Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30/12/2024, 14:22
Behavioral task
behavioral1
Sample
XWorm-5.6-main.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
XWorm-5.6-main.zip
Resource
win11-20241023-en
General
-
Target
XWorm-5.6-main.zip
-
Size
25.1MB
-
MD5
95c1c4a3673071e05814af8b2a138be4
-
SHA1
4c08b79195e0ff13b63cfb0e815a09dc426ac340
-
SHA256
7c270da2506ba3354531e0934096315422ee719ad9ea16cb1ee86a7004a9ce27
-
SHA512
339a47ecfc6d403beb55d51128164a520c4bea63733be3cfd47aec47953fbf2792aa4e150f4122994a7620122b0e0fc20c1eeb2f9697cf5578df08426820fecd
-
SSDEEP
786432:Ty5jMDNnx2+4NYobtH8VVtKqi9+i514XZ/pjYlp0:MMDNnxV4iobxibiIi5MpjYv0
Malware Config
Extracted
xworm
5.0
127.0.0.1:7000
ztzWORSYUJhMLDSY
-
install_file
USB.exe
Extracted
xworm
127.0.0.1:7000
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral1/files/0x00280000000462c7-11.dat family_xworm behavioral1/files/0x00280000000462ce-21.dat family_xworm behavioral1/files/0x00280000000462ce-23.dat family_xworm behavioral1/memory/6064-25-0x0000000000F30000-0x0000000000F48000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2248 powershell.exe 3540 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000\Control Panel\International\Geo\Nation XClient.exe -
Executes dropped EXE 2 IoCs
pid Process 6064 XClient.exe 2420 XClient.exe -
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Xworm V5.6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Xworm V5.6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Xworm V5.6.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Xworm V5.6.exe Set value (data) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\0\0 Xworm V5.6.exe Set value (str) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\Shell\SniffedFolderType = "Generic" Xworm V5.6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3 Xworm V5.6.exe Key created \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg Xworm V5.6.exe Set value (int) \REGISTRY\USER\S-1-5-21-2934520114-3201407646-466687995-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\3\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Xworm V5.6.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 2248 powershell.exe 2248 powershell.exe 3540 powershell.exe 3540 powershell.exe 6064 XClient.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2868 7zFM.exe 5480 Xworm V5.6.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeRestorePrivilege 2868 7zFM.exe Token: 35 2868 7zFM.exe Token: 33 4676 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4676 AUDIODG.EXE Token: SeDebugPrivilege 6064 XClient.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeIncreaseQuotaPrivilege 2248 powershell.exe Token: SeSecurityPrivilege 2248 powershell.exe Token: SeTakeOwnershipPrivilege 2248 powershell.exe Token: SeLoadDriverPrivilege 2248 powershell.exe Token: SeSystemProfilePrivilege 2248 powershell.exe Token: SeSystemtimePrivilege 2248 powershell.exe Token: SeProfSingleProcessPrivilege 2248 powershell.exe Token: SeIncBasePriorityPrivilege 2248 powershell.exe Token: SeCreatePagefilePrivilege 2248 powershell.exe Token: SeBackupPrivilege 2248 powershell.exe Token: SeRestorePrivilege 2248 powershell.exe Token: SeShutdownPrivilege 2248 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeSystemEnvironmentPrivilege 2248 powershell.exe Token: SeRemoteShutdownPrivilege 2248 powershell.exe Token: SeUndockPrivilege 2248 powershell.exe Token: SeManageVolumePrivilege 2248 powershell.exe Token: 33 2248 powershell.exe Token: 34 2248 powershell.exe Token: 35 2248 powershell.exe Token: 36 2248 powershell.exe Token: SeDebugPrivilege 3540 powershell.exe Token: SeIncreaseQuotaPrivilege 3540 powershell.exe Token: SeSecurityPrivilege 3540 powershell.exe Token: SeTakeOwnershipPrivilege 3540 powershell.exe Token: SeLoadDriverPrivilege 3540 powershell.exe Token: SeSystemProfilePrivilege 3540 powershell.exe Token: SeSystemtimePrivilege 3540 powershell.exe Token: SeProfSingleProcessPrivilege 3540 powershell.exe Token: SeIncBasePriorityPrivilege 3540 powershell.exe Token: SeCreatePagefilePrivilege 3540 powershell.exe Token: SeBackupPrivilege 3540 powershell.exe Token: SeRestorePrivilege 3540 powershell.exe Token: SeShutdownPrivilege 3540 powershell.exe Token: SeDebugPrivilege 3540 powershell.exe Token: SeSystemEnvironmentPrivilege 3540 powershell.exe Token: SeRemoteShutdownPrivilege 3540 powershell.exe Token: SeUndockPrivilege 3540 powershell.exe Token: SeManageVolumePrivilege 3540 powershell.exe Token: 33 3540 powershell.exe Token: 34 3540 powershell.exe Token: 35 3540 powershell.exe Token: 36 3540 powershell.exe Token: SeDebugPrivilege 6064 XClient.exe Token: SeDebugPrivilege 2420 XClient.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2868 7zFM.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 5480 Xworm V5.6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5480 Xworm V5.6.exe 5480 Xworm V5.6.exe 6064 XClient.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5480 wrote to memory of 2168 5480 Xworm V5.6.exe 103 PID 5480 wrote to memory of 2168 5480 Xworm V5.6.exe 103 PID 2168 wrote to memory of 5956 2168 vbc.exe 105 PID 2168 wrote to memory of 5956 2168 vbc.exe 105 PID 6064 wrote to memory of 2248 6064 XClient.exe 108 PID 6064 wrote to memory of 2248 6064 XClient.exe 108 PID 6064 wrote to memory of 3540 6064 XClient.exe 111 PID 6064 wrote to memory of 3540 6064 XClient.exe 111
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XWorm-5.6-main.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2868
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3144
-
C:\Users\Admin\Desktop\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"C:\Users\Admin\Desktop\XWorm-5.6-main\XWorm-5.6-main\Xworm V5.6.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5480 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wtcoixka\wtcoixka.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCB07.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9600983F18234287BD691BA914E2486.TMP"3⤵PID:5956
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3588
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x44c 0x2d41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
C:\Users\Admin\Desktop\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Desktop\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:6064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\Desktop\XWorm-5.6-main\XWorm-5.6-main\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Users\Admin\Desktop\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"C:\Users\Admin\Desktop\XWorm-5.6-main\XWorm-5.6-main\XClient.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD57451d65fa212ac5aa698a76cc857e36d
SHA108a6f0eedea364699ebe276204161b92584b1c84
SHA25698fa016ca13ba1441462ebb9f773317e741ef0af34dd717025840a14a4851e81
SHA512f6633b704e7f0bc4e53c788f17f4e373e1e3c16bb94da42121756e72b878266dc38912b6dd3fdc111c2a3d2055904760dbe16076b0b8d6c6715f273d28f3045d
-
Filesize
1KB
MD506d57749e79c663a73dd0c7915e45b4e
SHA19c39fb80d8c7b777feee04a7e30feaccd1b6f4a0
SHA256e1724f1fbd652165c22c2db532d2d850f583ac0b168506e799f32c03082f7f56
SHA512fd1e2473bd729d7d46cb5a443b21d119c3b071e986bf8d7f7e9fe094ea2b9612e72916cc3a54cf6bc4c922004bac694b68f8d22f1e6b53b45d9f786116ae0c84
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5d40c58bd46211e4ffcbfbdfac7c2bb69
SHA1c5cf88224acc284a4e81bd612369f0e39f3ac604
SHA25601902f1903d080c6632ae2209136e8e713e9fd408db4621ae21246b65bfea2ca
SHA51248b14748e86b7d92a3ea18f29caf1d7b4b2e1de75377012378d146575048a2531d2e5aaeae1abf2d322d06146177cdbf0c2940ac023efae007b9f235f18e2c68
-
Filesize
78KB
MD572bba8c8d0795e7503a7ca94b7ac0d61
SHA1a1fb3a7cbc8841d79d0e6027b2c292540a2617c5
SHA256484c67a3dfdaa0f9c1f9905bbe1021a1f287ff7c780b806819a0fe37b0647063
SHA51236efc8aad857ec43f2e27a5fda605c3ef357f2c57ee449f1bee5bb37dad1f99519ac83a46559e8c02b6e1e6d8ba62c654ae73c2102c38da6d1dda47dc34531b7
-
Filesize
320B
MD5def97caac22636d13d444b2990f09100
SHA191fa7ec2bd84a3349a3e4471f141a26d7072ef58
SHA2567ae816f747a336b9e3ad9d6f1abf6e76e24a6ebff2aa6a0017a15b9c0c32efa7
SHA5129d63c88fbb7e953bb0407480af1c9f5c03496ec9595ac5f8bb00de9cca6d31ce024aa5f20497d938340325de1ad7fc8451b1e98f83e9e8263cdbf1eb0da37be6
-
Filesize
39KB
MD5eb739fa1e1960edafc6a9c86d8675ad5
SHA14304cdc58e4bbe3aecd80c195bbf6fb70663911a
SHA25600783f24bd4e18692efbbcfa3b456797ce79ae40f072d137a8443524508feecf
SHA5122211788282a80440e9ebb96b5ea1059fa52d3d458e3e38c2eede242b2d72e9e08adb6bafef363f821711efe44a1bba9bbbe79a9d3c94c25255d1ca7269f5eaea
-
Filesize
71KB
MD515ac5cd463852ec8a1953f842e47eeb4
SHA1e8f96c5aaf25f822a04fa16cf43720dc47f0e69b
SHA256250ff7a7c616c4b3d2d48e59b76b9239f38402c6d5c8c8e8dbb76e39a8fd5500
SHA5127dc2bacb6681ed836a3ce74549150e43d859b3d9eecd2243da3f07ee296f560498170c4396458e1fa30a738e8a2bb04cec4018016036693b1bcadc62564602f9
-
Filesize
490KB
MD59c9245810bad661af3d6efec543d34fd
SHA193e4f301156d120a87fe2c4be3aaa28b9dfd1a8d
SHA256f5f14b9073f86da926a8ed319b3289b893442414d1511e45177f6915fb4e5478
SHA51290d9593595511e722b733a13c53d2e69a1adc9c79b3349350deead2c1cdfed615921fb503597950070e9055f6df74bb64ccd94a60d7716822aa632699c70b767