Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe
-
Size
735KB
-
MD5
e68f3efd5ebcbc21d8d73cd9d5358e85
-
SHA1
193c5a0973ca48c30348144bbe8462f6cccdc17b
-
SHA256
9edec74491e7e7be8b39853c34cac3fb84e247bcac3ce4b7ebefc75087407bfd
-
SHA512
08fbb6dca35670bef23497eb86aaf659c3f5d30dd5835ef39ce9ce266c44cac5d231974034d2a5d7e3a84fb455b330b5f95f065ad21803b6a16394b58048fb9c
-
SSDEEP
12288:uhc//////HkPYyIJujiIH13mcwtbkElgCTED2W9isRyYYxO3HQ0HTxOVc2qH0XZP:Uc//////hIiq2Xtb3PYgs53BHFO62pXZ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 3 IoCs
resource yara_rule behavioral1/memory/1932-6-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral1/memory/1932-5-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 behavioral1/memory/1932-8-0x0000000000400000-0x00000000004BD000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1984 set thread context of 1932 1984 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 31 PID 1932 set thread context of 2532 1932 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 32 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2010.txt e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432728793" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6D4A3F1-74DA-11EF-9AA4-4E0B11BE40FD} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1932 1984 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1932 1984 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1932 1984 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1932 1984 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1932 1984 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 31 PID 1984 wrote to memory of 1932 1984 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2532 1932 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2532 1932 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2532 1932 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2532 1932 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2532 1932 e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe 32 PID 2532 wrote to memory of 2648 2532 IEXPLORE.EXE 33 PID 2532 wrote to memory of 2648 2532 IEXPLORE.EXE 33 PID 2532 wrote to memory of 2648 2532 IEXPLORE.EXE 33 PID 2532 wrote to memory of 2648 2532 IEXPLORE.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e68f3efd5ebcbc21d8d73cd9d5358e85_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3881304abbed6ca09311fc0303ff21f
SHA193ee97a3af695cfb78bdcdbf27b3c9b34d904f04
SHA25650839acce9990d0d3763beeb4ebed3434a0a917d8e227d104e5a8602c8b23d0b
SHA512161cb810ccb83cb50e9182688ec32b105e2758d14e9b9fa8782500f8934da8e0d78d9a5f693ad338ee5be2f8b1601c92b0f0a9f73833cddc24ba7474879ec9f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b937dc4fb43d6c58106ce8d67479d6
SHA1452e65fdb710f91cdd6e15c6a1cc666537a16b26
SHA256f22f83adf7d85bad27ad3905088a124d7fb211909def702e515f196d53ae7d8b
SHA512c6ff920975fe9db3be811e839cfce631ea4bd143317c3a13532f6adff156b60e74c22e822d003f24ed762f8b8802d3bd79f02ec66a23989e7b5ae0212aa423bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a1c061e96e866883f7b08920f95b40
SHA1813f471c81a0e54433abc5f2c9834d1f0a835708
SHA25642ecf73015f2c7ad836ad95a2b830b13f8bdc55c95be2c781368fd1330918070
SHA5122b37b4dfa528bebad8ce2258466630b1bdee4870453686aad9b35272d90d758a0d6c99a9dd86014ea17c7d2194ddeed94f0d9d9a9e7a1ac960cda3b81aa6f0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59206915753c15e39bd540493a403ba33
SHA17c28b4d1771e7ca80ab59885451f0296271543eb
SHA2563a366cd2c8502adc25e964209815b6078a4b9c976c227d1f91e1896e4763f923
SHA5128248052e2f2d0996d234d0d7b3faef206097a67951c8ec1e375ecd3a9035107e4907ecab2cb0f314da9d5d010c6fb46bc324fc1fc705a1238ff197d7b7c12342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e228e2971b8b2fbecaa5788873eabeb0
SHA1b5a736be98dca9cbd567ae16645c3b199069dc1b
SHA256e4567f21793d261cd7cdea43a27969b317d1eff1fea635dcd48fcdb8af4c54fa
SHA512bd4d8a9032fca5ae9a0576a632ed01257adcbc1beff9af715caf94dc98007a49a1c4928110c458bc9f77bf660a1ab24405b6b6724fe75bf55909f20594c17494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36e4d430817fa9f09e7d532a22d0967
SHA1d5a3bd0feed169d3b4037f7bc2b66d00c12046fe
SHA2560f8112aa92a40e9db1d28ac28dad0745243db9edba99401e6194ee7ab45edb55
SHA512cefed679f0c64ec3a3d420a2b787627beb6be720071e73b58de18710d64ef5552ce0533aa70594506219fe090aabaf32af77af4f4639b86bc55246c5c2a2613a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525d0853fe861ca711bdf109c954e8e29
SHA18441641bf8cf3d7a5c1978279cb09773e122cbb3
SHA256b8c84b5319a2a64aedcde4611853366da9508fbcd71149a2e3962defc3ea5075
SHA512100ab108a39cbd42c886fc3bd5acf10059475f8f335d4d2ccc53c4eb70618501314a30dfa28b0b282f2a28a13e8fa0c0510f2c7a7e110e71c854d293cc9cddde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b30c010bb98b64e4e5fb34c9da8c90a
SHA1da74ab60f95765699936d1be9868745ef35ba468
SHA25651f20da3841fbb60cbb58d73a024ed89ee02ef665f2ff5a33d812ea56457c79e
SHA5124fa7e766f7da69647aa9d46ddf1460177978de08fbe8dd2cfe7e32905eb539ce6a052ce46cd5a246114b2505c23c6343226ed30ab6cf5f851185766bb811d8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5d8fb5c41114496d621c44fa3a8426
SHA19083154807b94e47f7031a91b216d0ba42904256
SHA256df8d8cbbc5bbfa05f097588662a0c56ddab156442b7ee5306e3d944fb545a767
SHA512075d040f0d932d1382e316af03c6335edb8590cb98eeb7055f64b2eead902edd4b1b28d3690417a84a868170ad07df361d4a30d0203ade7fa3ac0b4ea404a3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0365e5680641e9a58db17a459eb478
SHA1641a7951e312797ee20763521639eed1a84fad3f
SHA25670ae9a9e094393a2b78d0651732d5acd3ab739e0fb2910f879f48deede59ea90
SHA51266c9bbaa7bf35fc59fd74e81511c3955af9bdddd3a89d5897d15b22ee94ff426fc436b9effed9694913a5b4b1fcfd8da018d1ae2a28e5f9d2c1de15750ef5637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59292fce72ec253768558d81f15603ccd
SHA1e9995f0151c718a4751c8c226cc5e3d420612b74
SHA25622ad7e3da6f2dd792af0970d39a55abc7cac9c1a934dda9fd5e23f4668986455
SHA51235219db926a1e2d6711cd9bac74a41b30ee0ac5fae85941775b984a929a622650a95a9e832bec8c624457d804a6feb15368d63d26c987440fcf67fed1ec52840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63ab6d3a3ce129bb675ed521bdcc5ce
SHA18b05ec95476234492636b36923ac85b3489867d0
SHA256df162845da6505b06d16732285804782d0a7219fdfaf4781e573e3d6c6b6caf1
SHA5123edb80fa495f242f02a8757aa9d5d7680958fdb45ca6b05249420574bd91b4dcc727fa908e17754617b058bbd1cc8dda03ccb0e96119db48b360f1d567d9b74f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50465058908d4df232e1c2c8cbc86142a
SHA17308b136348c646174ffdc6eda4a4bd7a8581e3e
SHA25602fb8026dbbed1215ee944ef30b6b5029123f703ed5b70a36d774398eaedb276
SHA5127a3dae6072e90ccb25844ed4836e294e72d4bcc36842a7d4325eee76b77cee3d04d12baba37456a07acd14c2a7eaf3a2c095b778c37f84a9e29e774d7126adb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f79b90c2824191d8bfaa2b535d809b3
SHA10d1a9d1a0d4e02ec50135ef4b180dbad240e8691
SHA256378e5205b2d7fb8456f42785f87ad3ab8cd7a6ca814b5a945399f4d38d4304dd
SHA512a7af1b2ddc4ab5fbd8a0a82e1ba76da928dda25ab9733838f443957f4f680b5bba975ef9dfe3a3d499c83c5ac87ec22291348d07ebd48f7f3f9fec7c8e47cbe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5817c597be29f7d6c08d1f69558f2202d
SHA1bbda36b1cd6eb34061d9731e2c98adc500645595
SHA25640520060cfe30e7c48a498bcb5882478d36ba89ca86b698d4bb30f6f1b3871c4
SHA512cbcd1567839cb5e35cc420035bfa417e54b19b61d2bbc63b7add8793e22fa9465af62c52166ed079ddebcbf3ea1dfeeb021f780041b4f241e3b2b784130f52f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335d8078a80c2953380a6ae827f2e5cd
SHA166efe07e528403c541cc7cf412895bca37235ff0
SHA256318bb2ab1829fa11489f6d3c3084bb95248ecebbc6428be4bba9895bc9ea2f2e
SHA512089e7f9eff9e03a11c0460956046e6dbeb301aa0d93330b80fd822f430104d82b5ef5b8ffd73bd74dc8c49a6a4068d9f0698f4c5264ea86e9741b7e018e48f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e7d518661a7b87e7d0267f62f50126
SHA148f2205aa1efe0c98ddfb671b3a0177a158c8447
SHA256d5ab90a56c95197ecd538417a2c5bb33c1792fa3153c832a89b4c567d69c49e3
SHA512e3d388a089361d7d938db2451cf82d26f938c86fd636bddb361af6173927deb09c0ecd8090c5fb187434a22224ce81f87536f3e95aadaa7f529f5e3cab9615c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513dead82ae1418a40405ea5cbe7064b4
SHA14662f96f698f3e66a3feeee50e878f07d06d9f4d
SHA25688dfb42a7d71f658e6b19505d81f445d7fbf3eeaf337fc700fd8ea5c24ed16f5
SHA5128f4e1931ad548f7fcf49df21d63dd8a331970bd81c8d97349fafb57c8df266262284f6dd31cb05c996a7cd572530b504fdc7186275462c3b65f5f452eddf9f87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35274c049bfc552782b94308e0d5d0e
SHA180eda58039191c8dab431de7a00c20ec1484cda5
SHA2562b77839cc3a11c1d86fb56aedaafa7bd06e979275825662cf8b6aba2225141b4
SHA512ca7fc5739bcfd3b9237e853d775e5b850fef4ce8c097f0fd85c7b887f6b2f48c6de257c3a639986909d8f2741eea783bbba8d59320f051884ed0fe9bce1e02ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b