PID 2016 wrote to memory of 1888 2016 rundll32Srv.exe 33 PID 2016 wrote to memory of 1888 2016 rundll32Srv.exe 33 PID 2016 wrote to memory of 1888 2016 rundll32Srv.exe 33 PID 1888 wrote to memory of 2368 1888 DesktopLayer.exe 34 PID 1888 wrote to memory of 2368 1888 DesktopLayer.exe 34 PID 1888 wrote to memory of 2368 1888 DesktopLayer.exe 34 PID 1888 wrote to memory of 2368 1888 DesktopLayer.exe 34 PID 2368 wrote to memory of 2600 2368 iexplore.exe 35 PID 2368 wrote to memory of 2600 2368 iexplore.exe 35 PID 2368 wrote to memory of 2600 2368 iexplore.exe 35 PID 2368 wrote to memory of 2600 2368 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91ee8540ae559a08b03a6ca9e50858af_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91ee8540ae559a08b03a6ca9e50858af_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2937cd6c6875ca629f144fe0fc161a7
SHA158e55a55a2de2fb75623e67b30e8379c0be6e3ab
SHA25675b05c75e370c0aa541f106ca21a7fe02b42392aefd714d045e91a16c5f3413e
SHA5125f467e7fd97918caeed06fdf60dab9d045749026a146ef4b83b4114b51c0c773f965d16b7f9afdbdd24b09a32db44646db70bbc9144b37a8fbcaaba1dc2fa8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d77e4486383f5087212b7e4157b7bdb1
SHA15393a360de0aa5f513829b4c7ed87d7ea27274b6
SHA256b01d366831b575f2f50121768066789da5f7d4b25f6057b4caef55a163307149
SHA512b4512fbe1005dca8a6b8013c1abbc8ab33a66d760c90749e1c9fb9cf046577563c94ed890490974a1e6b6ba646ccf86e99cf9afb6f88350232b6fede12a3fb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519471ec35f7d66788e6632831f164ad6
SHA1e89cc23e9ddbc7dfef41563f8194a81436667fe8
SHA25613e89b6151cb8ecaa910766fdb910c48c3124fbedbbfcc2984bca0af7bce2fbd
SHA512f36fea2e1e243edf2b043da86c56d2a7409442ee668a35b8b37804ae871b7edc708eb4a4b6023ef8ca4453d0244a5ac8daedc2fa2b3d31a009baadb955f12626
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dabca177816c123d9b3841031f24293f
SHA13c5bb6efab00785f2bcc2988adac9997be10b1ca
SHA256c3acba1e7c74836f5291ba99434afcfc0b97e434ed522c19ff95ab99df87cfb3
SHA5128918179e8415c676be385108a8a9bc026fb1c025f26edf8acdf49f45e86fed98561dbb0c0c5652489b335ce4c1149f3a1f4e79299f55fa4a8482c2487151e34a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fac5b532b28a4a8e583abd0d8fd2fb4
SHA1108b26c6c0b722a9a9ad695c7b5b7e022c548861
SHA25694d36989fa654e86eb6a7449ae8a1a89220924c324466cad7a4d60be1de87f26
SHA512d4dd8c2d53d0d1b2fd74f11e3d86450d23e60cd70db5a2bac25ce5c45b145cd40d1736176817a4804ca81d70fbd67caffea5789b3dbd1da49737e1c4bd127ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb4c07a7bd103722ac1cdadfb3ec00e
SHA1652896cc1d39d1ec0873b591fe8eb2179389d2f6
SHA2568c8897335e913fb73de38b221e8b2bdf26c32e9568af49ca9c128167ad1e187c
SHA51212f008eebf83e258ee7b36de097d5d4edc95a11651b81547db510f3ebd49000405c4760b5bccde127d077d86a633c45e88fe044163cbb87ed5f699a2ed0e0db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481cf52cf37e6e586e2ca9c0c981db9b
SHA1887992fcd329b7792eae3f58c8f4485536f9a8c1
SHA2563ddc06a1aebf8db61a27576799742d70c341bf1c5e18d9014015420953d36745
SHA5126c4a1d562bc0e0b61c85ae4ea5f223a99f7d4d3ba8f6c967a1ef09a9709b593008913da414f973f455cdc406ae8e12762bd689aa4976a41d185ce28d57a72b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7faa9fa3308df18a7d94286e604d050
SHA11576de18f6ac73654cde5dd2ae05e46ac09b2586
SHA2563742c4d99dcd9b58b5229e088118798db80dc1e347f19649066be02c9e83d7b8
SHA5126756fea5f2812bdc3f5594ffc1c13a7686998da383187d036bcad1101b5db4f0aab449cf449282ab7874054fdc00341f896085ce249b10e1d3b5de07c261a784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa4db474174836821d8bdeb1e380e56
SHA1aac3ff2557ada2dc44c643e6ee39091cb15a186e
SHA256f98b4210a6ffd3e8f0d1cc4bf74f095a2598c69c5a9644d2089b4dd8b2859c5d
SHA51289f1b47b538e40fa1b8fa76eebcf0e78b1514a533cbb579b58addb3a2f68602c5a0642bf5bc3e6d7e3dd2f672be8fadc8df5a749d9984684c2904aa242108a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af031cc74b095bc057e3a266c3b3065
SHA156815e03b33e93c6591b1c205db7b239fd255604
SHA256c483c4430c4b2e3663045bcae486c155e2d97e4863807b830e3d62a78e188b13
SHA51245e335ef3a19b7c29c4609c6b2869d6dcd9460051f537f4ed5959ff1ec9d46b24938932a740a1dd7a8afd961c91351cefda17bff4d5f5851c9f29b37e8cbc830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136ff0e46c9b3f73c4541a0ec71f6cc9
SHA165550db09f7b72d736e8de681a8f639248daaba9
SHA256c64e3a8c49e8e96076e7607a3b78ec50ae4dd542b0bd0e5156a596e126715ac9
SHA512e3d96af85ed60d6f296e016e79f4590a90c1741bf870ea9f25054f94732cc1f33fd50a394cbe774823da054482b10f86e2ca0c5cb146b59f742101916ec4f99e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df557cdcd23992df626e578a02494ddf
SHA183baa8271726dbe32341bb0bfdaba45360b8f0b3
SHA256bed6c6cc6a4752a848be2d62985cde24717672c5d0203de0c4bb4b978b4de743
SHA5122edfdb0e30c42fcb593f64f4c4f9ed26af197a8a8b1abcd080a7f50703fd3412cfedcf148f4ba7663bbfc122ef3979fc00bbbfdb407643416c442a6312e94147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121c7fcb4c62705379056ce7740c80b0
SHA14a32e6d421936da3401b3740fe0b6c4a3615a283
SHA2567d40d1703ac42d022befe63bd24d1f11e3cf267b79541187561c547c3752bfde
SHA51233bdbafd55037e9d6e25d6cef9c32830e929522ca4b4c46c3264db47a07093bb394496a89450db21bbc7eb0a516f3a27901f8cff7a3e5a1e096b873eb36c8050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ba39e8e16336e280534c3f472f59640
SHA1a5cae96777b5cbef281fd1483c1d79cbbf82b0ef
SHA256344cd90e4fb9377a27201469c6fae19812d1fb79c33440b6b6b5d3ffeeb65ab6
SHA512751cd4849b69564a9ed335501fcb696f452a6d70b2611282137be0c617c0d264cbf839c614dcc36fbbc0cea7fd8c0a8ed393a6029a55f8f62d1a6df42ba15067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb3decdf224a547add51e6b6809819b
SHA1e04ceebf341a03e8af0f5e8303fa4a0209aad375
SHA25666e104d1b4cd72254d8d2561b5fe459de240a8f379a16386c0dadaf5023ac148
SHA51207f821007f9fa4005dd43638310cf145754086a0eac410d8a81d3eec3b6e4f76a71e719442e25722d27ae1747262869bfce5b418e24d4943495fd09daf7348fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334ff436d6ad9e374303fbcc30054a3b
SHA10672730e56644db6b9596690a7e03bfb26cd502a
SHA25699e6864aa71061f0e6b9b4ed3c75dd1043e26d880c74d3556f9b1b8643311ed5
SHA51245b0b38bdb0a0e8f46487a800c0470ed5bab290e6c103350b01590a3faa92556818bbcd1a0e9f78da6737b1c5fa43d49f0194a59ba29dc7b4ff3e428ec8664ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525be95392f71ec7845f42bd944becec9
SHA1c9f684ed7f7e9561a9aaa7eee0a85937045bb2bd
SHA256127cd97194e2de5e84047d30674473b2dc40965c028d2b52cc6c0effd8ff7978
SHA5125b6f00292344b7ac9636d2487df27ca5d90d82fdb76cf56dd60066d59e88b389e0a737ebc87f0ff3ee1dca988d2b69ea6d0990ad0e86d281b5985220cac9ef5e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a