Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_494d69e401710d73f9fad92ad9b63ba0.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_494d69e401710d73f9fad92ad9b63ba0.dll
-
Size
178KB
-
MD5
494d69e401710d73f9fad92ad9b63ba0
-
SHA1
38c906d88174bc3f557fb983ac4ae362dbca7d0f
-
SHA256
4e1054cd19da53cc44cb335cc09099d9d8e834aebb370bb87d19359ad4d62ec5
-
SHA512
f3c90adfbfd65feab88568a484dd548e1c472271b2659b49dabbef77b86759c02c020ad2bc17d3ce4686e06015973d76e25f596017aeaf2cb7c8b43b68282bd1
-
SSDEEP
3072:s3tpFztj7IKML0E46mIWhixlDsx5nb+P2XY/43n9M9sbHNl:0tprjsKEQwSjIAhl
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2116 rundll32Srv.exe 2136 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2508 rundll32.exe 2116 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/memory/2116-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/files/0x00090000000120fb-9.dat upx behavioral1/memory/2136-22-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxAE0B.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D35C441-C803-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441872119" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2136 DesktopLayer.exe 2136 DesktopLayer.exe 2136 DesktopLayer.exe 2136 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2768 iexplore.exe 2768 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2508 1348 rundll32.exe 30 PID 1348 wrote to memory of 2508 1348 rundll32.exe 30 PID 1348 wrote to memory of 2508 1348 rundll32.exe 30 PID 1348 wrote to memory of 2508 1348 rundll32.exe 30 PID 1348 wrote to memory of 2508 1348 rundll32.exe 30 PID 1348 wrote to memory of 2508 1348 rundll32.exe 30 PID 1348 wrote to memory of 2508 1348 rundll32.exe 30 PID 2508 wrote to memory of 2116 2508 rundll32.exe 31 PID 2508 wrote to memory of 2116 2508 rundll32.exe 31 PID 2508 wrote to memory of 2116 2508 rundll32.exe 31 PID 2508 wrote to memory of 2116 2508 rundll32.exe 31 PID 2116 wrote to memory of 2136 2116 rundll32Srv.exe 32 PID 2116 wrote to memory of 2136 2116 rundll32Srv.exe 32 PID 2116 wrote to memory of 2136 2116 rundll32Srv.exe 32 PID 2116 wrote to memory of 2136 2116 rundll32Srv.exe 32 PID 2136 wrote to memory of 2768 2136 DesktopLayer.exe 33 PID 2136 wrote to memory of 2768 2136 DesktopLayer.exe 33 PID 2136 wrote to memory of 2768 2136 DesktopLayer.exe 33 PID 2136 wrote to memory of 2768 2136 DesktopLayer.exe 33 PID 2768 wrote to memory of 2780 2768 iexplore.exe 34 PID 2768 wrote to memory of 2780 2768 iexplore.exe 34 PID 2768 wrote to memory of 2780 2768 iexplore.exe 34 PID 2768 wrote to memory of 2780 2768 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_494d69e401710d73f9fad92ad9b63ba0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_494d69e401710d73f9fad92ad9b63ba0.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2768 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc1c7e495cfc484269fc2f5671455c3
SHA1bba5925e35bc07110bf0fc796483f2d444aebdc1
SHA2569660b02cc4f2f9f9e2d621555b2f1f1c7a3bd4fd72aec7f504d8908f7bb77526
SHA512ae0a2960fb316cc2b398e38bc917ec6ec9845b2b0e1274e1a8a5b599096281aa9c396911920663785672d1bcfc2610fd874410df4d7a7e00187269e770de4ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53817ced599f3803eef09da8b084a2582
SHA11f8f1561bee162c326bdaca89b4c2ebceb7a66ec
SHA2567252472ec22ae7b506acc2fc6ab00f553cb1084d0671dea52dc8f06a16e65914
SHA51282c821d41aac436a4062ca2dee62388b9422893509a9505890fab7523fa5d0c5ecb2de2f4a0d6d9e2ee8a515b92b243e9831c924056f7bbb634c485f22bc86f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ce377999c4cc38c0f85b70c4a248a7
SHA1c0deaff295cf7491b8be6159e7913da0b7e968e5
SHA2568f13f9d4b55a28296e1ed5308c7aa6f062302c851b49dda872b2461fe22cde34
SHA5122a8cbd649cad0675aa1c1f3952dee2dbe0cd5e57cd05de74d8a429d215fd40568de036c4c2e5218ad0e9a9146fd4ec3a286067768590c8a35651ebb7247e6fcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2cd4e4d465dbb8e10eca130dd9231e
SHA11abcb84ef3c565f798e987397f52904ed3a6d21c
SHA256a32dbfa3e4a99438557254540f8f0971ef9005914cb43bc3f1e570adadba406e
SHA512096763a54c0de35b8fe027353cc6346b947737e74232509e141bf038876d973f1911feb05d2439d1c6594c37e00b950646712a70232fb24cc39decbe27b1316f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af34914b4034903ccb37dfea2648b3d3
SHA121bd22a134ee72d06747a313de88d8bb99df7e88
SHA2568ece45314d2bf672b350b0ff3c41b44547219f7b1d1caaf20cbfaac608effdfc
SHA51235f407eb955f163c5938968d122bcd23e374857fcf318e0ae8d86a0843ae0893be5a688ca13f1693f6ca382461c7f4f74ceef96c4fdf850156fb44fc3b47ff54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f750c03a0087561bec9c5a114930ac6
SHA11e19a2f1827e9de92bd1399c63138e638c4a7080
SHA25655ebf9545e7312261a6d001a5992d653cd0240dfafce3ad1529f4567b7f894d4
SHA51241064609cd04d24e1809b6873d71f961ff73e498525df1cede1db6c0748228208a9172ca9317431a7d6e8765224b38934857078e4212f92f85b342833454b229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f8dad4d564666b12ca933c49ba42f6
SHA11056c9513e4fbf9ee7bae31382a2f36bc060c451
SHA256d0d2892480fa213e18086d390372c6df35f582db2fbf6a4ccb77adf7b676af0b
SHA5124270f973db3065acd84ca41514af6ad0fa3afc5bd8b636681e5a44ed3346e41c9b499a04946f12c5526cd24ccfa5b2625bed3438ddf14109540aab28f8019a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c51ef001aa3f3347982a98ad84b90e0
SHA1d0d34c631fc74d42c805ab8e7e81a3b341668d85
SHA2560e2645b5209a8c9a8f68e456c91578069140ad4119428a5251e377d5261b5fc5
SHA512bda000c16097b75854d6ffef16356dc7d87a56665827d7498f5acec4acd4c06f1bf43f5a5e3af1ea5288fd5cd3a1b0621aa94b4fa43ff6734102fc468e670500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5248a967d45cd2e3a52eb1a8c30a4993f
SHA18b513b62fcedf52dd8b4afa1e166ea32101aae09
SHA25654f52c334a03717f5d1a33ebe3e924634946361bcea9ecdfbf1dd0ce2e7257ee
SHA51226b3a46d1efe2c12e2c673c9b562d45e9464d588e3e3237edeccde9e179adb8ca04a9613c477a09b2963517c03d2e8874851213325aacc6d509c2b90f1421db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158848462d54007d8b21ca19d171a459
SHA13c716f1ec4d5e17d30dfc5eb8f14aa182bafbf47
SHA256ede3e0508ef38e95b20f315624520d1fd50851e62d83ec2023bf117a724c037b
SHA512c03ff5f67caaf8819e32e531a0e430bf70838ad782ab458ccc6b65f6c623cb4edfc8366c593ce2829698219648a4934ea0c3c8bfe20a4ebe1f81c44074b2fc6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab5b73403cffc271460bd34b38dd75dd
SHA10daea4a679ce6160589b6dfa9f98d6fe1535b894
SHA25616997e0c9718cf5cc007305f7d58f68ce7ca60fd22166967b895df41bac0741b
SHA5121352e9193ae9358d7fef01649ae00c19572986b0aec79c01394e9671e82d5798b52cc20c72a2a520009809ccef52e8647e8364bb03cad44b98c5fadb7d8f3ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57676939de9e43d07665387e925250ad5
SHA1c5bbe6b6fad65fe8a87d4a67d61dc037e8568127
SHA2564e9a29c1230f9f0231150a0e1950eb4cb20989f6d678e2549a0b342d214dae8a
SHA5121255f5e0409b05a2361bac3d26995fbae2671208c7ca57d46f1f4598c36acfc516167b8b14a8eda59c5a66ec7ac4b757f6d79d9e6bd9807deff779eb574da116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d072f050216b6aa13d52628f630579f2
SHA1adcd16d42280f9572b2133724ffdb1c96a5f79cd
SHA256b0ce7ba7aa31fe8c5563d0bf307185078f6757e4ff862a14a9a8d2ce5f6198b8
SHA512c5aa9aff85dc9a108a29f748a0a49e6bf68264c06db2f1c86b863a89d2ebd5e7a4e09539c9fefe9f219d48566291c69eecbaaad9722a542f6b0b08653e7aab43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6eeb55e9e7221e36883038be1a57f56
SHA10523616f703481a7928a2497b5240f48e0cb3c17
SHA2560744e075a128d76b3328aabd2ed3dffa9ec5737cfdc48a37645acceaad42b92c
SHA5122a62105a6dba732ac1372dfcf1675a9ae57559874040973a683234dd3f3788cf95b434942a3a86571502e859aa2bc6ea00535d6173726dfc48bdbaa20f73aaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f500d98575d233c4a745275613128df
SHA1b2edbe905e1f4df926424d237493721360cedaee
SHA256836375ead0b67d0aae0dede8d33d2f37af2c22f0fcac1abd676c0478652035f8
SHA51235df16d64f477df58f52deff3d4630d655c4a53d3f58f50505bd3c16d5fd315823e56f01e5513c261b264bbb6c34385fe377d21a84f825d097224dd71bcd20cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5520b9d54f159667712a62bdcc1129
SHA189a7def110aa2ee550a2421e0a3ad229cfb7b3a0
SHA256c3924bd98947334a12a0237b2c1f85493a0f9d9586874f4f02927d11215f133d
SHA51267783ded5bba98cd320ec9c528a1a63750be464f4d8122096710ea804332de043835044402fd223b9c5cc61842205e4712f61dae8a20e681c9a56b336dbcd403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b82e83914fa249645a3194443f3ac6d
SHA1c9e9b3b1c09f1592e10a4acc0d35743631457030
SHA2568cc7a668f440b9a541931182bc66f58f6c1070ff15b128b35f8943ee080befa9
SHA512f04b8b9c248d9744e2b3c0d6db33ed7706802bada48ce560de9c37371d858d216f2a909ef0c9cb8003bc4bbf430098797cba977122d774a9293cb0491cd6e980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe549295029908418bba829abc374ca3
SHA1d4375cd78549a677143c0ab598f4de8a1c3a1d96
SHA2563373b21cb898d99e45c69b0aa7de05047276e5da1e611e8ed69a3e9021c2b3b7
SHA512ff10fe5a06568df3fe441b8c5b5c78238e5081fc1efb6858d82f25b2cc848b24c67b29e0722d65c4bcfad53354640ae9894807922127b304abe64cfd08f351f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73505d2dc486474379031daca25bd96
SHA19ceab3955fc9edea22739fe412930ec320a71447
SHA256a93c846b0369ac3a9db11c50e007ae7ac692f89c86d876544ef464f046f416bf
SHA512a4b77a97feae2f946a6deef5582dd6c4e6cb0de5fa39562dcaddb7e047d84800517baa669569dc66b9012767385059bacbb37644718378961d62fcf3a3d5536a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a