Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe
-
Size
733KB
-
MD5
e31655fd483beedfc4ca77e3273473b4
-
SHA1
8616ec8cb737c5f56845c63f8002ea92fb353672
-
SHA256
2acc6bafcbc97e42231fbb8ddf2ee73e284799ad9ad2c9b2da90b07d593a1b29
-
SHA512
7af05e3a6dd17fafd6bb8aff6d0fbc9b281dd447aba766cccff95efa868dddd360a64e9456c0dc4d0a27c52039732fca93a43f67f1aa99144336b2b86fd76b83
-
SSDEEP
12288:Nc//////qCHkdPLQ/oV6a1xEUQ4IfV8k9YGhGV3m8VWUY2TD9MAX+hmXhVITCFS:Nc//////JEdDyaDm4dahGV3hko1MAX+z
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 7 IoCs
resource yara_rule behavioral1/memory/2120-4-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2120-6-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2120-7-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2120-8-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2120-9-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2120-13-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/2120-15-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1740 set thread context of 2120 1740 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 31 PID 2120 set thread context of 1704 2120 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~1\2010.txt e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{200CEE21-738D-11EF-A1FD-CAD9DE6C860B} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432585411" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2120 1740 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2120 1740 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2120 1740 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2120 1740 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2120 1740 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2120 1740 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 31 PID 2120 wrote to memory of 1704 2120 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 32 PID 2120 wrote to memory of 1704 2120 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 32 PID 2120 wrote to memory of 1704 2120 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 32 PID 2120 wrote to memory of 1704 2120 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 32 PID 2120 wrote to memory of 1704 2120 e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe 32 PID 1704 wrote to memory of 2196 1704 IEXPLORE.EXE 33 PID 1704 wrote to memory of 2196 1704 IEXPLORE.EXE 33 PID 1704 wrote to memory of 2196 1704 IEXPLORE.EXE 33 PID 1704 wrote to memory of 2196 1704 IEXPLORE.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e31655fd483beedfc4ca77e3273473b4_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5d1460d7d1f058a8217cd0981b4680
SHA1ff1f60884f5b3eef68b49780370a373cfca7ec8a
SHA256310c35945f50d642b63a19511c6bbc369e71ac9480dc052444290cbf94b64c7c
SHA512f615d0a18b394702702e16fc00e8dc98086f04f93c4426fb8b5439ae670701c35576d1e348dd6cf13e1cb0818eeb9beef61f7f02dc2dfa4a0a32664e49544de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a70dab0d8333b921cf41f89ab8e37d4
SHA19182d4162d0e4657b441c8637d56f7d5766f447b
SHA2565a61dd4caf1f991ca7675e50e52e0e5a7b3f1f8ec029e85267ecdc55fd16fb2f
SHA5123d074923f3c22940759f386148b8aa37659e3f3264d8157879b9dd15c8ed9984eb9627f9f25d3fac81a7798f8020fd92a579ccd9267d2c2d09e246c1e3883be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a552dcad08112fabc7c974e358cd6b8c
SHA1d3f81fd6127dce5aed90a6ac79a3249efc587b22
SHA256c43fa72ad981428e477d38ce48a223d00578ee9d681f20359f71df2c9c948a76
SHA512427e98c8d431aca73db5272be97c5ed70f53e7af972316e40cc3fedbb26f11af0dce7e027e30cf3aa69e4fa4bd6d6810ac88d06757163f4fc41b3fad21117954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55544e198081e3923ad5eb9dc19d02eaf
SHA1876093ca2b4fab28ff7229c7e420e5ac254edb27
SHA256dfa037f1b06298943cbb1f868b655465a94be15939958b53391a2d6ef474dc27
SHA51272f46350c9460af7884a31537e44a32228fe32c286adce154660ea0be63f1021e914301a42b47e50bf09eefc82cccbe1da2b517f06cbf46d98270d9fa642cb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616bb32a9791e835e7629e3dae2044fe
SHA1843ffd6dbb3098f078c655ac2151f72d8de8a4c4
SHA256491b6c328badc8a990c6cf9df9f2c0947f41e2a88e355dc2cf8c31811061b09d
SHA512bcff7583a28be94a4491044a23885924fe6a098f50cdd6f0830c9006f5fab26f463f083f84d8baf11791fe0d54091ed249bed6c985bf345ad7e2de1b31c1ab49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3a3f16e9b48e0db20129dfedf4caa0e
SHA15026d6c8d204e9e01443a2c2fd3f3b3ecb73ed34
SHA25629ee69d871b90fe2f6f803ed422306a55ba089586cc889ee84cd9e99ac5a077a
SHA512558d5b423214e263ae1da12e8a0cfb2680630c0340e116c02f5ab3af725202675374bf3cc875646faa154fb2d8545f708b606782ff8ebf1b61b76ac0f9d1f4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be11d2b113bbe1f5eb6efe9ed6c04c7
SHA16804e226be742b7c6bbc52fc44cf243d9e54b31b
SHA2567c578eeb14ad9d70bb18608502cc11602e99e0ccafdfdfc32fd5f2d91161cd8d
SHA512c6d97f9c28d939f947ee380eb6bb32825c0b78c0ba750e5757450bbf4e745b3dca10b7b0bcdbf2a45b166892c93d164459b0af10d77e2b547522d631dd9f4fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56348a3223b8ac0f6beda848bcfbad46a
SHA126ef5b49b8c65443684fb5bb119d6ff86e2edaa6
SHA25610132c94d120ec241f7e1fb5182f1969594021f19b73185a3809c37ac6ef9595
SHA512efce22347540619055f20aedd30242a5c5c53d85da784f85d2af219ebba1ed71d1ab8000c284a5bb51a3ab9cbf5375b01376d8e281458cab73f237f1167776a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dede706a5b5c069369980631548af2d8
SHA14eac0c8f3500cf7a7cdcefaad0b99b6d609e230a
SHA256ae6661b9f019a3165ebbfe9f154fe86dac04d794224bf40b4b7de6f331e4e020
SHA5128f025e3eb6caf92b7737b0abbe9bf6b29d3e98547660642bdcc5f5cb3af709d87d44dca3c6a2ba4207e23dca20e905a86c40f5464bf02a4f94b1e915785b5035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972d75ebc958295f410bcbc7875b91f3
SHA183539232b57c09fc8029cac7ec1be870ea10f581
SHA256ad35f235b2430e4a673b29425e4bdbc7a9aa2de957404de7a7aaf94545a5e9e5
SHA5121a9226a4a17103b6c8ada28ac767b9dc6cb268915468eae41e657efd77da963b0e706506912e362ee2120fa07fb36ccc056ba205ab3e0c0ea8afc5c9cdb29a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e28c81039c4612c00166a3f35175b10
SHA11d14f2a15af935b89aa4d12906701b3536a3d00d
SHA256d27a46a52303919f6ac344a44e240bcc3c8ab0820b9f2433354053be51361e69
SHA512a86c5567ecc9ae65deb62f713514643442f77381f40dc559a25e5160148d7da039ca430d75c0c8befab55781a0519604f344364508cd4b3e3e2038e166eb2991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4823eec416e637d403c3049d539804b
SHA1711df743619cef27466541cd09dcfe51881a68a9
SHA25649cc8ae5ae9001e6846b61a57b377209abc3ae5a9bbcadb1f1bda78cfd57f5f9
SHA5128ab1c7e28622ad0ab5bdc904eac349c5be94769871cbb1fb159e7bd8dbcffb97abaf86c4f73bb867d383c3032c5956be4858d0b61152133abd58d255488068c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b057fdefc611042bc492a1048d8d60
SHA1104943f7df8cabd82e6e17dff95c72b6037e196a
SHA256d2422c49f904483c5418fd55f3225fe3d645d35fef55508b0ee5fb03062a15ec
SHA512c3f635687468a338e66ac8647c48dc5e8ec751ddb9abed6817afff950c87dff38f4e6e8225c26251117e372cd50799dcfe16cb4132b2885d31516f90ade127f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b4dcb70f830f0e3bc18c1dbe150496
SHA1f5749325dc365f70adaa6e48a72626c8349bd0af
SHA2565108966ac664c0337d5ded2265ab343e42b3fcba6c55414328e8939e1ead7b13
SHA512f6d414e00f42b9340913eaf260f72a04db542eb05d9d0466888eb76e73d41ebf1d3011e89e3b8dce59b71d259d48c957166bb859e828d2c1db8454f4312f1f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d2f758d7e19c9dc2309409e96829e4
SHA1607b852f792c370eb72b3b2a6581c2854638a7b6
SHA2564c776b46bb544a3ce116d0a1378f7c584d863d57045f502a02339dba14207db2
SHA512e7b9b1a0c174ba36fa86f467a3901363ac844e5fefbd2e30f2fee2ba4422b99e34ff21a9760c2f8d009d4600d7b35a28b466dc05b86136a9849a07f460f7c3a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f71dd947ecba6a4ef5e1f0050f5a999
SHA14f28d994ae2324da3a7cd29305c8346422bb33c8
SHA256f35184eb5d8d6816244c43de20803b1879eb20f4bd222a67faeaa826c6b86acc
SHA512e93782026bb349ce46cd577029616194c9c793c704f90fbbf7c3d516c1a4389ba723efd7cdcccc0c6b9486e2a9f546033cd06784e93fe5e1e66cb4338a6a5f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fda8fd9de0406f240b386043f45d6e9
SHA11ef1464c7fe857c9c67ac218f040f903f491d2d4
SHA256480386d92068cad28b950e41791f500a29bdbe442a781447274080ac862fc991
SHA512cb418baf296ba40b3961d8bf050bd839d5b5e6d73486fd8a3c3348b6c08ea91588e24f413d2fc452f55f84b929222a0f1dcc1467383c9de94aca67850af4744e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dfebad5076b2bc9d3f7a08b3791a91e
SHA1d87420d0ad871b8c5d97f3790912f3e21d364eb5
SHA2563febbb13417878219e191f302f59f6025db2ecff7211f4230bb3d9d2a9ff311e
SHA5121e58edda9583bb7af4ddf63f088a6bd3e39bcc5e91813600b5755881ddc001e00ee790c3ea489320d3faf8f7e82c3fd497ca3ea2ee62be581379ed38843171bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0dd13a94b17e6f7c25a081cb5543a9
SHA1c86ff34c1bca4e5902b2f54a56c25751eea5d750
SHA256b3d69edbdb8742b175b0fcc0d7494fbab07fd28761a89610be1e5d19d5d3333f
SHA5122e9520ffe7b3a53689f82949b7c2297c93aadf693f535058a1cc19a86f2bace772e01f475a2f4b2d3ec3c17750a04a713e0132342acf684dbf0ce0d6073743fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b