Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4edc0a2fec9680dbce0d9df36f275ca0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4edc0a2fec9680dbce0d9df36f275ca0.dll
-
Size
616KB
-
MD5
4edc0a2fec9680dbce0d9df36f275ca0
-
SHA1
c9c83b36855f22831b475f4ce6790a7d55d48a3d
-
SHA256
0f39601af958f59cbcf3852168e030ee9bcd4913e0c21d6e4f3c9f4894f61331
-
SHA512
3c3be3c5cf5198db67285238744bff4680b046f8b3b5a5d22b35280b01ea120f3d62703efd45c79b37ed93a1afa3ad104c94515032c43f0b57a01c9e45bd30a1
-
SSDEEP
12288:e+JU8nPSoBLSCO6KDgD5ZQTgZT+ioIhTl+BtXDg0TnoxTG:eOhBOC+g6iokT8BJ00T
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2836 rundll32Srv.exe 2704 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2308 rundll32.exe 2836 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x0008000000012117-4.dat upx behavioral1/memory/2836-9-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2836-13-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2704-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2704-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2704-25-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px7790.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441883500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ECFB4E11-C81D-11EF-8318-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2704 DesktopLayer.exe 2704 DesktopLayer.exe 2704 DesktopLayer.exe 2704 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2828 iexplore.exe 2828 iexplore.exe 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE 2824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1856 wrote to memory of 2308 1856 rundll32.exe 30 PID 1856 wrote to memory of 2308 1856 rundll32.exe 30 PID 1856 wrote to memory of 2308 1856 rundll32.exe 30 PID 1856 wrote to memory of 2308 1856 rundll32.exe 30 PID 1856 wrote to memory of 2308 1856 rundll32.exe 30 PID 1856 wrote to memory of 2308 1856 rundll32.exe 30 PID 1856 wrote to memory of 2308 1856 rundll32.exe 30 PID 2308 wrote to memory of 2836 2308 rundll32.exe 31 PID 2308 wrote to memory of 2836 2308 rundll32.exe 31 PID 2308 wrote to memory of 2836 2308 rundll32.exe 31 PID 2308 wrote to memory of 2836 2308 rundll32.exe 31 PID 2836 wrote to memory of 2704 2836 rundll32Srv.exe 32 PID 2836 wrote to memory of 2704 2836 rundll32Srv.exe 32 PID 2836 wrote to memory of 2704 2836 rundll32Srv.exe 32 PID 2836 wrote to memory of 2704 2836 rundll32Srv.exe 32 PID 2704 wrote to memory of 2828 2704 DesktopLayer.exe 33 PID 2704 wrote to memory of 2828 2704 DesktopLayer.exe 33 PID 2704 wrote to memory of 2828 2704 DesktopLayer.exe 33 PID 2704 wrote to memory of 2828 2704 DesktopLayer.exe 33 PID 2828 wrote to memory of 2824 2828 iexplore.exe 34 PID 2828 wrote to memory of 2824 2828 iexplore.exe 34 PID 2828 wrote to memory of 2824 2828 iexplore.exe 34 PID 2828 wrote to memory of 2824 2828 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4edc0a2fec9680dbce0d9df36f275ca0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4edc0a2fec9680dbce0d9df36f275ca0.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553611522a96c5c6f8c52ea4e51c29189
SHA16337bbee49180ebf90afccef09a36ceb513d240c
SHA2566783231c849c16a0cf91b814fb00d50982aa736f5ecf175a74495a0c68fd3bf6
SHA5120c5c2cc44800312d6d3bf49546aac31a3a7d7cffc5605052544519853e5969c0abbadbe6b47e4ee00bc3742b4fb537dc386ae2c8cdad296cc0aa4f4a08ca1819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53499d646a20be83a755509698a96bf91
SHA1818b65988bb61f2185fc225cf9a2aa3d12d24951
SHA25623bcb350af8c7afaf6f8867dbac8f0efd433067a16d63871d029754c5e1d34b7
SHA512eefd67e04bb7d831b1f38b67f0fd97e0be05383a77f31b3c677d07fb2792cb878597b3d95dae3e22a8602ac2928fff2c80025a8e92e8f129f4c2a7e825c24e3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391a7f456f337c2893153c7272ec8247
SHA1f20c90020b3205db6d1fde28bce4258d0167e274
SHA256818797cedc3d7968d951f39b6119e261dacb9ce66d07d09e5e2a23bb8ac85fdc
SHA512b416e95f9716ea9a514e7c91519f2a32975aec276888dc098d9c97696d83adabb0846a2599807b62d198ef00e4d410e75d142c20b9d6cc2d72f11a2e6b9edc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5eb0f53254e4de89c390cc4f6053026
SHA17a5f659b1ffcd4080a93ce91ab4e0b85afa5b858
SHA2564b7ee640627fdf6ac67b05212978ed8744561e52e82f32a33908f7fe79577007
SHA512016c1d89a0560411aee9ff1f868740f3378e17281a16879f9af5bed9b70852915c6898e390c4420d00199c5717f8b244d223788b59d61bfb6cc321f24e1df8d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c170ac6b153a7074bce9c8103cc54e
SHA155a58442f6e58d4f69b40659dcf29a2d0fbdec51
SHA256a6b01a5a4eafba710c5914541280a5415461f059291489b52d56637655405388
SHA512a7b591a16f577886cbfe172ba3bbd79b2ae723c44dc07793a6eef81daaec94f23ad488222c86cfa47f43f9fc9791ffba64ee5cb33fbd319694e1badb8fa91ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d087f23ec59bef10eeb9cee4a58000af
SHA1fc807a50193c2d463def7766be09e6996988d5e3
SHA25640b3343e9a55f481d97d04cb8619d284df42ef1ad8d8697c46d34588929e3cb2
SHA5126902e3bcc6cbd3718ed93ff09dab95ed28f8fdf465fc1cd59dd4d692a116cf3e357a47383f6f4d1309777c0e2691b3974b758a83a3cf4079e33b9700b463ce81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb7cde3df870f2a81b0a0d6a530e045
SHA12b656a10588eb435e5829d8f3cba5d703a306967
SHA2562f87c097b2726f3fa5ffbd26cde38b6b4bbf556fff8d34939cf4e6f40b22176a
SHA51298efae9486b0452129e0335a0d0637cd6e0dfd101846133935fcb45ce2477b4c1e022bea0dcf6b298817f776c267a5e96197ce27dadefb046acd61a317b9887b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287ded44fed1814a222ddfc25b6f89df
SHA1321eb9cdf4d516c843161e9c10217b3846346d5c
SHA2569a0b9a887e60ea83b615c752abfd20d9c2005299036cf99264f74833d6ca9a68
SHA51234d634581dff6d0f6deeadf937d6f820c19b78e9f13de0e6705de25d7354e279e0f6244551ff966d55b7e7b229416a6ebdfc3f5f81f8dca78a55697fa7f62557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f8cf864dc8abe04acbeece8d25e512
SHA10318b925d916db27c316e62b39eec20c4b2423f0
SHA25650c9f67899fe0ee9cd997ed10c24c482c1316ee371cb4ff67f5efde4ce842392
SHA512496c52f86a20e5e12c936280bc5fe49322a5494671693c07ee9be6a2bf0fd3a0f2773cb0dc4dd3b5cea996ad05198d225fddcde107f8b6a451d70c180f84b5f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc343e212e5f6c58479c89659b15ea3
SHA131be49f7ccbd8d1fa04a2125f09e4f8f2b813437
SHA256b9401fd5b93a93ce1c78966e5cd16e872046ed21f181c7c8f67742dd5ddccee0
SHA51287f042405a8debf24313e89691910c3f0391b8b57ecc36ea4a98fee60e876051fa891832d3c4feae28c89fb4a7f6a72a953210836d9ea55ceed498fa7ef61131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa60deb0495dba512287ba487b3778fd
SHA12cc4a8c3c0dfe9302eb1cf4418b2f0d960c0c64b
SHA256df1cac08b69a8b4b5d25f42e8a440bff8bd3d13303933524a4cc593ea9fab954
SHA51294d68fe923ecee180f3edd31388293c20202feba92c753ac8c990d08a17f4d438bb079c3688bdf4cd775a0ca73cb46c76a196931a56edb540991161c6f89258e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6782aee3bf08512068d5f663969613
SHA15ac64f5ef5ecbf47897be42a4e15135633a26f5b
SHA2566b141340b369727e2390e2f8408c50ce8b1280335ceaebb5a8e188c938e27198
SHA512c749068d4b902204c7fa59dbb4b599a9a873a73aea3f972e72608983c8bc2d8e9febce0496877392bad19d42b77505141fbe03351495e6d37b70e38cc14adb50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19cb399b8d11b21b311588fcb998a52
SHA182ff6aa7a4154d4d4468903d649e789ade4e439b
SHA25653a40a1305b756176e7042354ff8898ff4dd1de73d16454a1d7d198102f87343
SHA5126151cdede8f763f0f471d042f05227bf52bfb32fc66ef6aab8ba0611bc64de80d6912d6cec40d68dfe1be2eefe5bbe44b35bce964606997eddc0227946cd0a3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589aae4dfd325ce45cef4a16daacf3082
SHA19e6b53d30999fc007b4279f0b7dc884ff7c18417
SHA2560b33e7d98b89fc66c948f49e41979915f7bfcc475a9348107d2fdbf7941d75c0
SHA512561d50dd2ce0cab014fb0d3e500a419fe8017004e04c474e911c1966d99d8787c60b571d253a1555d3ba7185f57bb62067b7e60b8e6c96222718b47727e74da0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c8d1c4d487b0aeda16945e5f04db6f
SHA156f7d94c39bc95a8bea08b010f4e1ba30eea5563
SHA256809bac8636acbe7fca1212120e3d5c22933e38dbd4a88e735872760ebdb7e950
SHA5124dabaa68eb1e32dde03ed9e4d701016a0ea8edfde265d24da29693c75885ce39b1fd1bfa43d89a804c0fa9c54b74400f02f5a566cef6d925fc9da70f2c931ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b5dd7151759fec192f0e374ca1e2307
SHA10749a7edea8dec5bc909100c39a943dce4307445
SHA2560045adf1f6380189f3f88bfcd55469f07155d0066b01cb1f43f552493dd15196
SHA512d70f462cc08ed3519b28bb01bbf4328ffc9604930633a1290b79e2ad35af1b805b7e3c3d3dd515f7b014cf6f163341796552ecfee0b1754a21e25e7da36ac0ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec1af5d0687d6f37ebb5a2dc7f5a068
SHA1799fbff5530ae8f3fe175f3ec389631afe0c4a75
SHA2563bac3875bc9fa512a579d6e51e389476463eb3ca41c51c8e381aae6ae26a0e7f
SHA512a152d76ac8623da0b1131c6ee8031df28824faf9706a2e5630bf864a088e338e89c6760b0e3764fcdd23be33682167b98d727c6bb83a9ac2c32cdca2f89c5e50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58aff51e35e637bf207b2ea04a1128b17
SHA1022087839da66020cd570d3ad29e0f8bcf110c3e
SHA25619806655146dbac5f533f1e42c94f2ca498973c82af80195e590e93d027d9de7
SHA5128fcd438d0ddfa8d39272509d0596baafac25985712a29ed926d9e903f540b4b33cd7d2b4e50de81548b4171f35f141042e850360216f2c90f7098e01234394a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a