Analysis
-
max time kernel
119s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
26f56d18b43dcd74165064f7dddfe570_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26f56d18b43dcd74165064f7dddfe570_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
26f56d18b43dcd74165064f7dddfe570_JaffaCakes118.html
-
Size
119KB
-
MD5
26f56d18b43dcd74165064f7dddfe570
-
SHA1
9a14b99e8ece25c48db9b424de4f0a5a619db203
-
SHA256
d5cea2ae86b939b35dc34ad24ccd4b5ede210195eaa3c0c932ac9d76a24e90c9
-
SHA512
a6816455f859c1580a3d5873139950fd58791ee842b77274c42bb93a447aaeada9e854d2c1edc049d397fe78a2ab3179fd6ae70e9a9a29322d0c3bbbc19e7f8a
-
SSDEEP
1536:QCZrKWzqaEx79OodfhMoW+6ScMBzL/kh2gVyqXGdKgOFnMP58lhw:drA9OodfhMoW+9cMBzLchDVyqXGV8ly
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD16F2C1-3AE1-11EF-A533-F296DB73ED53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f03ba77b1ce266014091e12e354c5c29dbf47be0651f811302dd6feb73105d52000000000e8000000002000020000000630cd9d8eeb6fe36056e703053dbf69bec3399cb6afdaf670289b5760551324a90000000690941b56a699aad28dc11d3a3b25d36ff8d92af423dfa2a2d0036a4d003b94978ab62b810f5ad131e6ac402f6a1cd88658688469766300ffc1f81036ac7773eff18e34e3ab4d8ade0d906f8cbd4175ed91f383e0a953c84f4084f71395c47b1c9ad5a53dbe990a41f4a476b1e3a16603fd3f8926ad010d9eed80d5fb5b2de37e9a4d42918e04cc01cc8e6b8cdacd26740000000e4469f9efebb52975cce7b0fe83a24d88a7bf24a55070a798e088d48852bd24a5669e3c2d94a66333ae6322da57a49c1330609dff1cdf177b7f83a7e66fb87be iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426354591" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a9aa6de77cab3662d7e05cf16db3e36d8b0a22b2ab6e6889e3bdbd33f2792e74000000000e8000000002000020000000b3311e0d18c242a51bdad20ce47aa9d49143b79f38c282c05c1fcf30b501ee982000000018e8782cd846e603e96b8b23e133eae2e7f7771d3fb51538ad9bcd681bf2342340000000ad870705bee41f75df1de67e600fa81942e23b00a833a57e954cd8ce1bed154f4a430d7844edd5adc603b8c3556d38745409c24502132ef1e93968f9006e4a66 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0cd9db4eeceda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1188 iexplore.exe 1188 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2592 1188 iexplore.exe 30 PID 1188 wrote to memory of 2592 1188 iexplore.exe 30 PID 1188 wrote to memory of 2592 1188 iexplore.exe 30 PID 1188 wrote to memory of 2592 1188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\26f56d18b43dcd74165064f7dddfe570_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45dc8dab0484ba373e5b2baa9b6b043
SHA1f82a854a06371b48534a641fbc01e4fa8dd27493
SHA256fb20daf6f9bc4277be770d6776ddf7a3f9c236d659a312a156f9e63847e2f803
SHA51202ee514082169e5fc3a8091b9fcad47875595d24d1294b8cf147c5aa58b9d715b3cf9b427d5a26a6b7e1eb11386b1f37961fe9960c749641a98384ae19ade386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73d8dc3ed50aeaf9e54d2d357c618e9
SHA1a0ccd19f74da1658345b646c16569f58a27d0403
SHA256221739c52d9d279f498b4847c959ea10808203d6c0a46f9c58e1323e006abd47
SHA512e840f03a97ae58a57007ea8f9222956cae62daaf018020d501ffceb185a8af427746ecf1743a6705ac45db3752afee7a57891c1e7f9beba3fa57789590fbcb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5761c634c823fca580d1a6fc651c78231
SHA1db79179d9ed632619728ec8e34966957e2d58182
SHA25631815db3ee74cf0b1d4c25fb9666dc93ceb7358852f975bfe8571bfeffcf5640
SHA5120718f09dec22758588b3dc034364c28f69e1188939842ad42b69e4a6cd9268ce80f26ac9de0abbc8cad34b03015d8608d58550fd96c484f184398879c4f6e46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552e1e31d437c551c89da9cb25166865
SHA1665c1582c9474492e5a2786922284e6f39aa5509
SHA2569a12c4ab86974b0208df5c5b92eeb6cd7e35bf83df220db5754f83614846cd30
SHA5127212d6de63edb3c50f901ceb6df405628cbc7e1f8b505f6e1b35a47eca7e6d8051f2266e0a4eaa25680a1c9774f1b0d78b7fd22b07f0163ee79391e315c63a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618b29562dc5ff3d45126cc990d72032
SHA14589aa234ac4f3d4630ed7d467808b2b2a28299d
SHA2564443e7d3dab6c589de897999b252588889d10de1c33355b42371b6bb1d3486bb
SHA512afae69cc885a436d987ba783ea3b189e92830a48e60ba1ab46f659bebc72f5250800501a52360ed3a699a235eb4e9cc5cff57100d36bfa060af15011c7718366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530088af95d9caa22d2023d393dfdb7ba
SHA18fd8de6aa845d54945c75a58f9bc5aef0841ed39
SHA256cf9f00ac31cba5e6d079ded3c0eb142fd102d671521192a2e5c6eb2b563365ab
SHA5121110d5c8cc02d414f17f712a951981a064a21bb30dfc17cdcd0cdf1d688b102d00d76968d5f7c3d3ec67d2939449cf3a38e331c252cda349d76c434b21fce8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033cc50291b192fad742d349bf1d9bb5
SHA19f699872af5914c1c83abb2164861236abe2bcd9
SHA256fea771c5357977d8d4d2d63c258b39ceff7accc6a98ef408bc225753c3b2676f
SHA512eddff659dcb9acfd9bf8d53ea4ce3543724b87858f880b8ad4124b2632dca1d16f8ad5e387c9f9a80e11e669f4ab8014fe267f9db3bf8a2a75ef49eaab118328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243cb454ccbaaa0fa9d97263c55e0b21
SHA1d450b4a7f4c521ea520f55e999b3f264f8a835fd
SHA25633d4c1aff7b50fa2c414b646ae1768d94204f3d3b47b36055afcbe917e666dbd
SHA512fd1ece976241662aa7eb3a7373fd6a5d29af870ab1ccda88e1ee669cc6add14c6e083a895ab659c28a3f17b997716ce8d6c2d076594c6f476caeac6fb4acb12d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b47fef5aa86940002253b000c2fa59b1
SHA1506ed505ce851837b26eaf561783800da863751b
SHA256449452c519dd5fd70fbf01bc9d179e12efd1de379ea910d5c36c070a7c684f30
SHA512ba229fe7cfff96bc119b4aed3033941aa03b35fecbd421649231eb97a5c2ad78e94219bfb5ab44623fee38e1f580b2be7f81d08a95a4d533d3afd04310005650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24ac394bd19a0bd1c5098d105779c27
SHA1aab7c6c564a30ad2265d847add5b4a3ada59359d
SHA2562c986927da5b47363a5640b54480760ba7eac01dac2f59dda03bc65a68de7600
SHA512a32ff455ef5f60c57a5c6a755c84bb5887f0becb772e8f51242910df775405b776407ed4ff3216afcbec71b59653a38a1ba03b80032c0832e81a47eb14c13b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361c99e14843827588741b464538cbac
SHA1c6a581b65481682be97d0aafa456b1e6d6237f02
SHA256f2585e8b14c0797abfa4e953492bae944eb3e165a3f19e10e43bf7f74f7dad7e
SHA5124f23bfce6c1c4c338aaef473eb8f6ad082f336c6f7951eb328ab9c8cca31b8f3ad10de29e52bf8f95e6c6f76e98f37b60f91f04d947391e9ae5a2e19ffab0c87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fba5d0ab9433976300d7ba1089d9a2b
SHA1cd8dec125d478b15bc03ae4fb54bbbde58cba062
SHA2561b57a64688b2963016eca2d48b307dfc0a802a18b5395ee07954355ccddb6947
SHA512ba5b1968f62bb198caec4b408ecdfefbef8ebe4bb0dc6fe991ec7bdf69369bc32955691855318ea371cdc519edd3dac1c7b8d16f9a85e41cf25bd44c6f5c80c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc2a0e17985ee1a21e54ac5463232f5
SHA1e873ddd87226434ffff5ffb253e4f9b2e069df63
SHA256ea95d4fd0522350b90af982aefc9ee9a1a72b2a0137aec9c00a526df99355b78
SHA512f0d1cf8f0b2f20bfc2a488fd2b2ed4cb1708e098dee45fe640ffd2e45e02b440d96bbf4a4b3f3f3f5339cdab303715cac015ad823f8c4c26bac3a158a49d7a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555953b0de9163cf53ca706cb93ac5456
SHA141c1b06d922448dbc0b11b350a537c50c8cf24b8
SHA256be597692a6f082f04ec3850258a8a39abd64f8dc08b4fc9ca4ad72d9e90b32df
SHA5124d6e9cff0f71890357554e91c7dcaf8436473e434f7b3091fe5825915167439e28b8b4ad794507e20a57a23a147857ea6ae548e72723e53925d4de3f63a3eeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59418ba5b9c723291fc7026e31a5bc403
SHA10a12c59ea8c59abb5005db9ac14fcaee021c7eb2
SHA2561eb6036b8e90c4a544fc13560f5bc4532f6ee0ff272f33be8132ac816028f07c
SHA5125ea2e38a544356f39ddd2a815b5d4481900d15b529b1f96a6f6dddc30dada09caa842ba64cc1c93df850351872e2ed63b26dfa4db11b469aa9ccef92867b9383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ae47cceefa4cdcea0d2aa57c76cc73
SHA141e158381f61b8f2ea659910dee06d064de0a3a9
SHA2565a2fa20e0c7546e804bcb4d0ae0d68f4dac790c526e9830ba5cc7f9a7627c6d3
SHA5123e2a595b4027780c9418e98324cddf27fe4400bae51e9a9b7f4258744d0b5e0d8442008cf84d882d6b403ffce55417c9b70e5f293e23afd4cf5e1f9dc5effce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce45cbab19a1ae26b02fb25ffe0b8ed4
SHA1aad66f59364c1e42704fe0cccb3109772a552f5c
SHA256c90c81b471bed561303ade87425ab0e53aaa3dba9b607bfa8cb57f45d4da3cc7
SHA512a5d67c88da8eb7b126cc80c60cf52d4f4809b0864e06e316401dff4335f6c3833a82d1ee75eab3d99d30760bfa4a9aef5643ee0debca20796f6724f0e9df16b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5fc8780feaa2513c9e87e08227b8a52
SHA1ba70ccacfc3530b8e337f3825fa4a9415fcd9ce4
SHA256b5b7348f4fda04a0fabb70c121dcdb847288e23b72b5e910227a2d720776408b
SHA512263d38dc9fcf92e67949b496dfbbc34e002ac3544ed8c4fb82d555725acc0ef82d72ee8c2acdd4db343868effd9e2919dd6f8ceb559090f09b34633188564908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b88b1a1d10011b623a9d2a42dd8ab4c
SHA15e5544bed545522b16e5024ed4e63b4ecc316063
SHA2569b7557d4357f75e73f04626e94c84c9ecd2f90475121eeb6dd56731840be08ad
SHA5120f9be817d0aae913db4e75cff4e830ac92233298a9d0d8c2cad2f3d6a11b3e9d87af813336227b0b6c093dd8027d8d7f7b63735cd8fb189475f7b351e5cece11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e0916f31d1c4f78306f424bada2051
SHA10af4ac885657f8129598c092fb1107d40f1bf718
SHA256fa1dcf9c0b06f3521f6b97aa982942820dc736e2286fc96d0c4a103a36559fe2
SHA512b0de8994316f678af150c5658708c2dd564166c157144be7b4cb5e7294698397ee0507b6010bab78470dde1606b1208b0b924b7adc7aa272378e462f56888c6d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\maia[1].css
Filesize42KB
MD59e914fd11c5238c50eba741a873f0896
SHA1950316ffef900ceecca4cf847c9a8c14231271da
SHA2568684a32d1a10d050a26fc33192edf427a5f0c6874c590a68d77ae6e0d186bd8a
SHA512362b96b27d3286396f53ece74b1685fa915fc9a73e83f28e782b3f6a2b9f851ba9e37d79d93bd97ab7b3dc3c2d9b66b5e8f81151c8b65a17f4483e1484428e5f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b