Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
dfdfccc2ba614c4d7d6e44e2ac1a64a0_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dfdfccc2ba614c4d7d6e44e2ac1a64a0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
dfdfccc2ba614c4d7d6e44e2ac1a64a0_JaffaCakes118.html
-
Size
158KB
-
MD5
dfdfccc2ba614c4d7d6e44e2ac1a64a0
-
SHA1
ed5151c10e5fdd102fa103044cf990c585731b58
-
SHA256
30e65a483cdef29add4b56d875dd82d9a78338d072f5628ec7ed0af19f0b9582
-
SHA512
da98dadf3940f495ef08f7f18df834c10435c7a32cd5e5d30483a679d7e026b53c63a70265c431f1bcdccce82a5e803358333aa25c8442ec48d194b9a43eabaf
-
SSDEEP
1536:ieRTgSwfrsAoIjqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:iUghjqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2320 svchost.exe 1420 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2568 IEXPLORE.EXE 2320 svchost.exe -
resource yara_rule behavioral1/files/0x002a0000000194e6-430.dat upx behavioral1/memory/2320-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2320-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1420-447-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxBDB4.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{010F4071-B778-11EF-B9ED-7ACF20914AD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440053019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1420 DesktopLayer.exe 1420 DesktopLayer.exe 1420 DesktopLayer.exe 1420 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2540 iexplore.exe 2540 iexplore.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2568 2540 iexplore.exe 31 PID 2540 wrote to memory of 2568 2540 iexplore.exe 31 PID 2540 wrote to memory of 2568 2540 iexplore.exe 31 PID 2540 wrote to memory of 2568 2540 iexplore.exe 31 PID 2568 wrote to memory of 2320 2568 IEXPLORE.EXE 36 PID 2568 wrote to memory of 2320 2568 IEXPLORE.EXE 36 PID 2568 wrote to memory of 2320 2568 IEXPLORE.EXE 36 PID 2568 wrote to memory of 2320 2568 IEXPLORE.EXE 36 PID 2320 wrote to memory of 1420 2320 svchost.exe 37 PID 2320 wrote to memory of 1420 2320 svchost.exe 37 PID 2320 wrote to memory of 1420 2320 svchost.exe 37 PID 2320 wrote to memory of 1420 2320 svchost.exe 37 PID 1420 wrote to memory of 872 1420 DesktopLayer.exe 38 PID 1420 wrote to memory of 872 1420 DesktopLayer.exe 38 PID 1420 wrote to memory of 872 1420 DesktopLayer.exe 38 PID 1420 wrote to memory of 872 1420 DesktopLayer.exe 38 PID 2540 wrote to memory of 2284 2540 iexplore.exe 39 PID 2540 wrote to memory of 2284 2540 iexplore.exe 39 PID 2540 wrote to memory of 2284 2540 iexplore.exe 39 PID 2540 wrote to memory of 2284 2540 iexplore.exe 39
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dfdfccc2ba614c4d7d6e44e2ac1a64a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:872
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:668677 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7201e7f55643def83456b661fbd4cc2
SHA1bae875dace1e07ffc0e1c9c5abc48870e5e78846
SHA2563271b5868d47db702cd9e00bf2beca932af4eaaa20b4f3bc259c33c57391ab92
SHA512518a2ed9a174e32dad10f041622319c13e9ebfafe77b0138831f0b5b07fdd7e8694f2abd200f1ab65fae9027a13c8b3910d4c6e7c7f9ee38238bd82288f2f494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ee4e9c20fa008e0b254554b7ad1327
SHA1b96b2ad2e31ccfd861354c17f7f90317810a0f3e
SHA256822602b480f39e99feeb00d23529b4d8f733cac0b61c6ec6ae5e25464e4626a4
SHA5121ed02df99b34b22f3c3f1d0a16c7cc7a4a6261eb61eb28981f3b65b786e53e4b57640acde8d1d1e641067083393cb4feee7745e6a6a88789181ca4f6a4bd8479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57402f1eaa42503692c0f55994962221f
SHA1476252b815674a57c9c6cf6bef9f9d9494f53007
SHA2564498464292c1aecbae3707a12847fdc811da9e4a4ef7bdf8458364e3b87aaf1c
SHA51223d8e6a135166e7e4695c490512d75129f3059c452be0432f714defd423a63161cd6bd25cefbb9a69a5ff269732950e6ee797325f320c79ffa4562ee4bc5835b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e9bff94c9bc745537f75eed8ee46ab
SHA1f0e25128ab513b419ce463e89fd8d8c0e7f9b266
SHA2565b7fa491f60128b3d7af14c5363f2cee60cd3caf7064abe68d32f852e2eb4961
SHA5123fa86a445747de98beb10857cb19947f33ed119b2d93f1b6396b54b25797e78af7f4b87d0d073fad94ba9e5c5ab025ec46c4ac045c3492851b930e294e4bf0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504174b45c2855815f70d0a8840a6ec3a
SHA1fd67f581e848f5b615abe38094a08658402879fc
SHA2564f156c3e71f08c710178f675b9eb025584c9aa08eb71151183276e5c9449302d
SHA5120a4e7dec7be3941e1aa889ca60b10d4ca50e09d8fc0d4eee5d951f68ed31ef7726fb38ffef1ed363c0ca28daeb2cc402d93077cf8fc693c46ebf26b6f1061b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc5154d986cfc98090a7512601a0c4f
SHA1ed4feee39bc300d9bbc130e1ffd74994184ea8df
SHA2564642e1ebe111ff8ef23f3e5f39141e44c338625525eaa57553cd282e6a08f533
SHA51294c9dd2d18c1363da4417fa10f5e6028fecd1e6200cccb6a35fc10e39201fc18c294ead85b13c191255bc83ca2aa0437c496c52ff4f070ce0c28971cab35b6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c94f712642a10f80629c0449c244b18
SHA196656db19db73e201a68d09f606628b27cb9d6d1
SHA256d72e2e313f896cb3ae5d028cb3c091b6384e23774039795f4a5b8602525b02c9
SHA512a2af7767b2a74d0a4b288a1e958d919e590cc9ede51f4deeb8ff5ecada09976680fd2bcee96c0011728b177c3672e1d417dc7b693d196b254d1de2ce36e98d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d37f22931310efbb1c5b4680be62b7e
SHA1de64941bcd1ff8ddf53ca6e18ef766fcafc627f8
SHA2569fd2ad6a3f251a7fe039e3d7c90afda89ec3892b75ac8f66b88fb4731a5c415f
SHA5127905b50cd170717abf8edc904c0875ad5f466b7139904a64ebc00ffb69cf23f2ce867703fab50a892a39f64e3f54ddef2fc1e93231780db8fd33406d2ab09b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04ff5d24e55d34f0f0492c2fb872e59
SHA11277d4ac0591d7c7d23fb5e44a00bbb1db1a75ea
SHA256e25606e02b2c549d195d08364adba2c537e7da6365ebe1e80064dcc5b61a6c0e
SHA5129c7b4cbf1e2aa924958e6ffdd37c8a05a0e67f2a9a9901d5901a86c72992fec7e7a0e0a99666a1b803cd95582171539b693500e1b422e5c56e16ddef1438b918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51684618eb00b85fde21f85ed3a18f51b
SHA17f18f846df7853d42b96b3c60d0fc569c8167883
SHA256d35479495fd02f9df244faaa606314c0542599428c54730260d6426094a73d51
SHA5128ec6915ac9948fedb8b35f551b37f7aafcbee458b5442db82ba0be24e09828b09716e959bdbb687cd6e024d2813b49b954c46634e9806aa25569a155343d1d5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516caa0daabc04a004f9ae0b4eeca4395
SHA1eef651a460456e51d3b01bbe1aa0684564ca5ac7
SHA256b3df94d962fcbf8b944746a19e8380f3e28074de2beb733447cd103388ba9faf
SHA51207edcd34b8551ac86718c66b2019a43b62a57bdaffad529cf744d5cf18d973b56d3acd24961985746996d8758562fff2ec6c9eae5604b2499ed84858fb7daefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa0deae4836b591a1787735f6648c47
SHA10cbf61c31267fa2e7ca381e8e7e3fb856e22daf2
SHA2569e71d788cdb6abe15d43be34d0bf416ed90f9c41c7f470e2a39e51b9ad9133ff
SHA5127b3db5815ea264684c3d6621ca5eb702bae0e6a2015e5ccba6ea6ad1a17f37947764b2a2eb639d3a8f6590e8408340b56cd3a155f1197c86779262e6b83b9245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b90a18527aa6cdfd07e70646063dafa8
SHA1d8f761131ad3667c55a21652a1ef5553d3f840de
SHA2565ade1b536a184427ed4aab941610eb956a524a18a99311e12f6c6d80e475a4dc
SHA5121529e1f54ef31d197834136e6dca844ddeaaebfaaf95fee8b6cbf2fa02e58252adc48562b1d876eeba1a079436996be1a29bfa90ecf7dc87990a37762605351f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1c0de0b51f8afaacd1ef21f8cc97b0
SHA180cbd44fca090da2ebd418044cbeaddb971e8b01
SHA256645462a5192898ce9d6b13b6838115397a0563b73544d7c57dfe060c5f5a94b7
SHA512effa27839621dbcd64ba8c06dfb486104ea20827918fce58a8d33bc18df8a0237a40fc5615fce907604980ae64b2534b8bb2f527de2eabf81de0be578ec81a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115e1e16d6c1b70a8e0e86cf18fd4e10
SHA109e472954c2ac67aa5e7f88043c465e210e0f378
SHA256a04c67bf6b0348539adc6e1f5ba8d3a6ee0b3ed0fe3b67087f551c02628bdfee
SHA512f276ad47ddace207d740db3bf293e7d69c485c8140c00d5c78e714b6090a906a0913e624d66cf646ac247c46943f3441dda3e775741c0d686d8cd09d79d9e4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fc7c8b6d786a60cfab151271dd9456
SHA103a7615b3724e7759963f59d0c3729ba565c0386
SHA2567111c0569633e25742518f2da8f630fb7d5ad547c195e5678eb0be92eee861e2
SHA51247095ca4edf3d02cd93dd66af88ef90b91301933ed9faef88cfb33ab62a067287f459f71f55aaf1439eba7e15862ddf58e9f89da4507323b7565bcf4dc6f4dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13f53f3cb778adacf7d67f1b02b44a1
SHA109456a813bf581cb569eb13a92723f07ea7a9790
SHA2564f038837192bb9508a0ef0a340fe008a20d34a42828c39d474ac6dd48ea52b56
SHA512734a09342a57baffac946e1eb0e6403dfc913ee673d79e67e154e4034dcbd94c2beae9c2e65d436ab924c2c9db59a0d9ebd7efed0072cd4b552d51589143bb8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b136b55eca3c61048e8496d34dd05215
SHA123a286e968ed9a5ae63611b014e423a8eea8bd4d
SHA25630fdf082b8d5e7000919dc744bccc929ff4b0b78c51892a473ea43211cc0efce
SHA512a4926c54eeddb633d52ce4d391d96bbd5ecd24a1c620f2cfbbf379a40714a71bed2c72a2064ced372768bb40ff7511d41bc4c8aac4a6b59820c72d3ba18bc686
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a