Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe
-
Size
636KB
-
MD5
094c102cfe009d32dcc6472fbdeb13fc
-
SHA1
ead4ce61a16655c4901cbda4e3577e7c46c78d26
-
SHA256
9f39836ad42f321fcfdeec74f2f5215dd1ff49f1757a005cfdc291431d71b990
-
SHA512
a2083fab892553d869a524251c7a13478edf3eaa87175999bd8a4eab2fa49daa9c89521c305732aba8c287be92d05286c2bbe95094bbad852c3325c02c0e4a6a
-
SSDEEP
12288:eyjSZuoqrTb/+PCLraJQFUF3Z4mxx4DqVTVOCu:y4BrnWPC/aGmQmXfVTzu
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2496-87-0x0000000000400000-0x000000000050F000-memory.dmp modiloader_stage2 behavioral1/memory/2496-91-0x0000000000400000-0x000000000050F000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
Processes:
5.exepid process 2496 5.exe -
Loads dropped DLL 2 IoCs
Processes:
094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exepid process 2968 094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe 2968 094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
Processes:
5.exedescription ioc process File created C:\Windows\SysWOW64\FieleWay.txt 5.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5.exedescription pid process target process PID 2496 set thread context of 2332 2496 5.exe IEXPLORE.EXE -
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425075370" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{72B582F1-2F3F-11EF-9591-6A83D32C515E} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2332 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid process 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe5.exeIEXPLORE.EXEdescription pid process target process PID 2968 wrote to memory of 2496 2968 094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe 5.exe PID 2968 wrote to memory of 2496 2968 094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe 5.exe PID 2968 wrote to memory of 2496 2968 094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe 5.exe PID 2968 wrote to memory of 2496 2968 094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe 5.exe PID 2496 wrote to memory of 2332 2496 5.exe IEXPLORE.EXE PID 2496 wrote to memory of 2332 2496 5.exe IEXPLORE.EXE PID 2496 wrote to memory of 2332 2496 5.exe IEXPLORE.EXE PID 2496 wrote to memory of 2332 2496 5.exe IEXPLORE.EXE PID 2496 wrote to memory of 2332 2496 5.exe IEXPLORE.EXE PID 2332 wrote to memory of 2772 2332 IEXPLORE.EXE IEXPLORE.EXE PID 2332 wrote to memory of 2772 2332 IEXPLORE.EXE IEXPLORE.EXE PID 2332 wrote to memory of 2772 2332 IEXPLORE.EXE IEXPLORE.EXE PID 2332 wrote to memory of 2772 2332 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\094c102cfe009d32dcc6472fbdeb13fc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766a82d2e519913081b92d86acb41f0a
SHA183a16dd852d5fd9a8db8a13f6c826bf5fa9b668e
SHA25627c714ea702d7575c0629c9a9d4bfa747b9f553888f08e1ca3bb17a8345d9d12
SHA51274f61eebc82368459c68dd0d564ba967bd7f911ab9d40a07a7c97e85c499c616e4c920d2745d9e56fd29115554e5fff6b86ccca13e0700daad19aadb27ed5f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a825ada9c7e6b331545f10ea8e27e3a
SHA1e836a6bf9961f03d4dbab63f1c0905802d3c8a25
SHA256ba91c5c41aa69be491eb4b9bcefa5fb201001ce5a609313da08efa25b03d65c5
SHA51269efe9211bdb72dc6adf27cf5fba5ca9a5885d7333e0162e118e6c2a521e7eaa881f3af642911a37a619c64ba59eb8f18f0043f0c68bcc3713fea4f3e7c9e692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5776d7bf71a38a8a117d4bde8762ee89c
SHA1e7a7b101edc8d4c6cb711e83d5ec7f1f0d4dcb06
SHA25695eadad044d0de969528c8df80ecf842d18724c34e6eece10fb5cfdc54f823b7
SHA5122356f30d4816d828977c3dc2dc3143acf1935b13e79baa99e455a1a917edfb9a6ee22a6c440071a015be5496f6fb57b3dd2f335be14b92144b9befd685d3c3ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8d0ea5d128c7d374cf2a1bf0b452f6
SHA182f2f103b65bb7de9fbfa6098fac918d54804534
SHA25649ca71d46502229631c45f395123f1aa4582fd443c4ccf8c8737c00d3a128fe1
SHA5129dc9100e03bc0772fe0f0fbac633771143f06cb4c085438a6f36fb29e97e2e948b0c6d2d1c86e21e8cfafba9caf75d57bbdd3c2c8f1917d62b6e02bafe316589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb29ab2f6b735de2419e8fa9c821004b
SHA1ce144315b196225e8d352d65ceba7fe758e6ec76
SHA2567be96aec4bebe4fecc930b3a9b859a528c3e1397d9ea936e2e3efb8e0bb0613b
SHA5121ac146892019c5a9294095ad1683c50fb672a2b0b0533edbbc214d23a6e2b424ab47ad2e896b48d0d59dde92ff04691f51e9bce900bcfbcd3f7d8a770a55769b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab9ad3d128040f5c27c32f28e0fade3f
SHA11c47a23881a300723bd9a3bfc13e9340fbb5a8c6
SHA256b89ba324fe2a5c0394c98564b44b71c10db6a33ae14208ff06f1d1b7d6f4bd1a
SHA512128119b10a4da7aeebe0da08b0dedc66592950535fa4c3ece3c5a003d269c0c2993692547d613d70a5f45d55a5cc9341d50ee6c4612392c0eeab9469f7f839cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c0c213a01b7d9c0338213154d5c089
SHA1ea9dd446a0e8c481fd588328a39eaad3caeafac0
SHA25654d17f35b9532328bbcf900e8c7f0e89ed520f73253c4738cf04e04c7939ce18
SHA512ae955b14d6355d63b60a9d296672c0678d0f76f5b4599c35b266eff9cbb50035fb4c78e77a0bae5f0b97da6b8839262060d016de8081b6b8bb6f13b0931a64cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e737f36d895bb1cab760d8efaaa7a271
SHA1a8b7786101929b5c06edfd3f151399781492929b
SHA256cea01fb06ae614843c096d8ff345b0e44b0bd99960ab6ad4553231f6392f6d8d
SHA512e1bd096f458bcb524f9b6d9be9b463cba685d87758abe1a2fd42eb4b79a708021d7c530582a82f38c5a53c0f44d79e764915011e3c68a7ccd88e315a4b19291a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a9af7d94bebe826f3049a7b8a27b72a
SHA1fa9aaaad9a20baaa98e2892c39cc012757682445
SHA256e177a3b702fe14e82d2efec3ae2181e33aeec47d56f3cca407a496bf01b5e487
SHA5120f9a68d179ab84ab6b140a1a52f728ddae9ebb8ba5c71590de61f20d77c0fd15dfd7a2fd563f6dd4554e6b99ab8a7d54f13b6cd1c9121a9cd9e142cdd5648498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db9672e2b05b95a94971daaccf309f8
SHA18c4111996496ebe6b34d9c8a77d269983ad20bbc
SHA256d09ce8c63b5826dd776beb14c7906f5a894844b6f400ad0f82caa2bca54be219
SHA512feb577e114bbdba12c5d3e718401daaa6980e8a39df6de9a33c09acb01344a49f98ea6c0e7276e94245a968518f9b005eed04444042571b1e7119f969d06407f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e255ab109727d2abcfb3794a602caec9
SHA1e41e7d6e35482046026ad13478b3497b13c9f669
SHA25646cd232a296745ea325d637b97437a392a03114df294e2b11481e2fb78000780
SHA512498b4ac036799d04bad6acfa2500f2ca5195b55192ea2b38bb1329173131a171f04fa7b9dd69ce157da5c90091e408f4b8690c2b65e05544b24becbc32ce7244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1c8c5780d64aef981071abf188f8f3
SHA1c863d8546a5329944a5bbf2fb295774c1f4deee8
SHA2561e100e7c6082adcefd54bbe544ee58c8ff121df64d66837c88d1d32951ca5c13
SHA512197c945c2c37b28e2b17cd023d7692521c6091d3e420f76c7dfcdf01a9db0bc172eb9d99801d5bcddf4bac5ddd5c1190df0f2c57ad8d87f6dbe8818ca7db422d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5732c035b7f2d1b32bf7fa9df569e0fe2
SHA1c2e540b7682e83a92afbfc7895a9f06aa22af183
SHA256022bf0c9c2ed5f3099ae8a6511ed8d2c4d4e7a7ca7f7c1d59f06ecc49ad24513
SHA5128a30538f719dc865e00fbaba22736611f36bea45ffe6fffe5f65b1c975ec8706a9322eea1d0d8ddeda393913611a2a1a56907f2ad687b899d7d317305591123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0b56413a45e5232c5ad7460b6f9897
SHA1e06843936d440570689fa9125ee536a916fcc49f
SHA2563639a75d74b54b429b4ed04edbf036089efd3bb87aa96a62be0475f26d625cfb
SHA512692081222ce19dcf92bf06f6e709ed1e000d4da227f6d2da2c8d527c9d3f9656374e61e3a82ce81cf05a823cfcf1358d71f3faca12f838b15482c31f2692c622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b17c488d8cf6fed817cb56fb62c3183
SHA10b7bcef9cb8cc821b8ec24240dbd4505d73feaaa
SHA25602569328c1af58b15715ab27d406098d84acae071f3a9749fc14ec9557a68f2e
SHA51236ef4f941676846f6251d67d047905308e85c8bd41d53ffbe921880e694673f1fbbfabffbd3fc3b804d61c24619ceee5a6d6b3011d208a7827f9975b120c9ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab770b47fa7451824f3fe7b66898a6b
SHA1dbbe7624551c1adf197a20eb57aa51a90b98d6e8
SHA256149a5d896899d54894d0c1716c08a3431ef0a99936f52b214ef11907cec95ba0
SHA512b2be22dd277d24187cd8d70ff76d8de8ca8b3bbe20bef289186c5928285c1e81a3bb1a5d177dbe724ff3eaacbe6276bb2c2c8996b3db0e9d9d3159d139562a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403bd257fd220884255384568418cd29
SHA120f92c2e49739f36b36a127670149c850df1c54f
SHA256d2b9d931423833f8cc1f9db0f8d5266857ff22844770f918bd445e2a4d3309f3
SHA512ce70f4efeaedab5ce2bcfeb28b616dae00f53d735cbeaaef4d08f03be2b09ab4108dce7fe01665fc8a1b7921a830f846c909df9d78f0d8e6c4dc9975057dde68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de03c7f16c052a124727b3198506fc67
SHA189e8f47dc55510f42652f266767eeffdf1ec3061
SHA256f53fda6ac1639a7a455bb43f03414bfd6ed4561c81470f3698acca11f32dcce8
SHA5121bc54cb6809c576f3bf18ed89ac42d0c91363e55c1f473f96fa9edce2cab7dc0d58a51351d7531fbcb76c2e52f0e676ac382fc8f48fea9b499a7edf63b0c7725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59797289c100cc68685cb8b05898aafa4
SHA1a6c745c63e106e7ca05e48b88d20b48c9d58555f
SHA256929e33d8c6b30b293f1975c824c271fd4c388ebd9d43a1f810ccbdf029696d3d
SHA512907bd9e229be71ab8f153cd3f37f6eb4fbd61d5e9d90675c7998ab5281be84cc2677c770d9c597b714d6a7ab56e5831a80733b43b9b7a7a142653f3fdb1063de
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
266KB
MD51cc325a1101ef64554b026a2f9ef24c0
SHA19ad930fb4e5641c9147af575c2ac8bd0496ab87c
SHA256848500536d90cae3b795a1924f08816bc431514e2922a9bc2c3a9373645b2102
SHA512448c232ed493500ccdc9e66a16357c4502ce76fce51f4ff8f00baf07bd897908aacdb0fe1ffdbeff73eb4e041e98d5aa57cacc073fff9c927718deb934e315d3