Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12/12/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
e48d7f2fe5cacf76d06801972442d969_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e48d7f2fe5cacf76d06801972442d969_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
e48d7f2fe5cacf76d06801972442d969_JaffaCakes118.html
-
Size
158KB
-
MD5
e48d7f2fe5cacf76d06801972442d969
-
SHA1
1590495fa104de5ec4c5f102406d2f930d8aded8
-
SHA256
d4446abe5075c4a5fb68d1fa3febc941faf0dc389a74aa7a2ed66bfa4bf18a8e
-
SHA512
d67220fc854cace6701cc894906e45a7edd57b9d3529397a777595157507e98dd77aaa7ac02c1e4341673c78c430222adaa4ec15ca24c96563e8a8741841ea74
-
SSDEEP
1536:ilRTMTbH9JIcV/H8ey83mNyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:iT0YcVaNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1888 svchost.exe 1648 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2792 IEXPLORE.EXE 1888 svchost.exe -
resource yara_rule behavioral1/files/0x0030000000016d2a-430.dat upx behavioral1/memory/1888-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1888-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1648-446-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1648-449-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px4D75.tmp svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0EBF6131-B892-11EF-87C4-5212BBF997B0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440174164" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1648 DesktopLayer.exe 1648 DesktopLayer.exe 1648 DesktopLayer.exe 1648 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2952 iexplore.exe 2952 iexplore.exe 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2792 IEXPLORE.EXE 2952 iexplore.exe 2952 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2792 2952 iexplore.exe 30 PID 2952 wrote to memory of 2792 2952 iexplore.exe 30 PID 2952 wrote to memory of 2792 2952 iexplore.exe 30 PID 2952 wrote to memory of 2792 2952 iexplore.exe 30 PID 2792 wrote to memory of 1888 2792 IEXPLORE.EXE 35 PID 2792 wrote to memory of 1888 2792 IEXPLORE.EXE 35 PID 2792 wrote to memory of 1888 2792 IEXPLORE.EXE 35 PID 2792 wrote to memory of 1888 2792 IEXPLORE.EXE 35 PID 1888 wrote to memory of 1648 1888 svchost.exe 36 PID 1888 wrote to memory of 1648 1888 svchost.exe 36 PID 1888 wrote to memory of 1648 1888 svchost.exe 36 PID 1888 wrote to memory of 1648 1888 svchost.exe 36 PID 1648 wrote to memory of 2996 1648 DesktopLayer.exe 37 PID 1648 wrote to memory of 2996 1648 DesktopLayer.exe 37 PID 1648 wrote to memory of 2996 1648 DesktopLayer.exe 37 PID 1648 wrote to memory of 2996 1648 DesktopLayer.exe 37 PID 2952 wrote to memory of 1924 2952 iexplore.exe 38 PID 2952 wrote to memory of 1924 2952 iexplore.exe 38 PID 2952 wrote to memory of 1924 2952 iexplore.exe 38 PID 2952 wrote to memory of 1924 2952 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e48d7f2fe5cacf76d06801972442d969_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2996
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2952 CREDAT:472074 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ac53b2d7927f5736f9840ae4f31a39
SHA176d53429df6585f04258ad5183a6946cea6611e1
SHA256f4739b040605086abf31dcf71045ea8cf2b597ddaa9be6ad0c4b6f4f47b3beed
SHA51207208cade6f9ae72ac8b72a884770452440a57a61c075f04dffe989b8ed6aa5b5a41856609040a2c95150d1faa436a06b2bf5aff1de03d3ddc5b4c2979ceb090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb9652fa2e625106765cf3d459456d2a
SHA11137e8ba33d597c305b9c9c2e3cc7b1d3fe63ffb
SHA256255d367278a91e0d8f97092b478f75780d3756395b9c824f40fa1a617ee15486
SHA512404e5269feb003ef67b6c1369beb846bc39111669cc95ead1eaae24f8c30db962f999a6a5cbd60f7b890383daaecde840b59e9e7b486f0ebf4c453b63b1ea4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b448b9fc21bc7a1e031cd3461877a104
SHA1e78a0b96b5ffb0d7f8693505788b1786bea04ee6
SHA25698c08de5190d6a22496a39db1f9c1a77a61657641cf9dc7a760436c4a510d6ef
SHA51298e8b85085955b71c74a7a462a8bf2612f0918515f5830ca90565e6c0a054a692460bd7cc4d8d346260cbf2933daf4d1521df577136ed9506fb1256f26fb65d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3eb8223b62fd2c0c57bfbffb13b87f
SHA18e37a0fc6bfed654361c7b7a3d72fe55e7f0ce8f
SHA25610598dc3f86e5cec3f69977f5860efee520b02d8e1f1c7df0c6aa6ef3ab1f207
SHA512356304f1620d24f5e01b124ea63ecce12e2d975b0e9478d6c25301f6796abcf81fc2bbcfe555ec3dfe8a71974b84780a3b4ff2cc33a810e2f9c97694888c6589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe48606f9b9daaa6f6f032875b3e5c95
SHA1646df3b2d3d1c50f7fcd1c0a7e2cf7f71dcff0ce
SHA2563045333ccff2d8b40fffb14327bc860704a0d658744570b4fb4eb30af636182b
SHA51260b20fd610c514a1c1c77f931028a2164d2cc629e84d4e0a43924d921fd16141ca869f986ac51f0734ec4dfb083f8f4b5f8c7b7a5f792872c084569ceccffb8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563acf546897b2ee751578d20b2c7ca26
SHA14a0586371e23486dfaed4e316806149076dfd97f
SHA2568b27b44e940674f0623c79be96ac4f1b5d22d3011b5cc063fe92063876c6080d
SHA512b7673629561aa521e045c46f49f16166e6a3a2517e5ba46fba72b085f3ecfe1b0c864272ff934fb095ef3902fa0e3416a889a30d89eddcce5176f935611d9392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55476ffad978b47d9ed25edad589afbcb
SHA1e1a557ddf1c2c0b648eb0e4a952a13f6b4d56ac5
SHA256a0c6e5b1276b1342d7b643beb5b31fb94ddd8a8e1c868b07c7be16d044897d90
SHA5124ae6777ca9b518c6e9832bcb578c08e77a851313520da0c7982f3187ab7e8b712a5892acb5cc852e0a99988c5e5a9b7f9a9a39a72ef04576a47ccd40a53ae981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677809bea56e4506e10c0f661812f012
SHA16945bfb3defedb47edd9571e3b49c2d65c281a14
SHA2562dd2160cc6f7ee1e7a321212f78cb55f1a5072559c31896f5fa41c5dd37ada3a
SHA51219a70a696161f5087dea3fc91f1ef7166c67b8e12798c6229d88187299848c25c208d15aa9d6cb466c353576a2acdd51b91022311a3fb3dbf75528ddfe025a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f4ec7aa832ab95572d1a48780c8b4ec
SHA13bfcc54db7bd657793c56ba9cd76dfaa02fc3cd2
SHA2563c462cd65514ecf6ad2ca5bdbe2439d05f95e87c6868f0c3533899af6260ec4f
SHA512b4e505f792d0d254896dfc38189c6140d1890d2777759f8a81c800c302e6ff3f2a3ed3f9d1a47fe436d2ca9c1a131f0fb176938c89de6cf66a7d1f26096bf680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d51d5e73313002293d511b9c0efc102
SHA1359bfdd974583c846e177058f72a6fa345df3871
SHA256e6a9c266985cab21dbd99cf60120c3c482ef99b60a7d6ad618817ee5b22c48f8
SHA5120cf87644363c242423c091b4747116a37e3e2235aea5398be7ed6accb615f6fb6c30160412c18aa78414292349e6fa94dd67172e76d2aa8525ad77b9f44c0a59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5686712f8a7b0904f6f47358d85aaae
SHA10c7b312ee8121cc4f1137fc8dd1227ab93aa4e46
SHA256d3fe31a5d0aecc8e0d510505243da05a84d0abb7f718779882ad0b1ead1d7138
SHA5127fd04c3d0e305b16d625d3671f38181b91cd73603d9ce317ecfc3b0a571e67d96d66914f35096deb21f5100559e7fa044e79e3e64c0cebfc7ef72ec61495dd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287bac6e8a499ae1aed2762288beb6fe
SHA1ceddb3c1a32bef8ba7a9d6dc7db855dc289422bd
SHA256548b55a79f10a82f95de481e561f8c58a8f78d2b1b6f77d42ef310f888070444
SHA512f375126cfdcf576fcd63157a1b3e294c76b5a310f0d7fc1f7fb4a0728cf41cbaa3ab1b8d2cf251fc55d9565d1d1d5562306999e5fea9bf7dc639d8d088065402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7caef605716c1483031f02729079aa7
SHA1f84586db901aa05a32e5a2907e92327ac514c01a
SHA256e432cdbd70de2b81e733f9905046fc0150bd818c0a0dc12ff683dda14e14fae5
SHA5125287e3f951f18cf2dfe0f8f84d48d83b10016cc5cfb96d275baa93487a72739f5ea39963c6811b361ef27721ee20a760423c233d6ca1397e8d890cd41c1cf772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e98f6e42162767e5631ae051ac776cc
SHA1373950a081c01fd6ad6e7af418b23f1321fd727a
SHA2569310e7e8c8883e81d70a41a414a62fb4b132ea6d126055ac316d78c04d89578c
SHA51295533816d9fe836e8a2c33add0967e73cd77bb82c64e67fe2044e01f289dbc06d6f5a4d0110c5e1abf1f9394aff046363bad4341391ae108d3158d65532360d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba27e4c71dd487d97ef2700e5f3fadb9
SHA1f548c141c3663cc2fa779706c5c5e8a8545dcd53
SHA256a6cf0b33124aec7390cdb2bda0daa12e03f26cdc56591010c3ffd74861a5d7c3
SHA5120ed4b52ec0497a9a9464b3c7af3503d963c661b74903497ace13615377a5386047d8c16ce9c110fd272f5e47df30c87137b4d010be749aa1c118dbc4e2eccfcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a2d53bbfeaeb0262040e81bc357317
SHA1c0982e9cb87e6aceb10b8eb1563309398a635423
SHA256b4a1db52876ebd1c9c68ac2aaf63ac32c1ee8c54597d64fc9e4a32cef3a3a339
SHA512e3ce9134d74ad6c36118f1c7f2e83ad6956c5e0136b51163be2caef6b2a6d0624e20a3a34fcbca380a2af20ac87914d9db2514f3478792e2020eda61e850a078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cec1183745a3ad8e454e214b0d338c2
SHA1748332b6175db25f366c3a64890aaccc53852169
SHA256daa02c51d9a2b9773470118fc93094da79ab9bee81f8bfd14f0100ad4648b639
SHA51218ad072abc3c6641d58e97de5185cb69fc2a0fb6fe813e629258eb00c8bd63b2eaa5071190caf073603d71894de9cfbfe4df511b523a1e6b91078f08adfedef9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a