Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
8d2a3a059c2e1cc0cb2bec408733c7dc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d2a3a059c2e1cc0cb2bec408733c7dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d2a3a059c2e1cc0cb2bec408733c7dc_JaffaCakes118.html
-
Size
105B
-
MD5
8d2a3a059c2e1cc0cb2bec408733c7dc
-
SHA1
792b4d4584ff62cddd2c772bfc3319cc6ff92d00
-
SHA256
2bfabed46a006e38a9fcf3f1a79dd4839fff3c2bb8eca4e010910a60d490bf92
-
SHA512
eb6b9ca8a70e6f4f8f54749c02d3f1da66e043e7ef8ee15e54016fc7bd7c87d8bf3a35b64253baebb2b6cad54c8e69a31f44c411a34f37126f7027033cdb4355
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74DAF1A1-585C-11EF-A817-DAEE53C76889} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429595826" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006a203d08606e74a420690b2314dc24139fa3543e1769d11d259f6c00a890321d000000000e8000000002000020000000288f742b01e79e3f22a074beac316ca47c9df2810643b75ebec9794da448fc1f2000000058365d61e057b934ffc6e35668b6fcce54a0d8350f2d87196e9888efbf010abf400000001f9d481976e1ff68aa78cc85a437f9f2085c4d75d50cb4989643491455c9788bb5770c1d1241d8aa5539000345445094e2fd9661729ef51ae2a8962b12bd20d5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ef414969ecda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000d00c3ccf424b76a9cea98a7aebf4e8b5fca4909f2ef8cece051a262fe8452ece000000000e800000000200002000000095cc19e926ac8f089881a6e217cb20de98a5f99fcf1dd57757e421dbcbf264c49000000068637cb64933d922fe61bc1b5a473e8c8fafb6b3f8ad89b610a1bbc4bcd399090519941582da844108f579b88a4259972489a55c2f6af04057313dc0ce62f0a3bc17fd37a3c8f00e1bd8863d99d8559b6b4c853d5234fead067c8fbb25648b23b7de1d369199eb8c888b3dfa85748bb0badb82be228e8487711278934f88841559a7ce944df5da4d7f00f5fdb8fbe4c6400000008218f90a3a5eb8a9ce488507237374253bd4db745394f4304e8c75d7120321a548911691999d3838c7ae39b6168f9411ff4599e7778aaff529c2c6d859ee51c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 836 IEXPLORE.EXE 836 IEXPLORE.EXE 836 IEXPLORE.EXE 836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 836 2972 iexplore.exe 29 PID 2972 wrote to memory of 836 2972 iexplore.exe 29 PID 2972 wrote to memory of 836 2972 iexplore.exe 29 PID 2972 wrote to memory of 836 2972 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d2a3a059c2e1cc0cb2bec408733c7dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5013b44c916c1e4481d1e8d1ffa25bad3
SHA148adb6db5caee2846464662149de72784ef3ef1e
SHA256ed2d5e4163f5035bac41de8ab002a27d1fdf36ec002feb4492ff06daccc544a7
SHA5127177f1b8092b17b6f510f3fdaa0332849291a2c3a8a54f98558b44266af37ac5b41b5771c465c6dbaf90ff388f15f188b4ee674cabb307e86ea9c230d791f8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a744acbd0439a763e7b3d6b7c9a5fec
SHA1547bf6ecdf55ecbd05a91e25cc9c8ad3e9f98852
SHA2564582a491f9c1c18658843c60ed85cf5b3ed98d83bf11276ac8368a8b2d8d9a59
SHA5124628ad8666d58edf18b6bec5b7c5cabc452ba0662db768da591908062472a36a366824e0e8033a54913da7f7cf4cf2672edd7f7f65a190ff13ac11ca921d7bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c33d8ab1cad0afdc6f5c1b50bc517b
SHA10211656c1d07c96d492db2b82e12aa2d87fd6d35
SHA256a96ba53c3640b0a628fe666a2cbc4debbe846326f5768129cd1a6eb52c4c5c22
SHA5121bb48b74976e3eee380f8a90d30700804cbc7b639985ea2ddb4ac5cf79076c4a8b67b65c9bfacce423468821725e4680c628b264d21ce832a72ee4a74d066e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fbd544e74bc2735fdf3d7290d7249e6
SHA1bbed56017e1118bab3790909fabed087c78c6a45
SHA2568cc95c45e5aa0ddab0eac8ccc38ba9f02d6a77539b9bc2aefe5fc877a2963a8e
SHA512f1c7532878fd423810bf696d5951d0a56f0ad2e97e57c5cfd733616de9cbed47e9efe22c8eb6884102754b4b95b39f2c64b4ab916d64b15113a3e01918db91d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c206ad04e3d7aabf10ab0c5525ccbde
SHA1b1e68025b6f5fd3f379e595f5373773d42d94328
SHA256ad3c2b0f8384551dbe3dcc7b2dc1aec4d57e0e63316c1cfd9101cb770cc952d8
SHA512ea5455b9a4f8c7a5e276f98e67146cd21d251520110965182c5371cb9f13a1370f857a5c9123a8ceefe06b1cfe3e9fd0c29e6a3ce7a257bf5f669d039b94b12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53509f5f7b2b768eb5eb02135a3127ad2
SHA12ada07308018a70e4868b09fb3532c38497a52f8
SHA2566972a588eecc008aecade7cd4cc246878aaefda1c14d37a6e977b57a44cd87e5
SHA512179f98001930ca09347e14a27aa5337fa5883729237e851c3f31714cec5d7f4ba26a7369cb8f7fa030cc2264d9189419df9e740af95fbe04832fbec8a92dcd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59915b3e60a11295d4ef3ffb73ed560fd
SHA18cd18159d63f8c1569716835ec8ac6ca9f033eec
SHA256e5a5d843bf11c7c73bcbc717c65af669d8385e224846fb2761e5f2768285739a
SHA5126576bf86c0df9c56777fe875e4d15f1a32140458e83a985eb8d67f6a2e41bb762b3a3bf9fc7de5d5f7632f01314313a809ee38638f04824ede9a347bc2a0b756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53206e4cc84c6023828ca5954b0295187
SHA1e02d5d9bd1eebe6639ddad7829eb8d9a55d1d738
SHA256dccb9d793d36acb4a303a9bb51acd1700b8f49f9a827dddf5c9fa87ed77ba3d5
SHA5124ac22a7b3e4b38b471935869480c024809c81382bd32488d2feb06dd8a9f7b22a51f529d06bed41602356f3c9dbc9351b08defb08ce4464ef1bf796183f905c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57085466026c00b5a3433159275ba2bb0
SHA10bb85c2f399b8fb89ebc6518c099f2efb74ea329
SHA2563818bccbe5fb842a1670477b24d3dc082445db6440f5657e3b8d1ffdfc71847e
SHA51247104a981c6841c86fe820d059f4498f63047d3bfd808c152701201841b908e2b126f50af126b4d8c38b3be4e97980dd5c433bf9723569e815061e57ae8307d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540baec5f4257102d06db4c136c453d77
SHA1b34cb87b6048cbdc00ff57e75278569212fa66b7
SHA2563311a31cbed5fc4193588ee17a779079a464919cbf8fd92e09a7508bf6fafbb5
SHA5125a0ca02481984060663040ec95679df57cced1890358d087d03707d0d4a919c120d0f0370b7d2fa48dca6ac83ef94fd762894b265b6a69b971a80840b2584016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536b9b86c50d51988cefb229d32cfaf73
SHA16cc4018bf9778ac53161127462a5ab462c6b1c64
SHA25619fbe7e8e15e72e0223cfe6602f75c66026db50d91c21f907c52a5e242b98a8f
SHA51242aa3e6b224d2abdb38dbaa12634d6f96d10d1758376f15a0a9f7d4751907814483ebc2a92497d99aeb4afd815f54ede7f87fd44d392b42acc2c1bd661c6ea30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fae6494c04c2f4914c83c8d1c10de4d
SHA1be998934b2bff2954206383f41b8280a6f458d27
SHA256d6f8947bc0a7957f580d7d2b471917e48498e00b80012a77910ea5a148f9f979
SHA5128fea972eceba5a643120e121063fb29375f1333526bdb4ab3f0f3e8dc38922b319fc442bd879f3e9c461151716b1131a46e55485dde851112a0f0c378a849206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561765ae0dfed4b280d74493d47542a41
SHA152ab049c15ab0821ba0b9be3d74c9a206cd5cf3a
SHA256fbcd0cacfa1cc396a0a514bc8105e06853b533a84bf16eeb3ca14a471541afb3
SHA512e413d15dedf74346043357a86a00c24ca7738cd07760eed36c08b1091bb0364e871519cd2f08ec5813c0406716361a6c24236fd044f353b2dbddbed19017f2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f4a28251fad415e74678044702697da
SHA1497551c4d45960967c64ef4eedf68cc73e258a48
SHA256e837c244648c0fac145ed1d05b83d74034a529425215d5a10d3325eae1fb3dc1
SHA51221d1e4625490dade3af7d020fbbf5761708d996d6172940ca2e23081d84d319147f1945d4769769ebcca2512a9028a0a78339d41526038707c0a6fd0abce7229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddfa81ce96a75e514c93322885b5e4e
SHA1d3b8f660517d9f3c1019b9b8a64c857b757529e3
SHA256b28e882b99fed91b05c63664158cc9dd681f97c0ea0eea323e7fc6b52dd5476a
SHA512ad37bece97a110e75f2e096a9e2caaf275d95a3b7744042ac743d5f2dd495abec1ddebd80755e06149c925b28eccba9293419b5058267651f0602caf232b56cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec005d2a5db7d28fcf050fb13a4e55f0
SHA1083bd78b814f57894b79863e597a91cf86c7d4b0
SHA256ee93b7464f77f4d7d5b783afc4ac6d4311e121e897154b01d642be82da7bb66e
SHA51253bb5e6cb071d9760f442119c5071587ee5e82e4ff45bb5750958c9c73cd3e7a48ccb8699243d03361111eaef05a50123ffdf813446854762d911ea108e220c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878fb0371f7515de9968c2bac75fcd79
SHA1b09c80cad418f0f9c7b37787cc8f89836c82e7ef
SHA256c1e348b30bd6feb6fef2195055b7f121648e029dc2727e77732c12d59d0633b1
SHA512dc54fc5f8ebd91e3844e22791e00dcfe41a8a62eecc8d3df7d4bfa9cc40d16a0ce351b93addc8d0fe276be8758f6f8b06af927e656fc61fa52d4a8bddf0cd1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dbe5617ec19ee718f3d88f6bf337874
SHA16685493056cbfe686dbbb986b435640d57cc1194
SHA256ed4f971d4e9b7cfc3003df509f4fbfb92fa3bdba44caf81b50e372e85d573202
SHA512501ec600a398d5e4d869e763610645a833e0a4fdbce027e7c1639a32cebb7184e3b74a578e5253ec725ac4cb138cc8734f18d2bc0ae0efc76b955484173b6bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55013e157da2b26b6a21d2610fb45e7d7
SHA14a8f0b2be8c13b7df250731a567b0a821b6ca7ee
SHA256278d61bb014c743d176a12fb82e1e7122f5aaa24fd448440498352a11506c70e
SHA512eb069bb153596078ef98c112f38100a69840795c5a6b10187eda12a0e1476ac92929d8de6b0fbc1170af759b29666cc7ec5d4198015d5fe78c0d55d5824e86c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68f5bca2e75563ef607a5f68815f252
SHA1bb28105860384a9c5421124b6492a9bf67fb05c8
SHA25686036e7c0e7e1e52b87f56308e76ebe3af31473759ae0b79cc3e6650c512099b
SHA512754ee9bd3a0f230367e7646af2774d62f365e54e049299ba7727cf99f68cfac8c00ddeab1a88f75a5f34ac1e84c03812c0fe657287b9a014d738a01f09cc6d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a00f352041974b567d0a6d731a8a4d
SHA155c0f0881fe250cf9c86d25398d87a390ecd10c6
SHA256710436848609707aaf2e9b933a2dfc16f949dce2d81ffda6298cd55cd5b6d44d
SHA5129df55b9c84a34f41b5de38f6f17765803de0207f979d965d3096a45104f3011abac9b9f0cb8b8fe8bb50b356f9c2f8b65691ab9585c28171c99595063247b2ef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b