Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/01/2025, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5678fd806c2b4a252a48b27a7d074ac0.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_5678fd806c2b4a252a48b27a7d074ac0.dll
-
Size
424KB
-
MD5
5678fd806c2b4a252a48b27a7d074ac0
-
SHA1
b479e77f9ab9d7c4c6fb88fa24b0671002096a6c
-
SHA256
6e66f79e6e0f747ef866aa42f1f78c6ed271085c63900883173c7df2d9c24d0c
-
SHA512
cd03882bb493d03b05fb5f56f90d037a756290d0ef0bf7dcc5ab5349eca324a406ec7481375df071e605d1094687fb437949b82d792704b467cca378514945b9
-
SSDEEP
6144:G2sND6Qbi3NetW6++h2NSjPRKZASYLuYssAoIDC:q7aNeM6++h2NSjPRKcLuYsHDC
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 3056 rundll32Srv.exe 2544 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 rundll32.exe 3056 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000c000000012244-2.dat upx behavioral1/memory/3056-11-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3056-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/3056-15-0x0000000000240000-0x000000000026E000-memory.dmp upx behavioral1/memory/2544-19-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2544-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2544-22-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2544-24-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2544-26-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxA045.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{364E13D1-C842-11EF-ADEF-C2ED954A0B9C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441899086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2544 DesktopLayer.exe 2544 DesktopLayer.exe 2544 DesktopLayer.exe 2544 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 844 iexplore.exe 844 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2028 wrote to memory of 3056 2028 rundll32.exe 31 PID 2028 wrote to memory of 3056 2028 rundll32.exe 31 PID 2028 wrote to memory of 3056 2028 rundll32.exe 31 PID 2028 wrote to memory of 3056 2028 rundll32.exe 31 PID 3056 wrote to memory of 2544 3056 rundll32Srv.exe 32 PID 3056 wrote to memory of 2544 3056 rundll32Srv.exe 32 PID 3056 wrote to memory of 2544 3056 rundll32Srv.exe 32 PID 3056 wrote to memory of 2544 3056 rundll32Srv.exe 32 PID 2544 wrote to memory of 844 2544 DesktopLayer.exe 33 PID 2544 wrote to memory of 844 2544 DesktopLayer.exe 33 PID 2544 wrote to memory of 844 2544 DesktopLayer.exe 33 PID 2544 wrote to memory of 844 2544 DesktopLayer.exe 33 PID 844 wrote to memory of 2816 844 iexplore.exe 34 PID 844 wrote to memory of 2816 844 iexplore.exe 34 PID 844 wrote to memory of 2816 844 iexplore.exe 34 PID 844 wrote to memory of 2816 844 iexplore.exe 34
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5678fd806c2b4a252a48b27a7d074ac0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5678fd806c2b4a252a48b27a7d074ac0.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:844 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c451369819a5fdb465352c4f719ea9
SHA1559b8ea3194d191eca1d44fa612776a7aa28c350
SHA25625f5c1bc4b738689be94a84e5c1fa90475fa81d616357ea5dcccc9abc97ea778
SHA5128464df4fedb1ddfddd844a760bf79958b47d6f23aaba99cf92d39d52e2a90639fed5d697884c742f6ab46026ec6cd35d981f0dde590a0d7f7e231b6078487bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57352cd51a6f13340f3bf6512e803f74f
SHA17b4f135e85213a8ffbf31e914a298111dc3f4d77
SHA2564d75cd909bc2fc0be05997bbd8be847cd1a9abeca9dba7ebc900a6f946968b89
SHA512502de55f21808b3713942e5095aa28db44e782198bd4aff1bf6f6f470640b37642575d31204dcd6a0cdf18d9589799fb08ee3dd3e89c3364948957ddb55cc081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07f3787f08f5cba0075efd3a9fff967
SHA18394d2d8a74e08cc28c443c260d3c4eeb2c7f719
SHA25671bd7734ccc8d8f3fc511855aaba30553bd022c386ed9e019bf5ad4bc94c61e7
SHA512e79b8633f896f8ec8939308c62b395a1dc47ae0d77dc9f391bbbd7e01c1b3304aced16fbd3c8755759b4f2cd68e25af2838b490433c1caae2e4296776165a5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57104d3fc71295711064f6ee7350acfd7
SHA1e7222ed43cf16015c35f72cece9a2c6f477281ed
SHA2565f5f846f1fa099a582969d5df84241b41668c6696bda2a862685025e90c622e3
SHA512b66402a5b6a84599fa4c15232662c520d3cffc792bfdcce20c8175f9db2741a7964928374b8ca2c33253c19049c7c64705e196fdf045150de0d0de953f557c62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072a50c4480491ae7672eb3cc12d5a4d
SHA1a0257621dba4306045712d412f09079d227d3ca5
SHA256e1d508a91df4dc087ec68d7bbf58cb06982018040792fa662c4ece99817f7a0d
SHA512da4db9d11a2899cbe02fcf9a4630b4b54a06ac30945202b9509238e17e194713d7728e260fab7a7e5945cc175b3d96a7b7691a9f599f255c60d4ba42fc9afe78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377420828356f9262650a548f06851af
SHA1767fdd68f2a958dadccc6436d1175b14d51136be
SHA256c178a7420ccc3ffd6cf522454735064ff4c0c66e4685fb910d04cd1a86cbc466
SHA5124ec223d78b4ec19b2b97b2104ec07949bb1283729c81e8eb23b2400a10875b6554066a8a1a9a32972906e304f2a64ef8253493364e4e29efd4e27621b22fb066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015cdfccce437b5bbb1a961f9bb69a29
SHA1c5b773cac77fc9e1a7a558a23ea0837f8b8c2bd4
SHA2560e9c40c19c1cf71f76baf15b8105ad061a627fe72076a239c4573d564b32726f
SHA5128e45c50f6b97ccec8a8fc2db8116720c0c4a161415dbe81de41b538d5ce4544b980d05c2562c5bb3a50726c17e05a26d8941c03d44710a72accb937eb8f0d007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3f9b6022ee757a55522f50253b99546
SHA13141ccecc76d4e704b5f164e3ca12805a471a8e9
SHA25622160e7c96b025dce43b3926424e5374d05ded5765b9328c760813f6892eff46
SHA512af940ee85d591960271ac9fd05ba4b091516703d71edbe05bb2e9b8a8819ddd972cb3269be548ce0e0335a2dd11678a55ed91d9b6336fed67621a35869fb58d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c5e8e5d585aef2cb6d3401f965af9b
SHA1668612f5d9c53e1efc73e8f694cdf69cfae7363b
SHA256b1bba08ed5006268482e379ec31f3e8b936e6aede8fc1472e47876dbcbe8ed7c
SHA512b512c57b1fabc7f8a0c2a3bfb7678b29142f305cd0368b8441ae7f60e0e358e4e9d430c60dc3cf409a6bf4c9010f3ff30b8635c5d6f38069a31acfece100696a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc140cf6ec623541b97a1a58bda597e
SHA1d02c60e1d59698c80bd28e16f2999a8facb93a67
SHA25636671523e1adb332fac9075777a89e8112be0f712758fec2cc18dc192e5a3887
SHA5129ad04c9fa2b54b7ca8274216ef88a9f28cbda5a7eef8e8c5929b72024f5b55d3ca6899d9b51942f60650bda027c0fdcfd8a2ebd221dc06a7394721072bbe91e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bb382236d3692572a17090efc1c7b5
SHA1c5d71c85a5270ceec08c21825509a96307dcab92
SHA25606909088ad97c8e80302ff0b454efc23f23d29a4567a02a23a039b4c05cad347
SHA51244a13507f4d24b262c2f8ef60300465735831e9a8b4209b51bdd6e9388275b997ce699483c01cb607cd7fc29847893d93773873959b5b8bceba62d8418fe8387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528efd566d1fe816a8d33130955796bf6
SHA13377ad533dc84f239f8718690aa000795ba5d13a
SHA256f3589653905240b0b85db0428eda0bf4e53f1f47c33c624848b7890dbc88e953
SHA51255a690f91baa7956181a5020e6f413a699e5e9d942d833805dc37cee0e5877e42c42a94151b8e4eff1df50a84d32cdea61bbc0c8bffabec34d29984da30f68e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56409a883e9b225bdb08b15fe3b809fe1
SHA189738d48f488fd2907b912c46cb56271efbff1b4
SHA256eec0ac2b652dc1c34a5794388397eab3ffec4ea0a937d44ac930f0ed61ef4c27
SHA512f5686a0a2a2e8e583539216d1a9e9af13c8ce0804ce72e5175c1c7876bdf83507d6ebfb95ddc0e16df4d1ee4402dd3b4c54cf00f86b3ddcbec1a472e925ebcdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acee428edf0db06efffbecaaa4829f8e
SHA1b866de293235e55b46c8161d201e89b4003b02e9
SHA256161d6c46856a9e0f2c19a21f6ea7e301eff4d0b7dde80fbf1b7ca48a7c726809
SHA512a26c335cf4c193edc7bb93461aa56df04df83faf6cb8239e0e9d226abd821876e9bedb3e23cb8bca04b7dda7e1effe677f740ca0db40bb14bd774f531a5d5921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5639ee4233b3c8ddb12955a3a3e67c2e8
SHA1ac0aa2284fc195745bbd419712f528ceaec2709e
SHA256dbf65a3c26bb3297ca3d710fa6a4d7d99c86702ddb9e1e276cfc1cbe56bb30e2
SHA512bb2e4dc6b5c2ca833031d715cd0dcc036f9fd7d61467e58d2956cb1d90efd4cc358a933d4c01c3f2028eaa5984c5bafbf46fe82738c568e0d95ae131e30ed89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5a441a67dc80d8da2450885b0943ed
SHA118fbc817c641b0065a4f51b9595484e1a57016f4
SHA256c20b124e835f5e4c756d772650601ea4b6479aa3a671a0754296f8829a6cdc01
SHA5124f8a1a05dd9d6bc651d7031a6c755cf486213eff29256470d06febde4fea0ead61b84946ed50cedc405ab27c4e90feaceb00c33d99ba3ea15860c39d41748ae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc6c08c7ea9f1cec7836e5004ec0c9f
SHA1e443c4f7a7c093728c5abe77c5f09a26d51a92d6
SHA256bce5706bb814c1dc68934e359617357e9555f4a01d53c053b3415da11dd761ae
SHA5127013005d45574967352fb61d720d68661181d9e17013206d959cd7f20abc20448cbca767245c1eb129f1e72e7a535ab28eba5dff7641eb5af3cb1f33bc4ef895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8afa29d539617c796fc11cbd6d3c1c
SHA1c33cb58bb693d7d229d0b3d7576d56c02f5e99d0
SHA256ccacca9a5bf680510429d7bff91bb988ac8d9380979834347100884225b98b16
SHA5129646d73f06659559976d35a7e74eedabc98b976bee1e9c171959b596b75076eac7a011ffa53a6fccae28573e79cab491e60e5b4452aacc0a2a4f172825fe9524
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a