Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
73s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 14:35
Behavioral task
behavioral1
Sample
ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe
Resource
win10v2004-20220812-en
General
-
Target
ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe
-
Size
670KB
-
MD5
6129226d58960fcc74f6cc5ffb798e90
-
SHA1
1b60d1b86992a29c197e8e6390428866e24e9a28
-
SHA256
ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72
-
SHA512
5f76c43998951dbdb4d58db8ec7f58bba5515b8d2f8beb574efdadf7938a16da55450e1e03d11147af4886b18bd2bba199deef3776609347bb55cd8fc80bd360
-
SSDEEP
12288:0QjNB/yfdkYTZ5soj01t6FKCpoWKmxe89PUom:0Q5NcxT7J84poWKmxl9y
Malware Config
Signatures
-
Suspicious use of NtCreateProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 3472 created 2804 3472 regsougoupy.exe 47 PID 1540 created 2804 1540 regsougoupy.exe 47 -
Nirsoft 2 IoCs
resource yara_rule behavioral2/memory/3672-155-0x0000000000400000-0x0000000000415000-memory.dmp Nirsoft behavioral2/memory/3592-159-0x0000000000400000-0x0000000000415000-memory.dmp Nirsoft -
Executes dropped EXE 10 IoCs
pid Process 3472 regsougoupy.exe 1540 regsougoupy.exe 3672 RtkSYUdp.exe 3592 RtkSYUdp.exe 1352 RtkSYUdp.exe 2488 RtkSYUdp.exe 1864 RtkSYUdp.exe 4288 RtkSYUdp.exe 4404 RtkSYUdp.exe 752 RtkSYUdp.exe -
resource yara_rule behavioral2/memory/5048-132-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/5048-136-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/files/0x00030000000006ff-151.dat upx behavioral2/files/0x00030000000006ff-152.dat upx behavioral2/memory/5048-154-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/3672-155-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/files/0x00030000000006ff-157.dat upx behavioral2/memory/3592-159-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/files/0x00030000000006ff-162.dat upx behavioral2/files/0x00030000000006ff-164.dat upx behavioral2/files/0x00030000000006ff-166.dat upx behavioral2/files/0x00030000000006ff-168.dat upx behavioral2/files/0x00030000000006ff-170.dat upx behavioral2/files/0x00030000000006ff-172.dat upx -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\desktop.ini RtkSYUdp.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\TaoBao\ÌÔ±¦.tmp ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe File created C:\Program Files (x86)\Common Files\TaoBao\ÌÔ±¦.ico ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\regsougoupy.exe ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe File created C:\Windows\RtkSYUdp.exe ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3500 2864 WerFault.exe 93 4764 4268 WerFault.exe 88 -
description ioc Process Key created \REGISTRY\MACHINE\software\WOW6432Node\microsoft\internet explorer\version Vector ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe -
Modifies registry class 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{CABB0DA0-DA57-11CF-9974-0020AFD79762}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{CABB0DA0-DA57-11CF-9974-0020AFD79762} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214F9-0000-0000-C000-000000000046} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellNew regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ = "InternetShortcut" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214EE-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214EE-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{BB2E617C-0920-11d1-9A0B-00C04FC2D6C1}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{FBF23B80-E3F0-101B-8488-00AA003E56F8} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{FBF23B80-E3F0-101B-8488-00AA003E56F8}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ = "lnkfile" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214F9-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{00021500-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\PersistentHandler\ = "{5e941d80-bf96-11cd-b579-08002b30bfeb}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{BB2E617C-0920-11d1-9A0B-00C04FC2D6C1} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellNew\Command = "rundll32.exe appwiz.cpl,NewLinkHere %1" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214EE-0000-0000-C000-000000000046}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214F9-0000-0000-C000-000000000046}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{000214EE-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.1nk\ShellEx\{00021500-0000-0000-C000-000000000046}\ = "{00021401-0000-0000-C000-000000000046}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1 regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{000214F9-0000-0000-C000-000000000046} regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{00021500-0000-0000-C000-000000000046} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\ShellEx\{00021500-0000-0000-C000-000000000046}\ = "{FBF23B40-E3F0-101B-8488-00AA003E56F8}" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ur1\PersistentHandler regedit.exe -
Runs regedit.exe 3 IoCs
pid Process 1324 regedit.exe 4268 regedit.exe 2864 regedit.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 3472 regsougoupy.exe 3472 regsougoupy.exe 1540 regsougoupy.exe 1540 regsougoupy.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1324 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 81 PID 5048 wrote to memory of 1324 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 81 PID 5048 wrote to memory of 1324 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 81 PID 5048 wrote to memory of 1816 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 82 PID 5048 wrote to memory of 1816 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 82 PID 5048 wrote to memory of 1816 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 82 PID 5048 wrote to memory of 3472 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 84 PID 5048 wrote to memory of 3472 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 84 PID 5048 wrote to memory of 3472 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 84 PID 5048 wrote to memory of 4844 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 86 PID 5048 wrote to memory of 4844 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 86 PID 5048 wrote to memory of 4844 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 86 PID 5048 wrote to memory of 1492 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 87 PID 5048 wrote to memory of 1492 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 87 PID 5048 wrote to memory of 1492 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 87 PID 3472 wrote to memory of 4268 3472 regsougoupy.exe 88 PID 3472 wrote to memory of 4268 3472 regsougoupy.exe 88 PID 3472 wrote to memory of 4268 3472 regsougoupy.exe 88 PID 5048 wrote to memory of 1540 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 89 PID 5048 wrote to memory of 1540 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 89 PID 5048 wrote to memory of 1540 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 89 PID 1540 wrote to memory of 2864 1540 regsougoupy.exe 93 PID 1540 wrote to memory of 2864 1540 regsougoupy.exe 93 PID 1540 wrote to memory of 2864 1540 regsougoupy.exe 93 PID 5048 wrote to memory of 2308 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 99 PID 5048 wrote to memory of 2308 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 99 PID 5048 wrote to memory of 2308 5048 ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe 99 PID 1492 wrote to memory of 3672 1492 cmd.exe 101 PID 1492 wrote to memory of 3672 1492 cmd.exe 101 PID 1492 wrote to memory of 3672 1492 cmd.exe 101 PID 1492 wrote to memory of 3592 1492 cmd.exe 103 PID 1492 wrote to memory of 3592 1492 cmd.exe 103 PID 1492 wrote to memory of 3592 1492 cmd.exe 103 PID 2308 wrote to memory of 4184 2308 cmd.exe 104 PID 2308 wrote to memory of 4184 2308 cmd.exe 104 PID 2308 wrote to memory of 4184 2308 cmd.exe 104 PID 1492 wrote to memory of 1352 1492 cmd.exe 105 PID 1492 wrote to memory of 1352 1492 cmd.exe 105 PID 1492 wrote to memory of 1352 1492 cmd.exe 105 PID 1492 wrote to memory of 2488 1492 cmd.exe 106 PID 1492 wrote to memory of 2488 1492 cmd.exe 106 PID 1492 wrote to memory of 2488 1492 cmd.exe 106 PID 1492 wrote to memory of 1864 1492 cmd.exe 107 PID 1492 wrote to memory of 1864 1492 cmd.exe 107 PID 1492 wrote to memory of 1864 1492 cmd.exe 107 PID 1492 wrote to memory of 4288 1492 cmd.exe 108 PID 1492 wrote to memory of 4288 1492 cmd.exe 108 PID 1492 wrote to memory of 4288 1492 cmd.exe 108 PID 1492 wrote to memory of 4404 1492 cmd.exe 109 PID 1492 wrote to memory of 4404 1492 cmd.exe 109 PID 1492 wrote to memory of 4404 1492 cmd.exe 109 PID 1492 wrote to memory of 752 1492 cmd.exe 110 PID 1492 wrote to memory of 752 1492 cmd.exe 110 PID 1492 wrote to memory of 752 1492 cmd.exe 110
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe"C:\Users\Admin\AppData\Local\Temp\ac2fd60bb738b74461dbc78fe603389069240143ca144653e7db366c9dbf4e72.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\$rar10987.tmp3⤵
- Modifies registry class
- Runs regedit.exe
PID:1324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$RAVSING.bat3⤵PID:1816
-
-
C:\Windows\regsougoupy.exeC:\Windows\regsougoupy.exe \??\C:\Windows\regedit.exe 2804 C:\Users\Admin\AppData\Local\Temp\okhhhik.tmp3⤵
- Suspicious use of NtCreateProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$edbs.bat3⤵PID:4844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$rcqi.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\."4⤵
- Executes dropped EXE
PID:3672
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\.."4⤵
- Executes dropped EXE
PID:3592
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\desktop.ini"4⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
PID:1352
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\GOOGLE~1.LNK"4⤵
- Executes dropped EXE
PID:2488
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\MICROS~1.LNK"4⤵
- Executes dropped EXE
PID:1864
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\SHOWSD~1.LNK"4⤵
- Executes dropped EXE
PID:4288
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\USERPI~1"4⤵
- Executes dropped EXE
PID:4404
-
-
C:\Windows\RtkSYUdp.exeC:\Windows\RtkSYUdp.exe filldelete "C:\Users\Admin\AppData\Roaming\MICROS~1\INTERN~1\QUICKL~1\WINDOW~1.LNK"4⤵
- Executes dropped EXE
PID:752
-
-
-
C:\Windows\regsougoupy.exeC:\Windows\regsougoupy.exe \??\C:\Windows\regedit.exe 2804 C:\Users\Admin\AppData\Local\Temp\$rar10943.tmp3⤵
- Suspicious use of NtCreateProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$dmsf.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\reg.exereg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU /f4⤵PID:4184
-
-
-
-
\Windows\SysWOW64\regedit.exe2⤵
- Runs regedit.exe
PID:4268 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4268 -s 83⤵
- Program crash
PID:4764
-
-
-
\Windows\SysWOW64\regedit.exe2⤵
- Runs regedit.exe
PID:2864 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2864 -s 83⤵
- Program crash
PID:3500
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 4268 -ip 42681⤵PID:4100
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 480 -p 2864 -ip 28641⤵PID:4112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253B
MD5cb350b29233b3440633123bb77692140
SHA152793f1ba4c7925d41c6e79a109080c3d12b69e6
SHA2567031fcb0fa967101e4d4894e9ebbac7e0ed00cc3ba57777afa02f521356530d3
SHA5120e5d3b34262260b807179d6a51e2c62524d3b0a132c05c4425830d376d1002d150aa0fd8e747a67d96b8ae8145ab903892ce3eaa8245084832eefd02b31c09b8
-
Filesize
639B
MD5dfdf7432958cc9c018b2da0eadcba82c
SHA1538843ff37223a123d29ed5933e03b3a8ddac541
SHA2569467badfe54a64b1476a1ca70807f8e0528b5640017564d5c2d6f06b39e45111
SHA512a8e065a95e56753326d1d719dba78845fce2d2e9bfd3f21f9ad71c6b6d1a6466abf0c9ca63d52489eb54f3769b797480c4892a62d81427adcb628cd57d1c8b00
-
Filesize
59B
MD50cf180f20e716094bef34db0f1a39a04
SHA1f8e9da5d8eaf347b240a77c6a9c4f494d4fc351b
SHA2562a72298ec1d957d1d225aec50a4e6e32c5dec2f2645f25e580304e5c7ae5bb26
SHA512a471fee35dfc685effb46fcc37d47d7210fad3fdba7cb5342b13e11f95ae7690e4053b3399bca6da7546015a479ce55a301c6934be8bab7ec9eae5aece8bdb3b
-
Filesize
1KB
MD595457d5629ea8e2e826c36393a3479a6
SHA10190011fc3613e735179a9501e72d732cb92ac3c
SHA256ec3b4324057e9bd22e0542473afbdcd45f1077f91c862d208e8b3a4e1ced6c45
SHA5129c4c7340307412863dfece7847532b6976cb7096c47fd3e8a557c8d3413a642a26a1645f460db4bcbda009bd322b082df80c0786bbf14a968038b19324d6d4a8
-
Filesize
1KB
MD5185038ec1cc9a69a109726c8989e4cf5
SHA1bfb62037297e8533e5f3940a32fb9505acf4fe26
SHA25648ccff6cd96445619998a70fad77f5e655a9d146b93d0d160656619728c4e727
SHA512bb0065a36a9bc48199943b21f3c3f10916fd15aa54201513f344464d962b5e6339e1df1b932043a914a662631f842a2f3b7a2c6e8c4e414567c5ea8ac9950391
-
Filesize
1KB
MD5b0fd136bbce582369757eb1973fc2ae5
SHA1519323c3f608a613653cf695c8ed8f10e49078bc
SHA256bf3288f2c237d693230f60e579db35d9c01d0caf269f574c1a48de23c80e052c
SHA51286fe9128cc0aac71206c3f1882ba72f10fa43b1ed05ab62a159792e20e1e026a4bc4da2cd4bd310408abe4cd7a78f7214ff174a1684b0e7e035eae8952c0f70f
-
Filesize
4KB
MD562c0937f8894411495238c5bc542a3e9
SHA192fd3e6010465478086ab3da0935783af9038ebf
SHA2568ec231d59bc419b015536e29bbabf2dd19b5e86703c0ef9658606d6737589631
SHA5121ff86febe4b2cb8e0bc7af60cf60bd6854ef482a459d583a8e2e1f83527fddfc7e30218755d214c51bc456687db4ef58ed5b73d323860368ce3121c584fa17ab
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
30KB
MD5d0cd586c5c857850a188e778b971f25a
SHA13f584fd89e41151c389b4701d876d2bdd2885fc2
SHA2562f6cd2ed9806a09fecce1f96cd5b3f77fc0339ddbbb4c31aab25e85fd3f268eb
SHA512995f539c7163e0e49c7cc4687dd29dac4ac88501410d8c9935f99d993b14bf5fe349cdcdc9f61d4f308c280536b54f54ae7d041565c73a2340881f68e7b2c41c
-
Filesize
92KB
MD56f028d5d5303b7d2f44ff676f6be4a21
SHA1d7522f55db54d136e9be7ae90887591cdc03b64b
SHA256855efd09b5e0b44499f8b4571786e352a16e8afc2456f09df76e53b6d5e700ed
SHA512d6d7a990b0472cb0e4cf4cec0d9cddd51894a2391ebc79f0fcac7e9c4789cddccc587021dd24bde1b06bf6ac9726e5fb8d7014138bf4f9af83c3664627ac1412
-
Filesize
92KB
MD56f028d5d5303b7d2f44ff676f6be4a21
SHA1d7522f55db54d136e9be7ae90887591cdc03b64b
SHA256855efd09b5e0b44499f8b4571786e352a16e8afc2456f09df76e53b6d5e700ed
SHA512d6d7a990b0472cb0e4cf4cec0d9cddd51894a2391ebc79f0fcac7e9c4789cddccc587021dd24bde1b06bf6ac9726e5fb8d7014138bf4f9af83c3664627ac1412
-
Filesize
92KB
MD56f028d5d5303b7d2f44ff676f6be4a21
SHA1d7522f55db54d136e9be7ae90887591cdc03b64b
SHA256855efd09b5e0b44499f8b4571786e352a16e8afc2456f09df76e53b6d5e700ed
SHA512d6d7a990b0472cb0e4cf4cec0d9cddd51894a2391ebc79f0fcac7e9c4789cddccc587021dd24bde1b06bf6ac9726e5fb8d7014138bf4f9af83c3664627ac1412