Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 06:25
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
14KB
-
MD5
331add07bd368ff7f40f722a1b86c18c
-
SHA1
02b1b1faca8d7a3e16bb204710e1dc1f48a2db70
-
SHA256
7a3cd98c65716349dec157732c0fc20d3de989ca3963081e0f9bf3395ce5180a
-
SHA512
6204a7fc7ac4382f5b5ac358e3ed1c66361ad8b5c6f07bb35a1b5c402df0452088e37ddd42662c676f49667396840fc330104c38540e51a80c0d182235fe6883
-
SSDEEP
384:3AHFMtzdh88K+WoSm4QxIgVDDuFQPqhVcILKle380:QluxWZQxI6DDue4B3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" msmgm.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" win16.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" win16.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" mdm.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" nvsvc32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" user.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avp32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winamp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" win32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avp32.exe -
Disables RegEdit via registry modification 10 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msmgm.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" avp32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" win16.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" win16.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" mdm.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nvsvc32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" avp32.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" user.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winamp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" win32.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 10 IoCs
pid Process 1216 win16.exe 1464 win32.exe 1352 nvsvc32.exe 588 avp32.exe 1280 user.exe 536 mdm.exe 888 winamp.exe 1656 msmgm.exe 836 win16.exe 1832 avp32.exe -
Loads dropped DLL 12 IoCs
pid Process 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe 1544 Trojan-Ransom.Win32.Blocker.exe -
Adds Run key to start application 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\user.exe" user.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngoA = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avp32.exe" avp32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngrrc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winamp.exe" winamp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MqvPc = "C:\\Windows\\win32.exe" win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\LvbdhfngrA = "C:\\Users\\Admin\\AppData\\Local\\Temp\\win16.exe" win16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngrA = "C:\\Users\\Admin\\AppData\\Local\\Temp\\win16.exe" win16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngne = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mdm.exe" mdm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MqvPc = "C:\\Windows\\win16.exe" win16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MqvPc = "C:\\Windows\\win16.exe" win16.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngne = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mdm.exe" mdm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mqstc = "C:\\Windows\\msmgm.exe" msmgm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngrrc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winamp.exe" winamp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\LvbdhfngoA = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avp32.exe" avp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MqvPc = "C:\\Windows\\win32.exe" win32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\MqpSc = "C:\\Windows\\avp32.exe" avp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MqpSc = "C:\\Windows\\avp32.exe" avp32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\LvbdhfngsfP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nvsvc32.exe" nvsvc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LvbdhfngsfP = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nvsvc32.exe" nvsvc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Mqstc = "C:\\Windows\\msmgm.exe" msmgm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lvbdhfngta = "C:\\Users\\Admin\\AppData\\Local\\Temp\\user.exe" user.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\win32.exe Trojan-Ransom.Win32.Blocker.exe File opened for modification C:\Windows\win32.exe Trojan-Ransom.Win32.Blocker.exe File created C:\Windows\avp32.exe Trojan-Ransom.Win32.Blocker.exe File opened for modification C:\Windows\avp32.exe Trojan-Ransom.Win32.Blocker.exe File created C:\Windows\msmgm.exe Trojan-Ransom.Win32.Blocker.exe File opened for modification C:\Windows\msmgm.exe Trojan-Ransom.Win32.Blocker.exe File created C:\Windows\win16.exe Trojan-Ransom.Win32.Blocker.exe File opened for modification C:\Windows\win16.exe Trojan-Ransom.Win32.Blocker.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" avp32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" win16.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" win16.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" mdm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" msmgm.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" winamp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" nvsvc32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" user.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" avp32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" win32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1544 Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1544 wrote to memory of 1216 1544 Trojan-Ransom.Win32.Blocker.exe 26 PID 1544 wrote to memory of 1216 1544 Trojan-Ransom.Win32.Blocker.exe 26 PID 1544 wrote to memory of 1216 1544 Trojan-Ransom.Win32.Blocker.exe 26 PID 1544 wrote to memory of 1216 1544 Trojan-Ransom.Win32.Blocker.exe 26 PID 1544 wrote to memory of 1464 1544 Trojan-Ransom.Win32.Blocker.exe 27 PID 1544 wrote to memory of 1464 1544 Trojan-Ransom.Win32.Blocker.exe 27 PID 1544 wrote to memory of 1464 1544 Trojan-Ransom.Win32.Blocker.exe 27 PID 1544 wrote to memory of 1464 1544 Trojan-Ransom.Win32.Blocker.exe 27 PID 1544 wrote to memory of 1352 1544 Trojan-Ransom.Win32.Blocker.exe 28 PID 1544 wrote to memory of 1352 1544 Trojan-Ransom.Win32.Blocker.exe 28 PID 1544 wrote to memory of 1352 1544 Trojan-Ransom.Win32.Blocker.exe 28 PID 1544 wrote to memory of 1352 1544 Trojan-Ransom.Win32.Blocker.exe 28 PID 1544 wrote to memory of 588 1544 Trojan-Ransom.Win32.Blocker.exe 29 PID 1544 wrote to memory of 588 1544 Trojan-Ransom.Win32.Blocker.exe 29 PID 1544 wrote to memory of 588 1544 Trojan-Ransom.Win32.Blocker.exe 29 PID 1544 wrote to memory of 588 1544 Trojan-Ransom.Win32.Blocker.exe 29 PID 1544 wrote to memory of 1280 1544 Trojan-Ransom.Win32.Blocker.exe 30 PID 1544 wrote to memory of 1280 1544 Trojan-Ransom.Win32.Blocker.exe 30 PID 1544 wrote to memory of 1280 1544 Trojan-Ransom.Win32.Blocker.exe 30 PID 1544 wrote to memory of 1280 1544 Trojan-Ransom.Win32.Blocker.exe 30 PID 1544 wrote to memory of 536 1544 Trojan-Ransom.Win32.Blocker.exe 31 PID 1544 wrote to memory of 536 1544 Trojan-Ransom.Win32.Blocker.exe 31 PID 1544 wrote to memory of 536 1544 Trojan-Ransom.Win32.Blocker.exe 31 PID 1544 wrote to memory of 536 1544 Trojan-Ransom.Win32.Blocker.exe 31 PID 1544 wrote to memory of 888 1544 Trojan-Ransom.Win32.Blocker.exe 32 PID 1544 wrote to memory of 888 1544 Trojan-Ransom.Win32.Blocker.exe 32 PID 1544 wrote to memory of 888 1544 Trojan-Ransom.Win32.Blocker.exe 32 PID 1544 wrote to memory of 888 1544 Trojan-Ransom.Win32.Blocker.exe 32 PID 1544 wrote to memory of 1656 1544 Trojan-Ransom.Win32.Blocker.exe 33 PID 1544 wrote to memory of 1656 1544 Trojan-Ransom.Win32.Blocker.exe 33 PID 1544 wrote to memory of 1656 1544 Trojan-Ransom.Win32.Blocker.exe 33 PID 1544 wrote to memory of 1656 1544 Trojan-Ransom.Win32.Blocker.exe 33 PID 1544 wrote to memory of 836 1544 Trojan-Ransom.Win32.Blocker.exe 34 PID 1544 wrote to memory of 836 1544 Trojan-Ransom.Win32.Blocker.exe 34 PID 1544 wrote to memory of 836 1544 Trojan-Ransom.Win32.Blocker.exe 34 PID 1544 wrote to memory of 836 1544 Trojan-Ransom.Win32.Blocker.exe 34 PID 1544 wrote to memory of 1832 1544 Trojan-Ransom.Win32.Blocker.exe 35 PID 1544 wrote to memory of 1832 1544 Trojan-Ransom.Win32.Blocker.exe 35 PID 1544 wrote to memory of 1832 1544 Trojan-Ransom.Win32.Blocker.exe 35 PID 1544 wrote to memory of 1832 1544 Trojan-Ransom.Win32.Blocker.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\win16.exeC:\Windows\win16.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1216
-
-
C:\Windows\win32.exeC:\Windows\win32.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1464
-
-
C:\Users\Admin\AppData\Local\Temp\nvsvc32.exeC:\Users\Admin\AppData\Local\Temp\nvsvc32.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1352
-
-
C:\Windows\avp32.exeC:\Windows\avp32.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\user.exeC:\Users\Admin\AppData\Local\Temp\user.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1280
-
-
C:\Users\Admin\AppData\Local\Temp\mdm.exeC:\Users\Admin\AppData\Local\Temp\mdm.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:536
-
-
C:\Users\Admin\AppData\Local\Temp\winamp.exeC:\Users\Admin\AppData\Local\Temp\winamp.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:888
-
-
C:\Windows\msmgm.exeC:\Windows\msmgm.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\win16.exeC:\Users\Admin\AppData\Local\Temp\win16.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\avp32.exeC:\Users\Admin\AppData\Local\Temp\avp32.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:1832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5b65b9ed8a06e6aa2ae656aaa12509792
SHA197390f3d7be9763e9dcf6600b20013227aa67e5e
SHA256557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12
SHA512701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97
-
Filesize
14KB
MD5b65b9ed8a06e6aa2ae656aaa12509792
SHA197390f3d7be9763e9dcf6600b20013227aa67e5e
SHA256557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12
SHA512701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97
-
Filesize
14KB
MD546f1fd1ff8ac8bab84873d00cd634384
SHA10198f9317f4c7844954903fa08a8fbaf592eeec4
SHA2562d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929
SHA512830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2
-
Filesize
14KB
MD546f1fd1ff8ac8bab84873d00cd634384
SHA10198f9317f4c7844954903fa08a8fbaf592eeec4
SHA2562d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929
SHA512830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2
-
Filesize
14KB
MD54ae36527fbbd892eeecd83d4518ef77a
SHA120552d7deea8f6fa3370d7deeef6ed1c86c8c235
SHA256082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433
SHA5124d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393
-
Filesize
14KB
MD54ae36527fbbd892eeecd83d4518ef77a
SHA120552d7deea8f6fa3370d7deeef6ed1c86c8c235
SHA256082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433
SHA5124d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393
-
Filesize
14KB
MD5ee480da12e9b2463d0349f602b8c8ffe
SHA16dd7806ef499af7889d98049e466af25d0adf5a4
SHA256f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8
SHA512bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b
-
Filesize
14KB
MD5ee480da12e9b2463d0349f602b8c8ffe
SHA16dd7806ef499af7889d98049e466af25d0adf5a4
SHA256f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8
SHA512bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b
-
Filesize
14KB
MD572c273541c42336c55b71d2cfcec4e49
SHA1748ecb750d7501ec45400fff7d086dbc53d54336
SHA256e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e
SHA5127847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36
-
Filesize
14KB
MD572c273541c42336c55b71d2cfcec4e49
SHA1748ecb750d7501ec45400fff7d086dbc53d54336
SHA256e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e
SHA5127847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36
-
Filesize
14KB
MD5e4c0bd6f07cc3439e77aab466353eaa5
SHA17fb3ea8126301b8256e7a5ce55d81fcf1941c701
SHA256d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186
SHA512907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2
-
Filesize
14KB
MD5e4c0bd6f07cc3439e77aab466353eaa5
SHA17fb3ea8126301b8256e7a5ce55d81fcf1941c701
SHA256d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186
SHA512907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2
-
Filesize
4B
MD573b41f59afe9c32aebbe056b47738916
SHA1b9986177c9d13520fe4c55b83ce091536b64b360
SHA256c64311f1dddbaa5d8b09c4f5bbd4774acfdc37ae6bba2167a9f1a83c35c7c2a1
SHA512d0b53d52061e13a9bdff70cdc892cd48cd4eb6dc8023c02035b46582d82c9c4d88dd1ceb569031d4367a1944de7da285f08bb806913b0071bf55f489d34db994
-
Filesize
14KB
MD572c273541c42336c55b71d2cfcec4e49
SHA1748ecb750d7501ec45400fff7d086dbc53d54336
SHA256e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e
SHA5127847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36
-
Filesize
14KB
MD572c273541c42336c55b71d2cfcec4e49
SHA1748ecb750d7501ec45400fff7d086dbc53d54336
SHA256e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e
SHA5127847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36
-
Filesize
14KB
MD5e4c0bd6f07cc3439e77aab466353eaa5
SHA17fb3ea8126301b8256e7a5ce55d81fcf1941c701
SHA256d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186
SHA512907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2
-
Filesize
14KB
MD5e4c0bd6f07cc3439e77aab466353eaa5
SHA17fb3ea8126301b8256e7a5ce55d81fcf1941c701
SHA256d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186
SHA512907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2
-
Filesize
14KB
MD5006ff4d3b7554fd86a745210ccae55f3
SHA1ef95906b7518695270397a105489f7be4491c417
SHA2566c05b10d8fde4e79cee4c33692e1887e68f240efc55dca8b622212548b9c8637
SHA512a28896ca16be2738ff59175a9e4817beb2857dc874fc6f6c7016f8af676925a69d360c0c81a3fecdfd725c805db5d40a956e7eae3e93137177813d4c3754fd42
-
Filesize
14KB
MD5006ff4d3b7554fd86a745210ccae55f3
SHA1ef95906b7518695270397a105489f7be4491c417
SHA2566c05b10d8fde4e79cee4c33692e1887e68f240efc55dca8b622212548b9c8637
SHA512a28896ca16be2738ff59175a9e4817beb2857dc874fc6f6c7016f8af676925a69d360c0c81a3fecdfd725c805db5d40a956e7eae3e93137177813d4c3754fd42
-
Filesize
14KB
MD5cadfae16bc19b7230d224504ee10ad7d
SHA16ab34b51cb74c009c7c46aa4b24f927affa57306
SHA25606e08082c8da418088a9e5a6f47ee9e765b4ce8d50a50dde622809d481ef3476
SHA512f2fa48edb0cd93b65bc0ee820246fb63dd3dca60828110e619a5a9d3dbe016c982352e89910f82114025836b33d9c9bfca3a6d5b273c77aa91ae9bcc07c2c4c0
-
Filesize
14KB
MD5cadfae16bc19b7230d224504ee10ad7d
SHA16ab34b51cb74c009c7c46aa4b24f927affa57306
SHA25606e08082c8da418088a9e5a6f47ee9e765b4ce8d50a50dde622809d481ef3476
SHA512f2fa48edb0cd93b65bc0ee820246fb63dd3dca60828110e619a5a9d3dbe016c982352e89910f82114025836b33d9c9bfca3a6d5b273c77aa91ae9bcc07c2c4c0
-
Filesize
14KB
MD5b65b9ed8a06e6aa2ae656aaa12509792
SHA197390f3d7be9763e9dcf6600b20013227aa67e5e
SHA256557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12
SHA512701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97
-
Filesize
14KB
MD5b65b9ed8a06e6aa2ae656aaa12509792
SHA197390f3d7be9763e9dcf6600b20013227aa67e5e
SHA256557581f25e836fdb109fc06fbdd08587290de496b0036b6dfba15efd9f99ee12
SHA512701a53758d32d537be4f47d95050f71102f7cba3946b13ac00c3a11f30764ed4176ea1e9678f57dcdf5de968b834137addf9fe38bf9892eae037be61e440aa97
-
Filesize
14KB
MD546f1fd1ff8ac8bab84873d00cd634384
SHA10198f9317f4c7844954903fa08a8fbaf592eeec4
SHA2562d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929
SHA512830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2
-
Filesize
14KB
MD546f1fd1ff8ac8bab84873d00cd634384
SHA10198f9317f4c7844954903fa08a8fbaf592eeec4
SHA2562d5ef3b8f3ab429509304ebafae70f4dace849a47655183106e1f93d5e64c929
SHA512830fd6cd6aabd38602b75635a60428837a9e16d22a8a935e5414fecab1c27340a88f565b981501a41517ce7648426196dbc7d4fd9bf9383fbd7e54c7241656b2
-
Filesize
14KB
MD54ae36527fbbd892eeecd83d4518ef77a
SHA120552d7deea8f6fa3370d7deeef6ed1c86c8c235
SHA256082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433
SHA5124d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393
-
Filesize
14KB
MD54ae36527fbbd892eeecd83d4518ef77a
SHA120552d7deea8f6fa3370d7deeef6ed1c86c8c235
SHA256082983fee7dce4db0ac01446afa85c8be24ff5bc58fe7417fb99b1449a256433
SHA5124d3b69322d9364c463d71c8f65e176a9a25b6a88da837231d6b4ef8374e75fa4282ee2084e4e6e42118bf3b27a7fa53e090792e238945020affd0d28e8648393
-
Filesize
14KB
MD5ee480da12e9b2463d0349f602b8c8ffe
SHA16dd7806ef499af7889d98049e466af25d0adf5a4
SHA256f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8
SHA512bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b
-
Filesize
14KB
MD5ee480da12e9b2463d0349f602b8c8ffe
SHA16dd7806ef499af7889d98049e466af25d0adf5a4
SHA256f3a68428f018a6b139f01a5fe11242767ab8bbbc7441b76a152f36cab83760e8
SHA512bd1526bb5ab22b7a55ebbd769232347c98b92096bb732973aaa74d47c365faa2575cd36140e8c7eaf365fdd608c2974b5c7666359d26bdbf240778346a610c2b
-
Filesize
14KB
MD572c273541c42336c55b71d2cfcec4e49
SHA1748ecb750d7501ec45400fff7d086dbc53d54336
SHA256e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e
SHA5127847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36
-
Filesize
14KB
MD572c273541c42336c55b71d2cfcec4e49
SHA1748ecb750d7501ec45400fff7d086dbc53d54336
SHA256e05599ac8e4a2bf6fe41d73e25982f85a9141a864554d3f1a7fdca5a5be0f71e
SHA5127847870446a6b4861b4c4c5ec3a285330fd673b3808b50070473a63560147dc0c7b1db854f32f39ce96a83ceb6fd2b4d15cbf43977a90518c667a6a64ee61c36
-
Filesize
14KB
MD5e4c0bd6f07cc3439e77aab466353eaa5
SHA17fb3ea8126301b8256e7a5ce55d81fcf1941c701
SHA256d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186
SHA512907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2
-
Filesize
14KB
MD5e4c0bd6f07cc3439e77aab466353eaa5
SHA17fb3ea8126301b8256e7a5ce55d81fcf1941c701
SHA256d71df63262d0cd955db8f4e8cfd53ba1e726ab48886a0ce7d9f0e5dd2e352186
SHA512907a6ef4ef89c6ec4faeec3f695b1daffa42c05fc00077cbee1c5f1a4b1dad2b9431ed276e18e2abd73a136e43af700025394e0c93880d6ec6ba298c4d8330a2