Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05/05/2023, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
Technical Spec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Technical Spec.exe
Resource
win10v2004-20230220-en
General
-
Target
Technical Spec.exe
-
Size
1.5MB
-
MD5
ebf99fc11603d1ec4706b4330761df32
-
SHA1
c560ca5ae10593d7861701654d839d1071515866
-
SHA256
693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb
-
SHA512
d31c699f201343bd02c07bbf5d41e00df8368b81bfbb1d037fb4b1e1894fd3b8232e80b065845745fa6dab7f23d47efbb1d8b6a9143f5b7db0fb4a57395c4f4a
-
SSDEEP
49152:NQh9Nn3uFcWIY2YZGIUtNlMpovD2i9c2:0/37Wp2YPUtNlMG7N
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 11 IoCs
pid Process 472 Process not Found 636 alg.exe 1324 aspnet_state.exe 1944 mscorsvw.exe 1908 mscorsvw.exe 1928 mscorsvw.exe 1548 mscorsvw.exe 1464 dllhost.exe 1060 ehRecvr.exe 304 ehsched.exe 1940 mscorsvw.exe -
Loads dropped DLL 5 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe Technical Spec.exe File opened for modification C:\Windows\system32\fxssvc.exe Technical Spec.exe File opened for modification C:\Windows\System32\alg.exe Technical Spec.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b580e45c47bf3ad0.bin alg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1060 set thread context of 372 1060 Technical Spec.exe 27 PID 372 set thread context of 904 372 Technical Spec.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe Technical Spec.exe -
Drops file in Windows directory 22 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe Technical Spec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe Technical Spec.exe File opened for modification C:\Windows\ehome\ehRecvr.exe Technical Spec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe Technical Spec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{B36C02C7-9030-4162-B51B-2078AB6497DA}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe Technical Spec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe Technical Spec.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe Technical Spec.exe File opened for modification C:\Windows\ehome\ehsched.exe Technical Spec.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{B36C02C7-9030-4162-B51B-2078AB6497DA}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 372 Technical Spec.exe Token: SeShutdownPrivilege 1548 mscorsvw.exe Token: SeShutdownPrivilege 1548 mscorsvw.exe Token: SeShutdownPrivilege 1548 mscorsvw.exe Token: SeShutdownPrivilege 1548 mscorsvw.exe Token: 33 828 EhTray.exe Token: SeIncBasePriorityPrivilege 828 EhTray.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 372 Technical Spec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 1060 wrote to memory of 372 1060 Technical Spec.exe 27 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 372 wrote to memory of 904 372 Technical Spec.exe 32 PID 1548 wrote to memory of 1940 1548 mscorsvw.exe 39 PID 1548 wrote to memory of 1940 1548 mscorsvw.exe 39 PID 1548 wrote to memory of 1940 1548 mscorsvw.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:904
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:636
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:1324
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1944
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1908
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:1928
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 178 -InterruptEvent 164 -NGENProcess 168 -Pipe 174 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1940
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 164 -NGENProcess 168 -Pipe 178 -Comment "NGen Worker Process"2⤵PID:2100
-
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1464
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1060
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:304
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
PID:828
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1232
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵PID:1764
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵PID:1304
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵PID:2000
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:1932
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:1728
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2168
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:2400
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵PID:2448
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:2580
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:2620
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:2708
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2808
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2928
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:3016
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1224
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵PID:2204
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:2416
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5ec528bfbd14ced8ebc61cfe5e1737ea6
SHA1a2796f0e09b7e3ce1bf2954f3ef705f8d2dff869
SHA2567db6cf984c48be9263416f7b0ed9ae42a90a46bc05e14f9ef43a15a5912a7a20
SHA5126cfe19a204b158b32e1f111252c8054dc921a57c84c86fae31a7014b11e52b42ce73d777a22f51eb14e5e3683a7f758b9d3e80e4fa558352a1ca9626b08fae12
-
Filesize
30.1MB
MD59d7bba900515c714f6bb8c6442c9dc29
SHA18bf60006a9858f455951a23cc88170ee07495c0d
SHA25622b7e97230048c35022d3b814f9ee6b409949f89b3c98442db0abbf6d9fb7d27
SHA512b327a359b04192cb3d9f14ae6a57a5b1abd666cc90d80c99da097ec7f5bd1dca73904b533b059f50db52b4b3e8483d5f9e4b8873122e7f3555beb1f80723ed36
-
Filesize
1.4MB
MD5bed7003048fde66abecb7f5473ea78e9
SHA17cdd89badb156bd56c426ab6cf8409914e2414d9
SHA256a74e8a390e2aed978d9e51069f58c35c78324e2742779de11bd417f56a83dc45
SHA51241f7884fbba0cc475efaa5bbd1926ca44f89e6556ed2df0f9b6a85fd608907116d83ea96276f52d04a60f3203e1b87f527561416ebc0da7c69fc4451a11fec04
-
Filesize
5.2MB
MD54d6f79825ce39e02c4034fe7c0f70b92
SHA12aa8d9fe4235ac45541d4c35914812ba78db8c5e
SHA256a2323e59385b010a113921df678b67188bd8f1144ae2ea06afdda5752281b88e
SHA51243e67ee547b9b92fb27a0f9135c42ee51f9129a869f4cdbdd3cf780406e9a5fc70f76b756ef5f2db7915724f248d7418dcf298b3d6dcc9ce28ca21f5af5f97b6
-
Filesize
2.1MB
MD598dad37b2b9c55725c179bd2a0a26912
SHA1651f159bcc15a047249e654d46200e51fe1510de
SHA256b18dc26cfde1fd5e706487f1deef00e1f945a17d935a7ce468949fba44ec0802
SHA51266ccf09b2557aa713c89a19251f64028892c9c0e4e426909a4c5d7d0a509a77891ce676dbb5911c9826e626d0170c4a4718bd3781cad68518b3207a05b2d85ed
-
Filesize
2.0MB
MD53cba0045a0d5120bf0d5a37216164c97
SHA106f0634196f192d6a4f1b1b00baf11e873b43c71
SHA256a9d21446ccb616cf42a6ffa6bf522890b3576d40969d2669274be85a85a067e6
SHA512c538a4b30dae9f86aa4bbe703f71f76fcbdef7146203ede4cc8235cefde5088d4bc6f49eaf145db435e50ca35a4d44d6e4e737e71b5edd71556b16b20d88e564
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
1.3MB
MD59c6f36d17d2b9b30440bed02531312c5
SHA1ef30330e9cc64a57d77f070b20be843d748fa4e2
SHA256d5f84b4a18195ec72c14a40cdbd20cdc6072af5b296dbaf93055b2da2d8eadf9
SHA512c9e9c0fee2a04ed092bdcbec4ae267d9575e6a43b209b0d70422acf364deabdb9da039ad856a4d06252999843ad18d9a84d9c600e70ed8d90292d7a10a1000bc
-
Filesize
1.3MB
MD59c6f36d17d2b9b30440bed02531312c5
SHA1ef30330e9cc64a57d77f070b20be843d748fa4e2
SHA256d5f84b4a18195ec72c14a40cdbd20cdc6072af5b296dbaf93055b2da2d8eadf9
SHA512c9e9c0fee2a04ed092bdcbec4ae267d9575e6a43b209b0d70422acf364deabdb9da039ad856a4d06252999843ad18d9a84d9c600e70ed8d90292d7a10a1000bc
-
Filesize
872KB
MD522134e8630cc3d7606a0f99e83448357
SHA1bc9f801e253c7b1c317b25906c950b105a59c605
SHA2566adbaebc42b77e68ff2943765ebedd1e3690b6ac5af2061e3beee8a29eb253d3
SHA512b292999aac8cf01f6c798f571308a8f8e13017a709df69b02c977533446575beccd8b42bb6d59e474ab7284e1e8b76f172c33c3380c2c6ff45a81f0f29e5663c
-
Filesize
1.3MB
MD58f21737bd53b8d1882210835887a2122
SHA1a596e54059810d139616bf0ac2a1c6c00bfa8e7c
SHA2563a79151297f172ce83134c6e6f84baea5b2d9ad158cf11729a6f8056b9f62e34
SHA512a2601f16d369d9402e2a8b0d54f0fe597920cf426be343beb0a3228aaec9b58593f59e32092f0bbeb10ad820f97144684458224742b5e2207eab16771fcd84a6
-
Filesize
1.3MB
MD55570a93ed9557aeea4eb35aa59849125
SHA10008acf215087c13e4bb49477412547bfa979ccb
SHA256dafd9ace3a10cb151db3d2e597940300c1990337c2244a99bd267f8ebc0627ee
SHA51284831cebde76e150fed1156aaa531cbf50d88652de5bc9a71e64be73c25c5d430665329f5dfab3d183a37414206c6e5f6a11c20c9024d8709f32bb66054bcdba
-
Filesize
1.3MB
MD55570a93ed9557aeea4eb35aa59849125
SHA10008acf215087c13e4bb49477412547bfa979ccb
SHA256dafd9ace3a10cb151db3d2e597940300c1990337c2244a99bd267f8ebc0627ee
SHA51284831cebde76e150fed1156aaa531cbf50d88652de5bc9a71e64be73c25c5d430665329f5dfab3d183a37414206c6e5f6a11c20c9024d8709f32bb66054bcdba
-
Filesize
1.3MB
MD55570a93ed9557aeea4eb35aa59849125
SHA10008acf215087c13e4bb49477412547bfa979ccb
SHA256dafd9ace3a10cb151db3d2e597940300c1990337c2244a99bd267f8ebc0627ee
SHA51284831cebde76e150fed1156aaa531cbf50d88652de5bc9a71e64be73c25c5d430665329f5dfab3d183a37414206c6e5f6a11c20c9024d8709f32bb66054bcdba
-
Filesize
1.3MB
MD55570a93ed9557aeea4eb35aa59849125
SHA10008acf215087c13e4bb49477412547bfa979ccb
SHA256dafd9ace3a10cb151db3d2e597940300c1990337c2244a99bd267f8ebc0627ee
SHA51284831cebde76e150fed1156aaa531cbf50d88652de5bc9a71e64be73c25c5d430665329f5dfab3d183a37414206c6e5f6a11c20c9024d8709f32bb66054bcdba
-
Filesize
1.3MB
MD57609ca4decdceb194d822a155eeaeb79
SHA1f29de3664a27ec1f0daffb017c8e430ba099d938
SHA2561e8790bdb209ddca1cf05842eab22be3c0e15301e12b07b7372b5ccf2167d8e2
SHA512b3c71bf58b9e03ecda728acb7d002f3f288fb7fc850099a3cfd90e2e14b3908a8985d790faf565922d2e53e3fe0391c4e3df7c11cab2f5fb42899efa60d2df2c
-
Filesize
1.3MB
MD57609ca4decdceb194d822a155eeaeb79
SHA1f29de3664a27ec1f0daffb017c8e430ba099d938
SHA2561e8790bdb209ddca1cf05842eab22be3c0e15301e12b07b7372b5ccf2167d8e2
SHA512b3c71bf58b9e03ecda728acb7d002f3f288fb7fc850099a3cfd90e2e14b3908a8985d790faf565922d2e53e3fe0391c4e3df7c11cab2f5fb42899efa60d2df2c
-
Filesize
1003KB
MD56d23ede7dbe03762256add088df40548
SHA191e18bc24419d1964ef43ea5d963dadc584be393
SHA256b42ebf6f0888608d3549979c9930dfe952a9bf5f9b030c86a407775d101d0176
SHA512fa33b0b01d0183bcc0783425be07fdfa4ca743bee64fb1d4df392522f1b27f825b38fc9d5eb09924f079054cfa4c3ccfeb1e7315a1a36de9171d0ece59e86843
-
Filesize
1.3MB
MD549cff2bd90148a92b62f5ae271bf4117
SHA1041b7ca059f6b7321b5ab35ce18b73cab8c73e78
SHA25683a1aec176bfd8e8808bcf4bfaa1be50d2ecd395bbdfae785d67403360a0a84e
SHA512a8e502289a9755d979aa063baccf93b1469ed6395476b98e17ecac1c66ead9bd7b669a8039bbbebb4fc1ac7f0630a1a60a200aa9b3d067b2c7c6e53574005738
-
Filesize
1.2MB
MD5b730cba967be499e656444874de66e8f
SHA1d1bfa538a5e6919a130ad06d58c683941363c234
SHA256de73a1a86974a0b400989233519f23a5ba9d2866ead2dbf2ed0809499427d181
SHA512429aeb573c583c3b9425b6a2fe6b35dd900148338a3e9ff2d14846d65fa7d085bc14ee9d2d85c2fea7b299dac7a1da14563ec342236817e39ab9496ba3c41342
-
Filesize
1.2MB
MD5259c6847e4ebdaa06d3568d70f83c501
SHA1cbc9ab2fb58e5182e04251a7ab302ea87dcedb82
SHA256260bf193197b6cca26778f1a0be757abfc519d63efda3fbfe01c2d331edeb4ba
SHA512b6c8f97a2425abd259500c963aa2061d86aa9f8eecb24b0c8e18113ab26917b81d69c43c4c3bac252d442a235d56b84e111b15e26333832077b2a851387220cf
-
Filesize
1.1MB
MD52d12507c82f5609e1f60bc52ef34f552
SHA1c807d87bfd18fdb7aae6135a2cdb60e693e45140
SHA2563aa9ef6e57be9f70f8ba0aea365324012e99523102be8e37cf96db33c9713dd9
SHA5122ac507d7954e90091cf1f66e7baf273d346987ce46cfeffda28d488ea6765035f622475863f9b42c961fe7f9244cc6d3361e08d1a28ce7c6fb3e5298131002bb
-
Filesize
2.1MB
MD50c7a18872ea773bc3436c92b4f53e150
SHA15306e9c7c35fb0a5a6a466beab76005cfbc3c510
SHA2561564e32a31dd9db504abe77a321660000b916c7eaf2fa0a3d115d72c53c0069a
SHA51201328a8143977c882c7ec38b2591919e52ad52955e1384075b6d8635ede6a72cd6668fcd4a23b2e834a4aa2dfbef684ba4108dde1b29969ce5e790510d7de015
-
Filesize
1.3MB
MD5a5218753bdbcc6beb2753daaaa63f89f
SHA1974706823493dfec81a36781ad01dd0965350bd7
SHA2564475999530b8703d4c9dda936b9e9bda0ac70254d55251834bf9d23c85f2d3ad
SHA512f9e60df36b870f13b4f15dbe7b90cf09ec32d6f29f9bb6545f4eaa4dd5d91078733cce9d19c5333ad34e17c193ff0c0abafc73d2110e5975c52410bc81419e50
-
Filesize
1.2MB
MD5eb0ee4ff42d6e68906454378b34bfad0
SHA1f02391c10661cfb924811b3e859dd964774235f5
SHA2562bc66c7c32a68bcf1bab41981d1fa192aa0aedeb0814ab76f629e7e3a8df7454
SHA512a0cc4f59066a7ca9d2cacdabbdb7a804c99a6e10802b38ce4837ebc0a94f14ceb39b257fbcbbf81dfe8d341da5ed0ddd25a183bcc770692eecdb450088468153
-
Filesize
1.3MB
MD5da8486a48e99651f7cda22399ed1444a
SHA1073915317801b2ae2098e22c41544f54797b81a9
SHA256a820b31fbef9404e732771e8f00833d217ef09926da48e87bfa6ec9ab51eb52b
SHA5124e216236dbf35145af049f90e925bb725bb4099a45e6013ab6cb541754af83f0015d9b9cbf3c7c0e33b158ce6f829425a8de2fface6db54b6a736a9673e84e43
-
Filesize
1.4MB
MD57eb4a2982ea5ea1f3c553b79d85d3275
SHA1b4243b72c846028affdc195c81b9a23d3d933979
SHA25657968da3034d9a6f30851c503b47a9d02ec7cbb53fc2eecda57d99f88d7e5fde
SHA512941f1d0a60220289c8a3c19505d1d2717632f12cfcb775aa16894a6e2a722171467b4c5f3064cc5fa10ad3c251ba590d49979761385a94b2610c7441156b1849
-
Filesize
1.3MB
MD5b7dc9745d7ac9a5470950b1ad5be841b
SHA175415a69c201a28d33cac35827954bfff6c8f091
SHA2561d295892db26a377083844edab033862b53bd63ac32b4ccf42057c1aa8bfee1a
SHA512d9f934c53ccdc182f6b85e90b81c8a0a17476a2b58b57182dbd27b99c41b038fc9c6f9ad135cc3f02dc570df29853f65ffe1eb31efeace14eb0a11c71625ab23
-
Filesize
1.2MB
MD5b0594ed7047e1f9f9ea9cd6d1f3fa960
SHA1b5726a6357dbb0ad9c1a810826d09fc14005c820
SHA25624de885c4f1bd1aad2fa9efdead85948ef81b17b4a07b2b3c7bc988475197540
SHA512430a3939d2877abeaab5068b00382e97d5f62909100a1f0a2478f240f2bd0fbe2f39e3a77c2a63fdae6abebed94ea36ab5b2a1df9170dfd2c34419bcf9351312
-
Filesize
1.7MB
MD5e9659e26e86409f036933c537207f94a
SHA1fc8800312fd72b04c87fb00b8e98e586f1ed82c7
SHA25601f54b279def572e82387e1e6b61576035c50efa15de8c03128cc4980539cf30
SHA5127365084cba2939566a257c606a5038b95f7e6643af248ac0ad44533239fcbe5c282f68a94c0208b1e12956dfc633bef1610d9ea7d9cb5776984e6f28be7a37b7
-
Filesize
1.4MB
MD5a2097b5dc435a63c955a28ebfebdc3bc
SHA172803b2391929f63dd2d64903f6b8b384ec2c496
SHA256e00baa32bec61ecb6c95780517cd440073c8bf76c2fd2f02080005e63edfc1b1
SHA51236b2654f2dcb48ece5d688c62b59c01d07055286699a1d9be9d75ed07f82581e464953220247bec5d0e027dcd058281841df5458eae3aeae514053cfacd61410
-
Filesize
2.0MB
MD59d819d2e4d721c75736dcfc0ce99b16c
SHA1818a085eccb1e0072cd1048cdc26d6ef108d2bbc
SHA256a91a2f595f80339ef4218d2a7fd29fa7c8588894d9e9a069211bd11adbce6fe2
SHA5127c21ab5fcfa77f17814eaebbf085e8756b3171b5d636772f752c271c3ecad89c78a03e31e5bfb52e90414bb566637dbc1b1bf87ea9c4d91a3457b7add1bff6eb
-
Filesize
1.2MB
MD5fd38ec2f2fd88b0720b737873bfde79e
SHA1f1b492afb3ad8e12f91af5d7527e44b84744d18e
SHA256e8dbdf3617200ce1a73f25c64137cd7427e98ae3270914aa7589c644abfc4c71
SHA51241152335e7d146d15d91c523010e3851111d7389cbd110726a15413f5f12baf4a4f75df61f1303c8fc2bdb712c0da8a34b296a2dd5ed2d3bcfbed7a65042e110
-
Filesize
1.3MB
MD59ad66586bd8fd9f80f2f7fe73062434a
SHA15763ec53fd559e2770a5a2df8bf173e08c041993
SHA25691a202137284d0ce765cc7bef0317f0cdcb3b941704d6cfc4ab1b39f095a37ff
SHA512ada29736ca377dd155a7f3d54bdbb6ac176f5dff1a2ecc9bf4291cdf77726966e8c662be529eb5cbdbc8eaac8827c3a78cb28e1b3a5e776c1864ad3ba8bba696
-
Filesize
1.3MB
MD5b7dc9745d7ac9a5470950b1ad5be841b
SHA175415a69c201a28d33cac35827954bfff6c8f091
SHA2561d295892db26a377083844edab033862b53bd63ac32b4ccf42057c1aa8bfee1a
SHA512d9f934c53ccdc182f6b85e90b81c8a0a17476a2b58b57182dbd27b99c41b038fc9c6f9ad135cc3f02dc570df29853f65ffe1eb31efeace14eb0a11c71625ab23
-
Filesize
2.0MB
MD53cba0045a0d5120bf0d5a37216164c97
SHA106f0634196f192d6a4f1b1b00baf11e873b43c71
SHA256a9d21446ccb616cf42a6ffa6bf522890b3576d40969d2669274be85a85a067e6
SHA512c538a4b30dae9f86aa4bbe703f71f76fcbdef7146203ede4cc8235cefde5088d4bc6f49eaf145db435e50ca35a4d44d6e4e737e71b5edd71556b16b20d88e564
-
Filesize
2.0MB
MD53cba0045a0d5120bf0d5a37216164c97
SHA106f0634196f192d6a4f1b1b00baf11e873b43c71
SHA256a9d21446ccb616cf42a6ffa6bf522890b3576d40969d2669274be85a85a067e6
SHA512c538a4b30dae9f86aa4bbe703f71f76fcbdef7146203ede4cc8235cefde5088d4bc6f49eaf145db435e50ca35a4d44d6e4e737e71b5edd71556b16b20d88e564
-
Filesize
1.3MB
MD59c6f36d17d2b9b30440bed02531312c5
SHA1ef30330e9cc64a57d77f070b20be843d748fa4e2
SHA256d5f84b4a18195ec72c14a40cdbd20cdc6072af5b296dbaf93055b2da2d8eadf9
SHA512c9e9c0fee2a04ed092bdcbec4ae267d9575e6a43b209b0d70422acf364deabdb9da039ad856a4d06252999843ad18d9a84d9c600e70ed8d90292d7a10a1000bc
-
Filesize
1.3MB
MD58f21737bd53b8d1882210835887a2122
SHA1a596e54059810d139616bf0ac2a1c6c00bfa8e7c
SHA2563a79151297f172ce83134c6e6f84baea5b2d9ad158cf11729a6f8056b9f62e34
SHA512a2601f16d369d9402e2a8b0d54f0fe597920cf426be343beb0a3228aaec9b58593f59e32092f0bbeb10ad820f97144684458224742b5e2207eab16771fcd84a6
-
Filesize
1.2MB
MD5259c6847e4ebdaa06d3568d70f83c501
SHA1cbc9ab2fb58e5182e04251a7ab302ea87dcedb82
SHA256260bf193197b6cca26778f1a0be757abfc519d63efda3fbfe01c2d331edeb4ba
SHA512b6c8f97a2425abd259500c963aa2061d86aa9f8eecb24b0c8e18113ab26917b81d69c43c4c3bac252d442a235d56b84e111b15e26333832077b2a851387220cf
-
Filesize
1.3MB
MD5a5218753bdbcc6beb2753daaaa63f89f
SHA1974706823493dfec81a36781ad01dd0965350bd7
SHA2564475999530b8703d4c9dda936b9e9bda0ac70254d55251834bf9d23c85f2d3ad
SHA512f9e60df36b870f13b4f15dbe7b90cf09ec32d6f29f9bb6545f4eaa4dd5d91078733cce9d19c5333ad34e17c193ff0c0abafc73d2110e5975c52410bc81419e50
-
Filesize
1.2MB
MD5eb0ee4ff42d6e68906454378b34bfad0
SHA1f02391c10661cfb924811b3e859dd964774235f5
SHA2562bc66c7c32a68bcf1bab41981d1fa192aa0aedeb0814ab76f629e7e3a8df7454
SHA512a0cc4f59066a7ca9d2cacdabbdb7a804c99a6e10802b38ce4837ebc0a94f14ceb39b257fbcbbf81dfe8d341da5ed0ddd25a183bcc770692eecdb450088468153
-
Filesize
1.3MB
MD5da8486a48e99651f7cda22399ed1444a
SHA1073915317801b2ae2098e22c41544f54797b81a9
SHA256a820b31fbef9404e732771e8f00833d217ef09926da48e87bfa6ec9ab51eb52b
SHA5124e216236dbf35145af049f90e925bb725bb4099a45e6013ab6cb541754af83f0015d9b9cbf3c7c0e33b158ce6f829425a8de2fface6db54b6a736a9673e84e43
-
Filesize
1.4MB
MD57eb4a2982ea5ea1f3c553b79d85d3275
SHA1b4243b72c846028affdc195c81b9a23d3d933979
SHA25657968da3034d9a6f30851c503b47a9d02ec7cbb53fc2eecda57d99f88d7e5fde
SHA512941f1d0a60220289c8a3c19505d1d2717632f12cfcb775aa16894a6e2a722171467b4c5f3064cc5fa10ad3c251ba590d49979761385a94b2610c7441156b1849
-
Filesize
1.3MB
MD5b7dc9745d7ac9a5470950b1ad5be841b
SHA175415a69c201a28d33cac35827954bfff6c8f091
SHA2561d295892db26a377083844edab033862b53bd63ac32b4ccf42057c1aa8bfee1a
SHA512d9f934c53ccdc182f6b85e90b81c8a0a17476a2b58b57182dbd27b99c41b038fc9c6f9ad135cc3f02dc570df29853f65ffe1eb31efeace14eb0a11c71625ab23
-
Filesize
1.3MB
MD5b7dc9745d7ac9a5470950b1ad5be841b
SHA175415a69c201a28d33cac35827954bfff6c8f091
SHA2561d295892db26a377083844edab033862b53bd63ac32b4ccf42057c1aa8bfee1a
SHA512d9f934c53ccdc182f6b85e90b81c8a0a17476a2b58b57182dbd27b99c41b038fc9c6f9ad135cc3f02dc570df29853f65ffe1eb31efeace14eb0a11c71625ab23
-
Filesize
1.2MB
MD5b0594ed7047e1f9f9ea9cd6d1f3fa960
SHA1b5726a6357dbb0ad9c1a810826d09fc14005c820
SHA25624de885c4f1bd1aad2fa9efdead85948ef81b17b4a07b2b3c7bc988475197540
SHA512430a3939d2877abeaab5068b00382e97d5f62909100a1f0a2478f240f2bd0fbe2f39e3a77c2a63fdae6abebed94ea36ab5b2a1df9170dfd2c34419bcf9351312
-
Filesize
1.7MB
MD5e9659e26e86409f036933c537207f94a
SHA1fc8800312fd72b04c87fb00b8e98e586f1ed82c7
SHA25601f54b279def572e82387e1e6b61576035c50efa15de8c03128cc4980539cf30
SHA5127365084cba2939566a257c606a5038b95f7e6643af248ac0ad44533239fcbe5c282f68a94c0208b1e12956dfc633bef1610d9ea7d9cb5776984e6f28be7a37b7
-
Filesize
1.4MB
MD5a2097b5dc435a63c955a28ebfebdc3bc
SHA172803b2391929f63dd2d64903f6b8b384ec2c496
SHA256e00baa32bec61ecb6c95780517cd440073c8bf76c2fd2f02080005e63edfc1b1
SHA51236b2654f2dcb48ece5d688c62b59c01d07055286699a1d9be9d75ed07f82581e464953220247bec5d0e027dcd058281841df5458eae3aeae514053cfacd61410
-
Filesize
2.0MB
MD59d819d2e4d721c75736dcfc0ce99b16c
SHA1818a085eccb1e0072cd1048cdc26d6ef108d2bbc
SHA256a91a2f595f80339ef4218d2a7fd29fa7c8588894d9e9a069211bd11adbce6fe2
SHA5127c21ab5fcfa77f17814eaebbf085e8756b3171b5d636772f752c271c3ecad89c78a03e31e5bfb52e90414bb566637dbc1b1bf87ea9c4d91a3457b7add1bff6eb
-
Filesize
1.2MB
MD5fd38ec2f2fd88b0720b737873bfde79e
SHA1f1b492afb3ad8e12f91af5d7527e44b84744d18e
SHA256e8dbdf3617200ce1a73f25c64137cd7427e98ae3270914aa7589c644abfc4c71
SHA51241152335e7d146d15d91c523010e3851111d7389cbd110726a15413f5f12baf4a4f75df61f1303c8fc2bdb712c0da8a34b296a2dd5ed2d3bcfbed7a65042e110
-
Filesize
1.3MB
MD59ad66586bd8fd9f80f2f7fe73062434a
SHA15763ec53fd559e2770a5a2df8bf173e08c041993
SHA25691a202137284d0ce765cc7bef0317f0cdcb3b941704d6cfc4ab1b39f095a37ff
SHA512ada29736ca377dd155a7f3d54bdbb6ac176f5dff1a2ecc9bf4291cdf77726966e8c662be529eb5cbdbc8eaac8827c3a78cb28e1b3a5e776c1864ad3ba8bba696