Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
6a39115920403506d64bd42f39ed6aed_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6a39115920403506d64bd42f39ed6aed_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6a39115920403506d64bd42f39ed6aed_JaffaCakes118.html
-
Size
155KB
-
MD5
6a39115920403506d64bd42f39ed6aed
-
SHA1
4492051761a737548d126006075d7e3d39148a49
-
SHA256
4f7b33ef6faab5e22adbba8f492193424a04c8ec12eaaa98f44dfcff0f3935f6
-
SHA512
f96c4aacddf125314f88de05265a5243a0c9760d44f4af110d1f5c185ee3e94edb55bca8dd1df182c4c286184fc8f34a951c8e8f12e9093cf6a37937b62444fb
-
SSDEEP
1536:iDgRT9rKnndTNXxyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iDKKTNXxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1372 svchost.exe 1980 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1268 IEXPLORE.EXE 1372 svchost.exe -
resource yara_rule behavioral1/files/0x002e000000004ed7-430.dat upx behavioral1/memory/1372-437-0x00000000002B0000-0x00000000002BF000-memory.dmp upx behavioral1/memory/1980-443-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1372-436-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1980-446-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1980-448-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxFE7B.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422611944" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D641B381-18D7-11EF-A7E9-D684AC6A5058} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1980 DesktopLayer.exe 1980 DesktopLayer.exe 1980 DesktopLayer.exe 1980 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1596 iexplore.exe 1596 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1596 iexplore.exe 1596 iexplore.exe 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1268 IEXPLORE.EXE 1596 iexplore.exe 1596 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1596 wrote to memory of 1268 1596 iexplore.exe 28 PID 1596 wrote to memory of 1268 1596 iexplore.exe 28 PID 1596 wrote to memory of 1268 1596 iexplore.exe 28 PID 1596 wrote to memory of 1268 1596 iexplore.exe 28 PID 1268 wrote to memory of 1372 1268 IEXPLORE.EXE 34 PID 1268 wrote to memory of 1372 1268 IEXPLORE.EXE 34 PID 1268 wrote to memory of 1372 1268 IEXPLORE.EXE 34 PID 1268 wrote to memory of 1372 1268 IEXPLORE.EXE 34 PID 1372 wrote to memory of 1980 1372 svchost.exe 35 PID 1372 wrote to memory of 1980 1372 svchost.exe 35 PID 1372 wrote to memory of 1980 1372 svchost.exe 35 PID 1372 wrote to memory of 1980 1372 svchost.exe 35 PID 1980 wrote to memory of 892 1980 DesktopLayer.exe 36 PID 1980 wrote to memory of 892 1980 DesktopLayer.exe 36 PID 1980 wrote to memory of 892 1980 DesktopLayer.exe 36 PID 1980 wrote to memory of 892 1980 DesktopLayer.exe 36 PID 1596 wrote to memory of 3000 1596 iexplore.exe 37 PID 1596 wrote to memory of 3000 1596 iexplore.exe 37 PID 1596 wrote to memory of 3000 1596 iexplore.exe 37 PID 1596 wrote to memory of 3000 1596 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a39115920403506d64bd42f39ed6aed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:892
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:472073 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe6f9b7dde8c2ca9c9993ce6f30cd32a
SHA11ab28d98c59f20654495d0460239b4f5579965f4
SHA256f1c3d83d1384551371ff4ed8649da38850f895212c91c68d6d4da7087ffe8cd8
SHA51264599f43f3ebdd75da177803c1ffb66c3777ca1271c6d85948762163f0a177293fab63670a9d8941f1e3099d490dce6162ae84e2b440ce90be570de354450519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d098726e7104da2555f61f6f6926f9ae
SHA1ae92942815bc61fece2347966104b410b77b0ff1
SHA256599ed9e83d1619462dd500a76ccf396981389294e2dcd1f2fd73582e79424da1
SHA5125469a8f0395323b1adc6c6a4d2b337bf1d031883597516cce2a5708b1572327d3d1b4b50d92411c2a3581208915ca35a6f2507fdf4c46516a3d28cbb5ef31f51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5001774473df31f347ea075d439e4dc30
SHA13ab82ad62bb1990b224b6fa697b533a782fce8f5
SHA256f80fa394155d1a3c026680a9dbab0123dbcc416f4b1b51492894c8f9b364de1e
SHA51209b8c8c1181b331d9e068b49c6961537ac3bc9d43ab9fc3bedb8c42ceb7823e6670648682acd9d4f00875c3906d4d997f1a93e116f832dfbd1856979f954c546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5356ad70f07df64d719fecf0dce9f2a20
SHA13d186b6529c80422d6f1a1c351bbdf69d4656ba0
SHA25600fae7f462bd2984c50b2cb40b9ba83d71c934d37e54938c08d1b26463f1c0bd
SHA512c3ac3b7299b6cf3ea92213c20fbd1f96b6c908f526e56ab6255db442bdf622923bacbd196ca652c682c144a563adfb9f9d3b2e827a9831fb72946a5b46ed2949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55569040dbe3e803b598746c45272ca94
SHA1cf6c34797a4b73e110e75da3c1e41bd4b2f7e0bb
SHA256a0a491b757056c07d09c9c057f68c35e3726d371df38308874ac21b228c9e482
SHA51263886d36873fcf8e4d7f2f380dec0c7c6d2e88cddf6023e4317a91c2038b00a7f4975e8e33fe6695524f113a1abc188119eb16884b7ae7d32fc2a697eeb37310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597bf275b620b5181b406e0f52a00fb59
SHA11fcdea714ae718a76120bca5d87869257aeff1be
SHA2565a27519867f6757a80a844a63d6a11d2ed85d9c560a2463a5a720fcf6c9f4ce6
SHA512322864fbffd1a5b350a978938cfbd1bfb119824e541d2cc7afb8434896ff464f93f53d1a4abb590080f0c886c7aaa355dc891ed39a7127dbeaccc757301588bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5baa76ac0210f00f1fd237db170ef2f
SHA1ee44186db7ab15c94b70aa84a6341926e3597408
SHA256fd41d359131813e093cb6f038b55e4a2f5d0b31819f3c1f6b7aaf511424a9798
SHA5128fb893450bbd860b39ee461feb4e95ea9c695ed274e0998a989abe1945972dba7eb244de2aa5bcff90593bed3b046600a8d1cc90b02571e0b1ef4c6cea396e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a7dca34f54982f6b5badf4eca2466c1
SHA11de8b8a893ee7530284f81d87f4f1774ea52d6d1
SHA256986eee4df6ca6b2408911ef338c31dd59215690657a241be428d57d1f2f5939a
SHA5122dbad73945bf1400781370fc54f07ac4f78a2cc2e287541f088732cf75b6ea8e53965791a8bb8deabb425c5d8fa085676c627015a4089752751545873533c223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d8a6cb394172604620ebc240bdf6af4
SHA11c0cf92f961574c523dd83aca1cc71da9f985f18
SHA256bd4499aa27d3fb4f895873bd854cff6df740bb3f5f53b4c058cb1b87a1bf7863
SHA512dfbb5510986c7ebfeded309ceca7abf06965a758d2da95fffd722e27aa76e6fa0f6ad999ee6512633c67f19f1e3010327bd4215d6cfaeaa623101b435a6b38fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5325d2f33a2c163ac94d3aea5d4b22d8d
SHA1c39b6be1e11593b6ebd96ebb99426d9051bab3ce
SHA256a8d7f6d290e8ccfaf1f3c36be6b8035e2beff268dcdd699678523e276b223685
SHA512bd10c5598c06bcb8d6a3863c2e49d47e8b56bcc5eaba9d63601c9d490ae630c9e035a0486d80613dbfe04443de49f98b6e1066049971043ad5ca10da499e8254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f51c97fd2484cd900de176c9dabf3563
SHA1148aada49f39f015126aedb9f3e08f4d0c9cb3cd
SHA25697f4e43d47bb7502819cf130157a121179de90a829041b81c9158d88bb1c3ffc
SHA51278df0ac957d7c91ac384f2862f62268eeec0f292b7bc90624b973445f2c6738a7df93efc74822aaa4bdc016aab741b195c6069d14807f04ea1431685de81fcae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5297937068afa564aa66a3cdc24e9a057
SHA1439afa30458ac47e3f7fb2d5240cba23546e5ac2
SHA2560be741a7399c598c2145894e7ed29491c6dbf16341ae082e6775e1a100f6f808
SHA512650bec3daca44d958fbbf1bd6fa15f177ad5f8ee30aed101c6a875ed6fddb738a24a72e227e9a9939c3c1f75a4752ffa9e9edf0123c70678a4a7439078d504c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50af02763055947b973e63be3c11facdd
SHA114b434441835e93c9bc279a8bbbb5e29745d0546
SHA2564e83341723de08d79c20310acca72fd189429534782aa09726cfecc128cf7383
SHA5129585b1dc19eccd6654f00abaf768ba8567393f7ea923bb6ddf625f845170e185557b6560ac9685a0fdd1ca6f858e01bbe55ef32994b0a2fba23a24e3828bb88e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9b0446ecf28e0d5692d1b1a319ab44b
SHA14661d187ddcde81ade99c0a40a335fcec2e51f82
SHA25612bee1021ad3a2eb539e40658163ab6406e66ea44d184e2300abab918e59259e
SHA5126f2b8dfabbf907dd73e3f95ac485bc15a790815773fe1786e1dd6e8ee2bb012af43efb5ddc15ec90a4ba5a720f791e90b88c2f23cf328c7b082c3a2973bbcece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e21dbc941e3469a78c2774a5bb3b926
SHA1c324f3ad4edd6b568442f3da3de4f33a16cccc0f
SHA2564831b07fc65bf8f2c3f7fdf1fd3267086d3e4cc3c50fdfe0ac66f63728366dff
SHA512471515ab008a93cf29e2c19f0e7564a33f8075fefa28d0010efabaa4f93f3e7f165dafc2b71b47807161b56edb92fb9a4daa6cd644f26afb58e567bd00efaed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d5229872ef08e3b4b3ac732855c7bd71
SHA174eee5e9659e57f1e579c8b787e346858fe0a87d
SHA25618a8d290b7580b84ca6e96eb40c32a807dd924a49655677bce225e17b210fe76
SHA512c0bbbde31e35dc6c92959d5c0e5f993e813e67c89a1145b60093085df7cc58aa4de47aa9b5cb3c536f6983be2a58b5b9af7a3d825720064cffb89455e4e9196b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cfeacfd1ff4ca54a704225d9fa919d0
SHA162bcc27daefc1c030e121efc3a32c06e8575230e
SHA25607979fa2249897283eee5790d0cc752f68b5564c8de08b67c85be01ec14f095f
SHA5125dff73aa98b4ffdf6e3a721008590ddcebbf80e54a3a5dae2ccefa2ab8f845b82361388a80fddaaecb6795f248a80d46ad8b7c92179d49d5036e09aae7ccad4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510041e08f3f86079c4f1a59111fad5ea
SHA10c296ac708b0c7e07f8e0cd7bf4f4b75abf3c07e
SHA256ff5273348e6746011142db0d094f8357474b33c31371b0e10f4c915cf2e02968
SHA512d6e2ad1a45dcaa3606f3820c04ffd8e57fe23d668ad1c46d66d12323b20b5deb72d5b6d1209d15140fa4098a5866b42fa0030eb4701be256c27c66aeb29e6dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a185f45adc275dbc69dfdb924f713d19
SHA1ee38bf70cb2c935fe1ccb0677281f8b4133eb89c
SHA25625c36e5a92ac102c2fe3fb8c1bd65ca60df6de6647ac4c94101f4bbf300f7200
SHA5120de80afe1d88add70a7860241fe4f8bf4d33b29a91679c6223bebb6e424acf246cfe14e472573e8db3461f9a2b8749be6e7c59dde694f2805cb43705a9e67851
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a