Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
83s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe
-
Size
747KB
-
MD5
f52c7b690208a4fd9c3f2cc670e25375
-
SHA1
44ae7cfe1d226ff41cb7bf07b797b189f136e15e
-
SHA256
586512e8141469dac710fd7d0d7d35b94a7745c661d49a33ae625895c16a32c6
-
SHA512
599b0bca0b27f7e2d50369aeb2c6717c30df0c4ad8863d959fe7c417f61ba7bc5aee2df06ea753d622d7f5957046b2bf4170bf9a8d6d680af9e9dbcb52da4513
-
SSDEEP
12288:4soCYNrHi0tJICt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:4soCYNrC2NJvhjyR4kKJRi0+4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00090000000174d5-4.dat acprotect behavioral1/files/0x00060000000177df-21.dat acprotect behavioral1/files/0x000700000001754e-19.dat acprotect -
Deletes itself 1 IoCs
pid Process 2816 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 PrstService.exe -
Loads dropped DLL 5 IoCs
pid Process 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 3028 PrstService.exe 3028 PrstService.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\PrstService.exe f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\PrstService.exe f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe File created C:\Windows\SysWOW64\PrstService.dll PrstService.exe File opened for modification C:\Windows\SysWOW64\PrstService.dll PrstService.exe -
resource yara_rule behavioral1/files/0x00090000000174d5-4.dat upx behavioral1/memory/3020-6-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/3028-25-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/files/0x00060000000177df-21.dat upx behavioral1/files/0x000700000001754e-19.dat upx behavioral1/memory/3028-30-0x0000000000220000-0x0000000000244000-memory.dmp upx behavioral1/memory/3020-39-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/3028-42-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/3028-56-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne PrstService.exe File created C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr PrstService.exe File created C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File opened for modification C:\Program Files\Internet Explorer\IJL105.DLL PrstService.exe File created C:\Program Files\Internet Explorer\dp1.fne PrstService.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne PrstService.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\PrstService.jpg PrstService.exe File opened for modification C:\Windows\Fonts\PrstService.jpg PrstService.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrstService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8C2ABA1-82D7-11E6-A02F-E67A421F41DB} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "180939241" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" PrstService.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 3028 PrstService.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 3028 PrstService.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 3028 PrstService.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3028 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 30 PID 3020 wrote to memory of 3028 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 30 PID 3020 wrote to memory of 3028 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 30 PID 3020 wrote to memory of 3028 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2816 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2816 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2816 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2816 3020 f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe 31 PID 3028 wrote to memory of 2556 3028 PrstService.exe 33 PID 3028 wrote to memory of 2556 3028 PrstService.exe 33 PID 3028 wrote to memory of 2556 3028 PrstService.exe 33 PID 3028 wrote to memory of 2556 3028 PrstService.exe 33 PID 2556 wrote to memory of 2676 2556 IEXPLORE.EXE 34 PID 2556 wrote to memory of 2676 2556 IEXPLORE.EXE 34 PID 2556 wrote to memory of 2676 2556 IEXPLORE.EXE 34 PID 2556 wrote to memory of 2676 2556 IEXPLORE.EXE 34 PID 3028 wrote to memory of 2556 3028 PrstService.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f52c7b690208a4fd9c3f2cc670e25375_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\PrstService.exeC:\Windows\system32\PrstService.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\delus.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f798a1d89e9a83dd78d7a74138d45b19
SHA1f5d141beb59f4f4e561862e963bff81fc5a5ebcf
SHA2560e68e0bb27d1d0c1be689fb8affd270333ffea8245a7a3c9788d96c8aadfd986
SHA51294326a6cece092850078579a31b328009e17b3adf527a957058e93076b6c3cc67fdcd1216b4ef9bd04d9705a7944caa2e0de101b4328cb7ccdc34658178f72fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552328ccf3471f31986e066fb971e0377
SHA156f406050c4efb7998349474c6b622a7fe1031e3
SHA2564a47ffa24d6485d28ea08288e4fface3485fc970a76c4f720a6e247da7802261
SHA512dfbc52cd12decbae7df2a2da38019725217a4d70e152fe7fac1fafb9bf21a3bbfcffd34b48d0a6e223f2052472ee373c1ce2a6fe9204ace10f478b7b6258c49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52964774d13bfa9824007d2b4e35557bd
SHA1fecea49ed8348134af19eb7c95d77fc3e7652272
SHA256cf507ff458af6304aab27fe439bbe4398d8bcb676ebca4ef544bc2796c0f705d
SHA512488a6dccf169406e45951226fb4cad81ea7c0cab624591c59ecb4a131d1098106eff5b4a62609cfce7605322a1f3b3eaed1cb9e8f18b6f3ed6ba82faaa90e262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57273ef9eae9abb570d051520706cb4fd
SHA1bb02dee08394d88b3e7acd178bdceb1831a1055c
SHA256f948267a9caeae5638229b1453f1c5f3c5a056831260731831018f9bb3c670ca
SHA512e41de81a9f2edf7dc778230c91f039b7af06f05d7b85829ce943e5c18eff03fe0b220186741f9bf7c9014bb53bfe759e33c3180f9eeb080226a535fb2ac7ca7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59510c791c8bb62f74088da98a6f2e436
SHA1aa47f1ca920140586cca839c8e3687f1e1d09bd5
SHA2568750a24f1e72f99d409ac7e9281e365fad0577caeb40c57bc7944209937b58ff
SHA512f124bcc96682ab9e031038e9d0e90f5e09f4158b47a1c9f458f39fe9fdd77cbca623d954d285671482a59506882c062fb0e70f8bf3b752a17b73b6634c025df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204368396ed82a66b560a3fa2ae6348e
SHA125a1973223f9bdcf955f08233995a0f65d5794f8
SHA256bd0bb588a16803e7335b3b8dadba48a64c13910ffc29eb3afb193039221a45cf
SHA512846dfe06172e70134286aaee9c936e6bfa3f94bedd6d0648264bc27a954ffa563cb0bfe7bfa49316e498ebc7788e3a08959b489abedd614c7dca2077b2ac1fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d4d89704824f06012dbd4f7f2d4475
SHA1e87cba4c1083b2920e5bc40f2c73c967321568a2
SHA25639efdda1dcab67f537f67ea04771daf758e0dddb2bddb4aeb65012de462759c5
SHA512e7a1dec312f180123e605cf6123d3c01dafe93a82837a0432d5d6aa4d00b64214321e7ebe51bd7c365795cee289bb937cecdf29fbc0dcdb4e05cc022a7eea334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c08bdc5e5c0cff8f6670de71b27b23
SHA14dc0f6fa27c5e82d4c8ae7324c2d0df78cbcd0e6
SHA25607e1d34ac66db42f120b2f28e413d4edac109899b81824230e11b93a88b97afa
SHA5120330623ce91e1dc46de2859028e6bb0d69f4021456387514930000391ad7c01be8fe7b93771b1d44adc507e1eb7855de60be7004b7222334ce02503276191364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de182066effed3491ce757a55d62576c
SHA1363ab9d827c7f17fe1a7aa56c6616c2fcf128dc6
SHA2562cacf2458f0c2605698e4547c5c429b1961757912d5a19e473511c1e8f926394
SHA512b4a5e83c92c518e126beaf60450a01e93973e0c67dc2e52080d74acd620faddff3a10c2d2eb93039a2a9a1b477b26c59d2bdf8008b1ad606448852b420e765e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57863ef82a65775ed186daf52c1f2ae67
SHA196554e35a8ab21e8183cddda605530267da2700a
SHA256aa8e90e70edfc523a19d4a30942dca4da71c743cd533b752ddced7e1c830b9de
SHA51217fb56e0be916e73343438663f36a1dcfef79c32724897c8b67bff9f34f0d7d4e81288283fb956260b3085b405b2229b0d80efe9d5a2d5ddecbef23d7456c793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e01ee399d97967daa0401cd7c294c51
SHA181efaae99ab62a8cb601a81527da7667259e7db6
SHA2564bcd91017637e0ca7fa38ea8eb5b1fd8e79204661054dcf8896ecb7529326c25
SHA512da675486123e36550fd0ed54b69d17621a19bb396903940aa92050cd0a8cde233b34d48e5d9c32c5fb4e0f6d04926822644988435f84dc9b2906ea41d5a80303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7dcba8fdf18bab9ab315a702c36154
SHA1326f77a6bc00cae927e53d0747520b2675d0b618
SHA256d9e0df67e20f1d17ab50f4ae80561181b3668ee1cba96766b2c016e6fa8b69e1
SHA51299491d018960907d40462214f91f34443fa18c9535ecb2989606b3c7e3397c3e8b498f7066454ae4d457f5ea77ecd4f1b90be6dc518135e10b5bb4e6b03ce084
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
230B
MD572504473241fb6647e9b3c242e37441a
SHA17431b89da9bccd4b304e48d1ac04a90ba473c527
SHA256b567ca5370d027d49bad6abbc3d88e7016da39d3648468cc19718f0e03aa7d6c
SHA512a798bc377697eb7e65253f34f4c215f108cf93e08a941b73a9fdf667063bcee28fa327ba743d4c2c3502e105dcc65ce9417de04be5eb2571a49f8ca939b9ae93
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
747KB
MD5f52c7b690208a4fd9c3f2cc670e25375
SHA144ae7cfe1d226ff41cb7bf07b797b189f136e15e
SHA256586512e8141469dac710fd7d0d7d35b94a7745c661d49a33ae625895c16a32c6
SHA512599b0bca0b27f7e2d50369aeb2c6717c30df0c4ad8863d959fe7c417f61ba7bc5aee2df06ea753d622d7f5957046b2bf4170bf9a8d6d680af9e9dbcb52da4513