Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe
-
Size
273KB
-
MD5
f4efa8b3bc69d5df7025bd4beaf4eea1
-
SHA1
7b6fa6886de9ae3456f27e7db3671600ee5680d9
-
SHA256
c58fdc229e04e7a0026172635cf7f1259ed5a9f058cd9e83611a37cfe1f31d5e
-
SHA512
257328e741817a3368a1bd980810953a28c9d0f2e9728816647a0b705698eac14ec1e6784e3430cae80369836a1348a24413edf8d4f0b22e0adf1c785e4a3adf
-
SSDEEP
6144:EEozu3k6Y3Gmi0NybDEV8X1jpKRoR7OAdc/moPp5Y9aDC1pqffrKnK:EEuu3kZ3Gmi0NybDf1oawAymodC1pqfv
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/1620-23-0x0000000000400000-0x0000000000509000-memory.dmp modiloader_stage2 -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\I: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\J: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\L: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\M: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\T: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\Y: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\G: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\Z: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\S: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\U: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\X: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\P: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\K: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\O: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\Q: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\R: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\A: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\E: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\N: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\V: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\W: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened (read-only) \??\B: f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\AutoRun.inf f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe File opened for modification F:\AutoRun.inf f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1620 set thread context of 2652 1620 f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\paramstr.txt f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440444255" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB5949F1-BB06-11EF-916E-DECC44E0FF92} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2652 1620 f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2652 1620 f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2652 1620 f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2652 1620 f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe 30 PID 1620 wrote to memory of 2652 1620 f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe 30 PID 2652 wrote to memory of 2752 2652 IEXPLORE.EXE 31 PID 2652 wrote to memory of 2752 2652 IEXPLORE.EXE 31 PID 2652 wrote to memory of 2752 2652 IEXPLORE.EXE 31 PID 2652 wrote to memory of 2752 2652 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4efa8b3bc69d5df7025bd4beaf4eea1_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD5ec717a148c0c1573ad6a89a66095c8a0
SHA12677e5c816b191a5941be928f014ec201e7de18f
SHA256d9c1af73c937692718c241a501d6213fac7803ab2f8504a845a540baf047c218
SHA5121a925338fbdbb79bb8e38064b092d5a2dbd47095751ac9e88490f255db050598f209aa97da0d8a9984e173059cb13019d2f187d0efc9777afc6fcf82fb763797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a22e7383fe7b1c9b394d428516a572b
SHA15dc6766668e3ec73a87f63b79fb18e1b33e8138c
SHA2568408e095518d88a48559f3b4dae92cc8f3149b0985469b9c6f8f89b6722e884f
SHA5125dc5b8407656345885943f403beea37cedf2243499b27161b283a20f299426ab7b52aa3c8a975eab91ef823a60530afdbec639aa45cd498db6e8263e7cee275d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad7b359b90964f2e2e53a0a75d5df0bf
SHA1b7de772c6611b0d1ac5967e785dce6197ef0c239
SHA25680e4f4cdb6457596d9fb9ccf4ee573a8658922a7763fad9368665512340373cd
SHA5121c5b26008b1b350456f2a02fa55c348b0b2d8719e2d51b6b951efe9751b3cc2160117c30e89dfee55426c810285850fe0a4d8a81658b5d94655085b5c5aca070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a54d068d66981e56954f859c33627a6
SHA1d9c88320d2bd61df28f7e6d25f39cb0805c682af
SHA2565db7490d952f5ba445a539c60dbd4c9c8b4a74f78763046edcadb0d0cff6d235
SHA512da11c96ed42c40090af1a7acfca109ae1bc5b7bfdf433226c99671819fb1462e437f0050a180a19f45ffb8c144a325472df162f75e26a42789fdc45dbb27a1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fdd751e59e0b03b115699e6cba0614b
SHA1fa331b871ffba3d4fe4aae66f37104d79502bc9d
SHA256c49c02a6b46ec2bd16cc836bc708a22a2cb11479557662fe043eccb4c50b27c8
SHA512e82012603cc54fbbadbccdc20da93ff275b6e4a3ab074beee668ef98ea5ed1a6620e2463fe757cb1218b6ed0b5be40394d66ffa2379a6a0326d9e11e21b1dc23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0feb0e4c8bae7b31c481f2f906baf0
SHA1112c953d123b0de7a3d70f82f2a50abdd8dc02a3
SHA256d12bf7d53deebc084f1310a544f1113c6305c789fa08b65540e510b353cca0ca
SHA512efc7ba848bf050f18271582ebcf39200d8a7eebfd5995a050f0f2aa84067d91160c1254a1b57f1cdb81c150071d622e89e6e78e21963f83026f84f8afefb66db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e520d4ae782dcf23bb443ebe4620bcb3
SHA136fafd8150ad6d70b1c98174ac581139b799e7b3
SHA256040a41fd8669ae74bb9e548786338bb03b8c83a2824bf1934ab33df15841f232
SHA5129fb5a90601976d4196e9fc4c27519c0ca503febaa7d655258fd32b6699a1b1006522548c0a6fcf31689962e485abec9e10aad52ea9e9f4579f73220fdd0cee4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583c325bcb13917410ce1edb95b1ce2bb
SHA1a313536244f2dc766460d2b2952af4e83b75bc04
SHA25618f6207f4e8e5403e120d2a74f22d3c4f7e565bc2ed0114d99a93225a7372712
SHA5124f94c48aab0cf16b5b3e68a806158a2e72642c2668e2cf3ea91398b86b29ee87fd85f2ae9e914b998800bbbcbe18097d25d21527d07102c900bde1a4c1ff9f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c660e4d209cb3a5746a26560556e2e
SHA118711c75be6605d83da405bffb1eab32b53a2996
SHA256ccf0fd9b709e1c5e6effa541f7a21632b87a4738ce8ed0f45ad8d0e481debb5d
SHA512fffd8efe7215c6360a6a20a761b3f5e6c40385401f4df600804209415918dcbc808e6afbe787b1c4a1798f511f9a06e318fae856e6af31b2318453615e5d3dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f8487eab1f2688e70702723bd57ce4
SHA1da9d3776a1616293a48d015bb7c75c90c8cf65f7
SHA2564b39b618fc258541d140a3065cd9633d7c010c8eaa1305c2d125ade81a3b4163
SHA51210e1bf035332174797282288f5740019a662c96f1dc8ee6574603b055e00dea937cd87229365c126efa051283b02a3a5d2cc4bdb1186ea6169dd568405eeae78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2543b7a347ab0b61b730387a7f4c3d
SHA1fe377660f140b8be2f56055a95701acdc21d65a0
SHA256410172cb753bcc9b6d5c1a8098140fb772b422b83deb579cee0f111b2f5b172c
SHA512475329937059692da65e94721ba1001db0e806ea447a896064fa62d8bc8d419c745b49d55ef279e73e97a2d520e9baad8e309340c199ef037215dcb82db9da47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae2e62f5dbe1198f98f8e81b35f6cf36
SHA102e3a5f26748b09cba4959876489ceb424ae5f45
SHA25644bd4e351fe78449d42e5a5cd1acf946f2bf809fdb8c8cf22b40865c27fc6c4f
SHA5121b2ee6456a353ae2a6565acf1a97c12c55b1f51a774cada8a4a32f54a796f6a2967c844a944c12fa5568cf25a57ab84f55e54ba84ff32a19727f4c573036e5c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581fced950b5fc9094a1fbfa396599d9d
SHA114a6b3ee79501640ac52a73487a73d1c099086fe
SHA2568bd68a97297b2e0b899cfd897a47deb486fb359f41b96428b4c5472f0aa2281b
SHA512d3b41fd75681a776d313e8f82c9f65029c0a90a16a4df2cc49b3b995c85574a2f0c8c8478efc0cc59b532ac2fa52f1d4d10f259cbe391382fa3fa02ffaaf6500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6000fd1e933fc480a0b15a6cab76a02
SHA1fe26019c68a8cedf9bb7d3ac8fb62ceedcfbd3a0
SHA256ed71dd01aff5f595440f0f7b964840ed85a0f842a202a3f7c715b50177a4188b
SHA512c208f9910908f44c66da3a10dbe1ab0c8d4389883de5a0ef614914e2880eb8db688968707f1a876c9baab88ea697e57230878d7f1ce3f372bda091c16bf3d7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b8fbaca4363cb6709bf8a524514b4f9
SHA1003d898b316ad712ea3093c390a495d9868bb29a
SHA2564c520d8bb2a185ce525f5a914b6ba4bffddfea5840fb02da517bc2f2b7aa94d5
SHA51204e1e418165ba2bdbcf17f33041ff4ab0c4b4f7716254170c49946916e200fc7b9035ba78de93616582442f606382fcfc6d4cf47702179bc1a3629c93613d5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5be91564571a7c3594cffcabd4396c
SHA1f5b648bf2e28960dfcba3e632390f55c55a4ec79
SHA256ca423ac4047493603a40d165decf2ef72c6d15a1e8ddf1f7fbc6c1f992e03264
SHA512221b6634ea3da3d2bc39b8d90c86d3326815177cb6946b12d25009d7c49c879bd4303f1c472fe2ef7d108470bf85f48fca7e560f66ab67eb5c24007aedd34969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b9acdd2da45abc9d93f4116d128372
SHA148d28c1399783a04bd40149f5e9592766c1deb87
SHA256f069726f96841e6b1516787e377f96d67e502c745b5a26c39cafb7934f5ac89f
SHA5120b0507813af07b699ca4f79499104d485c58b8c7541abd278d163cca9e41038bfa899e584fdb93ddee4a17c05e4b70d9ad518f15800a4357b724a3ae0bb89c06
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b