Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02-11-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe
-
Size
721KB
-
MD5
8829b5c60f539fa0aa9c671cbb40dadb
-
SHA1
eebd0c174c4aa318637c8a97b5b2ac7be686a954
-
SHA256
c00df964658bcaa5b56857cf74adfe899a0347979a38b7d0fad46bacd13d06fc
-
SHA512
f6555e96f766d46e624223d12026ca9d33265b2e1b8f278110ea390717f208a46cec33fe21c52fb5156049c398a064e9dcc9ee521e776af1639fb6f9a58c391d
-
SSDEEP
12288:Fc//////rMz86mM/itg5lIQkkjXTz74FeCHVv53lppo:Fc//////rW86stQ9TTf4sW953Xpo
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 7 IoCs
Processes:
resource yara_rule behavioral1/memory/2612-7-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2612-8-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2612-4-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2612-9-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2612-10-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2612-15-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 behavioral1/memory/2612-6-0x0000000000400000-0x00000000004BF000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exedescription pid Process procid_target PID 2768 set thread context of 2612 2768 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 30 PID 2612 set thread context of 2812 2612 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 31 -
Drops file in Program Files directory 1 IoCs
Processes:
8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exedescription ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exeIEXPLORE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89D3E101-996D-11EF-8FB4-EA56C6EC12E8} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436749989" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid Process 2812 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
IEXPLORE.EXEIEXPLORE.EXEpid Process 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exeIEXPLORE.EXEdescription pid Process procid_target PID 2768 wrote to memory of 2612 2768 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2612 2768 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2612 2768 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2612 2768 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2612 2768 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2612 2768 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 30 PID 2612 wrote to memory of 2812 2612 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 31 PID 2612 wrote to memory of 2812 2612 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 31 PID 2612 wrote to memory of 2812 2612 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 31 PID 2612 wrote to memory of 2812 2612 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 31 PID 2612 wrote to memory of 2812 2612 8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe 31 PID 2812 wrote to memory of 2688 2812 IEXPLORE.EXE 32 PID 2812 wrote to memory of 2688 2812 IEXPLORE.EXE 32 PID 2812 wrote to memory of 2688 2812 IEXPLORE.EXE 32 PID 2812 wrote to memory of 2688 2812 IEXPLORE.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8829b5c60f539fa0aa9c671cbb40dadb_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcf60eb75835f144f98e5367d4750e5
SHA1ae8379e72358126731328f64f8e095eb3c9e0afa
SHA25677382f5c623f1ad550ab110aa9e03c6b9a569aef1794c29a854095488dcb9771
SHA5126cc2c796ff2d82e3644075f80c41ce79eba166f0ea09162e01007eaeb5f1bf7b08781441cd5cb69478df1668adaef63c9df64e0c1aacbfa553aeeef6ec27caa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4d5954b01d1ee40888bc42b4895a05
SHA1a0f7c71c3b3667b8a7329d082a7b9067c97cb3d8
SHA2569ef9bc4ec1140e7c7c0681c20c5fc3d0ec3ed141175f311c24590be45cb0381c
SHA5129aa267dd07aafda71cb11864bd6b0b8a8a866acb389b9b6fe59adcf4b75b8d02b07e1b6e2dc3ce1760bbe5d6c54f55604ab6aabaee5c2e653e7458d2ecc6507e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb64d69f4ac22311fc7fa74aa9fa1af
SHA181b425b14cc9ba023d095645cadef21b443198bd
SHA256a243cef15267a24830558263b75c7c055cdefa3e08651f1aa102b03636858d37
SHA5128442ae9a579b6261245df7e1aec14d405dd6eec0714caf5fc937cb972efcf2bacc90716b8f1e15d6d87cdecae7e0a296cbd4ee05683f448e0ab8dca05d8560b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ab2ec2295da86e10b6513575a22955
SHA1654791f056cc3509f4e1ede94024389006107543
SHA256125ac6ad9a6d6e6b40943596e97e694ac624aa9fc61a2c9176c70160122601a1
SHA51204cf5a97da34587dfd9f52a47fdaede7c2bb27449b2f49e7ef1a49b8e7ea3689475b3a3851d21d64ce41a90382d176648a4d7f6bd54977271a4b9bef2f57f66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57687588695789769b92ccfd84087e061
SHA1ae4f4df3bb61ed5c9de5b23c12759206d9721807
SHA256da2adf2e7c9e446cafad5708cd1c3003ced6d31973d6e81d7cb9b0d509d61b10
SHA512aadf3d7330b113608cef05cf25427de2de57c8e74a32f2ffcebf8e171ac75dd44e1f8f0f0c7f86e497c8144bc9f084cb6e1c42885ad6233310bc75e0fc8b3701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973fc8283730e800345655860da51c88
SHA1cb86e1ef54a8ffda835bbdf0b63226bb57fd7de9
SHA256b803643c681fda4f7326fa747fa95afae9ea54c4051951b0e4472bfd97f80704
SHA5127193136219432bcc87269c87e7969c7a1bf0f08a992847ca27e3e28a4354b451ab490974cca53699ab469d1c39f403f064b34dddf77263769a93dae36a5f9d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a7bf0ccd368db4bf6da8e942d3ca91
SHA1f9eeb479d427238d471e11fdcb20156c34098dea
SHA256b376262a636ffa514506adf5a50f4eb67674cf13edcafa4979bb60c1f22a27ac
SHA512136cb1d8dbb5ff6ea45017303f8356bb10b34df454fa26ceb605d4a3a4919d6329b348da93eea96d78e140cfd268832289c0f626badea2c4a5f82db3ca0224f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b126e7a5c2a946c01da97297f6a32ca4
SHA10d501e5319f06103390c02a5836ce299442798fa
SHA256d26efe29b26be6ccd4cd029c4f3c0632c1814ee27200cc32c2667c83559d2db2
SHA512823609327e59ce977c77f392e21d3ae0f7d49a57fe4758910afad601a2f444179faaf2f4ad361c32cd8acf06b5bd89689a5248a1419ed7d7ad17eed488fb4955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f9ac888a45a2ad7735aa8c5e6112fc
SHA168ab8bef0237f26888ea9514947544b201334746
SHA256896a5e11a631a7f59cb9ae6dae1e9591878ef8408d27a17ce1c3a31bb2e7b2fc
SHA5125a9a70f15e7189c1b00f521b31024447368e23a237841d7579b83268ebf8620571359dddd841b9e2259eda30331ef4393830514ba91f61824d6126174a6153bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fda82aae0535922eee86b4e9879e4cf
SHA1b848596eec08c4d45010df93a6592f95abd0d6a6
SHA256c0d056f458185ecd6c11efc56955f06477a866a9bd58368d270f20e9a5de4275
SHA5122bc52c0b1f94917383d3f8f9fc5551959b2a038cae33bf17f4f2ac5564d25f06fd5a169b6b46892aa8a09255bde964601bae187d6193f49341de815571692ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58177f2735ea02ab6f247167c5feffdb9
SHA1967621348f7c6374b07ed436eef962a9350e51bf
SHA256f110996684f6c9cda15c17bf65ec977bb8f3a2ee5bce18c158feeab03df26971
SHA512cdf22e8b1d19f86171900e47b77968a5da37c1abfd878c42efcfa5e10a1a7831efc628220b3fe9277f683fbda70efc4c4777b641e2f17eaf82e46664914c39cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df02c4d4583dbc4cb35cf5e6161bbb58
SHA1812b3a5b4e90a1d5ffa7abf12a1e78ed3307e66f
SHA2568ff4975696e482cf23a821dd71e7458273118ebbe1d137bf2f6db8f0515ec040
SHA512efc1b073e8ad685603bb0e2778c7b7c1b6f65098a38483faa253de1dbdd15ca4b0b42564e6d8e42bf06743a9dfd317c04846e8eb4ed98bd412b7217dd4d746d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f4d1dc4f1ed86589b83adf08250b7f
SHA1d0ae9aba8735694b414b9a8d12473037d357f2d9
SHA256541cb34bcf5f54e62112f62070fc50e2fd43eafb40a61d9ee25ac4b6c36c5893
SHA5123aab4a1eefd523bbc5d07d47c12f25102fdff245775616b109b22db547ca45a4f7e8857e471a079f6659853c37e65c0ba3273587d03f4d37e9a044716df9c30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5cdaaf5acbad7001d08a1b763aceac0
SHA19ac66cc10497b8f41de4576f0e889939ab25beba
SHA25602f7ffaa94db7c06fe9c4f06d55a4f611e467ce165f859ce3c947f9a6a890aaa
SHA512ae07f31c71f4a26dece8d204e7ac94223f7761162b04eaa0231372fcffd9b8cfa4bc7d742b6a145d4410c57b41a589b474e60119c2a9f6d46d8767defea752c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6de2ed5e4b628e807854a907094cb0
SHA1e2f29a3c513b8ea6c2fb17dbcc01c5b71f2cf408
SHA2563e338140de61e2245f66307177622897ed2e32fd509844386c75264cb4d24457
SHA512ef859598e7b15144455c28b117fbb2239c2c4f550097b5f5d203edea6f006b65a06779fffbc05be3a4f1c0867c16fe5bbab32a1a30ac202a8f74f63cba16b307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf4327d6e5a2791a821123409ae9d01
SHA1dc4b32f960db2b85ff407b2773ad740521b3d095
SHA256faa3bc8d402215de10c0340486cade2b155d958870421afcd47e13863a0b8f09
SHA512981c9f4f41d9889194ddf37099d063583e235d88cd6b49c7875dfc49c964ed80bbe2dcebd0e1c82769fc11683e11b5052cefa52ef849f0c224d609659d2aeedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172ac3ab84145ed1940e4fe0c2689361
SHA12c195079fa89f89de2cfd54af42177ca0f9bfc4b
SHA256e0780d4e93339a3b10dfc4e199c2db385421171b7d6b561aace7dcc7655dfef6
SHA51215daa6a6a4f1815f015f9e4780146754ebfc189c5661781bd47f8217f56be2f1816a2858358281f55782e5cd2d61fedaea2da7314654385d12530e7ff17f7c5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b