Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 06:24
Behavioral task
behavioral1
Sample
2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe
-
Size
13KB
-
MD5
2b4bb35bccbd49ca9d607a5cb5fc4c23
-
SHA1
79eff2a4fc2b3366bb9a77ef1332a2b73db18e7b
-
SHA256
7f374c4d2c762205da6c888124a6224edb5bf12a9aa19ba2e160b9c0acd8dc72
-
SHA512
81dc30bf077645887d9c6709bad8f8360af83ab1ffb248597a2cc8a6810984b0479ec9eb72337ad1063f4b82ceb81cb5168b80cd1762162b5fa7f2eeb1ce5251
-
SSDEEP
192:yS4gbgkAN4SJj+bfrJsUwv7E6CbB1Tu7Br9ZCspE+TMIr3/bjOg+vtwJr8:yS4uI44aJ+7NM1TLeME/bjW
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2476-0-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2476-2-0x0000000000400000-0x0000000000408000-memory.dmp upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000394becce53c6424689a9a5d988e4fd2700000000020000000000106600000001000020000000e4f17d0bb10de9a73cea9381eaa7157e8342831f9098d58a75563411d0282629000000000e80000000020000200000003b9eecc3117426ac734383354f6c75134af410a5ee29b1124352e5233070b9be90000000f91b8f0a14191bc7a6bb0e0fa2ad8ce6516be0c357f51181d9c0776eb390aaaf46657d699f8ce198f6f0411e86d122875e2df6a4d7d08efda8a653e8a9b5adc5ce56ce1eee9a244802c7b0f30a70a0fddef53dea22c41afd34a6940d49f94a8f8f28ea5dbda13c7ff683ad9b81a9afe8a94d0cc44a13dc03dc0da570520a183a0ee0c617849f12ed518676c3d7447aec400000006490d43edde4a0ddd33d59c59e8494730856909d2c8cca88a200db9a00c765e1300ffb9c1eca2b1fab0b1c1c36fd3a83f8979629ece47ee666a8d70873148373 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908599742ed1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426601850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FB3E001-3D21-11EF-BEEC-D20227E6D795} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000394becce53c6424689a9a5d988e4fd2700000000020000000000106600000001000020000000a81ede1a75998f28a9abc3f8e0f0c60bfa6c8bf955f6d5d117e393201ca8d215000000000e8000000002000020000000e84cbe5e4339e74499914ab9163f8e623f12454c49d7e846847bcbb534391af32000000020c0e86f1c4970f50d44bba761c41403dfaed179c083fd3dd13974708e5cd65340000000b7a150b121ae98c547f7db1231cd44216990b4ce0bfdd8ef18b8270acaf4c3ea37132f443025067e4348be7f2ad3ba2a9cec2987dd69e1ff3bbd448624ea20e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2476 2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe 2708 iexplore.exe 2708 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2708 2476 2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe 28 PID 2476 wrote to memory of 2708 2476 2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe 28 PID 2476 wrote to memory of 2708 2476 2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe 28 PID 2476 wrote to memory of 2708 2476 2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe 28 PID 2708 wrote to memory of 2532 2708 iexplore.exe 29 PID 2708 wrote to memory of 2532 2708 iexplore.exe 29 PID 2708 wrote to memory of 2532 2708 iexplore.exe 29 PID 2708 wrote to memory of 2532 2708 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2b4bb35bccbd49ca9d607a5cb5fc4c23_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=432⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fc76a1d5fccba0e38403437e76a3b39
SHA1659aad9a2f25b9649fcc70c510099f53593f005b
SHA256c57bd108160661c1c4327a74445b354008599748fbe0774880cb7c0dfafae2f4
SHA5129cdbfba2125c87edcedba0f55f39e11e8d368a151eae04c5b6539e8da7bfe38f0cf71dd17835b07ff029ae274e18bcc2ea9709b3eee07ccfb384d47fd49b5e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b009b53fe533218f4645db5c1f87890
SHA11bfeb7612c03cf356be467bb035ba1ceb975f3ae
SHA256edae031833f96b971c1f37e397e4d826a6ef225a697d9f9abe712b9f0cdb75de
SHA512b86a9986767ea012ab63555341eb765572fc6cfa8013370afa62dc040968e04e5b4a18ed401d8ae3dac9c1942aebd22e3cec2394bd50de02a963045516e26fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f860c87b2099e7b3210fdaf0e7d9296
SHA103d8a903fae4f8b7c49852628fe42ddf9f2ef5ec
SHA2567e8eab09903d349c94c8fffe45bbbf40ca867ea9b67cfbb599a4dece8af5c375
SHA512da44e0764884b62cbeaa8a705c425c03f83cee43375d15ccc4c0862e63260c66ba9931b4033fb42ef29c6b6171a3db21cd48a88300449b2d893c9bd663042b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f6048d78b54d26a331c800a95cb79b
SHA18d34c67d1779c7a180fdac31c2aa587bb4ab3151
SHA256d92298b27d98d748bf497e4549c34850fdb4e984f3b82aea8724ca5e904e7297
SHA512111c2f599b2a589035007eb8900738aa7a4b3d296ba69f143fd29930ed406f454c8aa6a681dfa2a551ed23af6bf902289e4cb3c171ac04d7b68974fa7b092bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579049e95d0aa1aa26df43ba40f36e6d
SHA15f1ea4db3159840ba0ac8b12d054710640c404d4
SHA256c81f5a282266da4d7e5c35b42f092deed8657f76ae441d0a02ff1358095faade
SHA5123228a53307873c86de3ad0be3711cf6376aee49c1032297d935edd15b750d6aa50089bd088763fb84643c4bee989a04617b46a34eaac44b156a8427904fe5928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ac8655b9752cc2fa50c94cba576ec24
SHA1445c0db51e692b3d08580544a196e56b529b9256
SHA256f1503f65a4fb878aa0381be2ec5c55ad377074426db625e15fd1458234ff1da8
SHA512332418c79d1330f196e85901ecd7545dea002d2b33ca46fe52b5523a33b8542162cb5731c3844aee06a2216dfb77879081c6e2c707c791206bafb5a0438f8f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58554d031ea06b292c043693b3782903b
SHA176bc1cc613f8e82e7ddf0365206ae773f1efa992
SHA256f178f4cfb306cb7a1c5506e6f24d4d3ed63de5611e8b4381cf01ec1696ac7f88
SHA512c114c55785e1f455e37ebb0c6a29c53f9ff1c07bd7fd60d5bb5e8e384e2f66b8c705c46955f159311fe4be9ccc663187f171825645cbe127586b1963a47eae2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5ee017c3c98dc483c06cecdeb86032
SHA1851ab72f0752974a725aa4ca572e01e568d27d86
SHA2562509b7cb6d62b231a9d5ad2848304291bb57483291136ec885aebde37c350d1f
SHA512d04b6f6f7872982d6cce0dc44b0cbc11fa25bbe9f326f2dbf17f95135f6b475ee8563fb2d939f004b21fcd5a3705808e916f2662c47178020ea51ecea0ce6c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57364a475dd3a5bb37ee363783852b5b6
SHA184bd685adaa1dd9214c52f77cc532af912fec050
SHA2561458288af8f29992105b6e9589dfadea70ab91b01be8e9da51d907f61fdfcd9a
SHA512ccbf53b52a359dc106f94364cae4cfc698f74d586901e7e8f34f152419993fc9de6e7f69a0be53c016c264375b9c3dfa902c6ea2d96ce074514d9d79178b0229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0de9700566000cf405ca409fffdffda
SHA1fc2f2ebcec92006b45dcbe8b207e743f5dd422d8
SHA2563e9faa1cfa9a30839eb21afb0989f53a7970446f99b1c799659a2effffc6a081
SHA51277a6f1c384607161e50fb53bfa4a1ae723933bea667e5b441788851b122d66e6db6b20c24f6d46ae374553afa819b78dd758fafe218c23e7ae027b4bbf6eea54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1638261e6b015755c6044be9e2e3234
SHA1b7da38d176d73adb614d63cd46eee273a86c9492
SHA256f05d177aa5c2f58c02530b2a3ca62b7b4d43d1aa77622d7bb17031f8ce1c7a95
SHA5127aff798057152cc7fedffa4ae5ef20ae058243ed313e348fecbf7587a83cb563325a4d29bc9bf15b2cb9b3c65c705a85e57dcaf49a10fdca1b8fe33f4e31a95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae06d6b0e5b94581b2c2831dd3c46e9
SHA1fb716989c3380d964dc07e9bce6fa9074223f68d
SHA256689c153d0194525ce38ad42704b831b49cb02669b9e1f4a2421093a4543bc7a2
SHA5124ebffa5ce7b8f8e3e291cb2c55f46f1bc89059dcbde6123ae1837023b5e19bbe9b41a421153bfdbfde7d660961f626da15bd13df25e6b02c4e8e6112159963ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a0bc61df91f581911f3eb556cb7764d
SHA1f50c0170d40d3026d4aec19ec27714b302b868f0
SHA256b9bcd50a21229614e818a079508ca9067f88a80d5b1ae197e0ae4b19080397b0
SHA512ec9aafac724d283eb5aa4f7d4e8868e856da52571eae197b54bc7b4f0a0a185b3915c4da25d864e74a7fd02c5eb33a6e07d73dba90184139acd17628275c83ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56286d7d2c6f91a2537682e86961bcdfe
SHA1d8df3afc68d3ff9f0b0924327fda99e4a9c2c255
SHA256e377a7991e6282d8897c36fcccbc29a319f727a94242205b2c56000dcf9bbd74
SHA512acceba30544c46b6991dd70e10691399ae593709a9934b4290fb4efa52bb84ab6763d021014a5f4575742cdef1ee02808b3e7423cf0761e0142dc94c10bd0f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74e1a72272c8e4b3d14c0301aecda3a
SHA1e519e670b2e38d653561b7cdf4658d0ec40bcd46
SHA2569cbee3702549ad10e074aba998c799e5b5820b362af45194166df7185d11561d
SHA512d56134b865231752d140387d8e2db66b7f19bb129c81bb5e504f14724c5960e0ced9fcb7c876342b41a88d11d4c61f3475f10a535d1324d97a01033e0cc6e90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2f83020e091f8bf2a17f709b0d58ef
SHA1dd258eaf1a9918e0911709b192c4106a073307b5
SHA2562c76d4ed20f480dd6f3a9427b08ae9af7f478d9fe7affaff5997b13e7fe37491
SHA512c4fe976bc8e60f08e457695bc47314da380bf87fa5a4d542dbf84d704476dca367cca7d318d4df4bda9da168967d2d77c187729e9f7e5c9be13d415c218a5a0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f505f0e40dfb1bc3ae3a1813f8da3b5a
SHA10b571d911977f069068707c43abccc338ad153ab
SHA2569fa25c5fa9293c11d0a9ed297c35cff92efe8df00bf989434a65b55446ef075e
SHA512279292b3dda2172f8cb3159a0e93097279076225d25a20b64f0008837edab27696f389435256d8bda4525addf75d2a4c82646acd2f7925cf69d9ae7ec2a961b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c5e6300253382405f1a5a12a9c3618
SHA158786977310eb37d0d1034156d729e21b6350af0
SHA256032f38137a4b5a573aa9c8244d6c27be74ed17bf5a205f00de83888b05fa7b53
SHA512b5e1260cb4d2f27d2515a6cc74b7711e5a3620cee62e1e0b10bb23e8685991dccff7699f49c2c88d1a1cbd6aec4277e87f2a24eb18599cf5146043325346a0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f89b3c694b7d0f5ebcdd5c3f387d315
SHA198fcb177f76ed936b9cea521b9f20e9d9b66c36b
SHA256ca5f122b0828e7a939d3eb205b2fabfbc3f87e809e1fb0b1c30f4a3da1474d43
SHA512f1d0bd6284582e4df8611bc40da598d6cb7a12eaa7bb0f5179bb458acb699161c8d0a466f81add64451f518b22f11875f0d3c55209e783ae3ddd52c59621760d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b