Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
06/07/2023, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
c7a55db1377ed620e3d4c4c0b6b90d25.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
c7a55db1377ed620e3d4c4c0b6b90d25.exe
Resource
win10v2004-20230703-en
General
-
Target
c7a55db1377ed620e3d4c4c0b6b90d25.exe
-
Size
5.8MB
-
MD5
c7a55db1377ed620e3d4c4c0b6b90d25
-
SHA1
4958b9718e3c657ca0412dd7c83ee6c587a93310
-
SHA256
39943a7f5adbc87c332a71abfe242f8ef797a514e19bec5826c96c5ce71e8781
-
SHA512
66683d6b18d4a147d659324ac279af93652d96819de4ce7308953b4e6610be78d900406802c61bb8739eefe86a383aeb997f8d0f296f96c585ff54d3685a692d
-
SSDEEP
98304:UO70lfyix9Ki3V7hXpd00wUnApb95IRQdl1OIgL:UO70lf9x9x3/bXwHG2dl1OI8
Malware Config
Extracted
redline
norm
77.91.68.70:19073
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
amadey
3.84
77.91.68.63/doma/net/index.php
Signatures
-
Detects Healer an antivirus disabler dropper 5 IoCs
resource yara_rule behavioral1/memory/2992-103-0x0000000000020000-0x000000000002A000-memory.dmp healer behavioral1/files/0x00060000000142de-108.dat healer behavioral1/files/0x00060000000142de-110.dat healer behavioral1/files/0x00060000000142de-111.dat healer behavioral1/memory/2264-112-0x00000000000A0000-0x00000000000AA000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8051108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8051108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8051108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8051108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b5537331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b5537331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8051108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8051108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b5537331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b5537331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b5537331.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 10 IoCs
pid Process 2364 v3874102.exe 2996 v1941012.exe 864 v8536589.exe 2992 a8051108.exe 2264 b5537331.exe 2216 c0718393.exe 2928 d6129268.exe 2528 e9654383.exe 2464 rugen.exe 1880 rugen.exe -
Loads dropped DLL 22 IoCs
pid Process 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 2364 v3874102.exe 2364 v3874102.exe 2996 v1941012.exe 2996 v1941012.exe 864 v8536589.exe 864 v8536589.exe 864 v8536589.exe 2992 a8051108.exe 864 v8536589.exe 2996 v1941012.exe 2996 v1941012.exe 2216 c0718393.exe 2364 v3874102.exe 2364 v3874102.exe 2928 d6129268.exe 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 2528 e9654383.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe 2912 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a8051108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8051108.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features b5537331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" b5537331.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1941012.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8536589.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8536589.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce c7a55db1377ed620e3d4c4c0b6b90d25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7a55db1377ed620e3d4c4c0b6b90d25.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3874102.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3874102.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1941012.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d6129268.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d6129268.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI d6129268.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2992 a8051108.exe 2992 a8051108.exe 2264 b5537331.exe 2264 b5537331.exe 2216 c0718393.exe 2216 c0718393.exe 2928 d6129268.exe 2928 d6129268.exe 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found 1240 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2928 d6129268.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2992 a8051108.exe Token: SeDebugPrivilege 2264 b5537331.exe Token: SeDebugPrivilege 2216 c0718393.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 e9654383.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2364 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 30 PID 2356 wrote to memory of 2364 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 30 PID 2356 wrote to memory of 2364 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 30 PID 2356 wrote to memory of 2364 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 30 PID 2356 wrote to memory of 2364 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 30 PID 2356 wrote to memory of 2364 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 30 PID 2356 wrote to memory of 2364 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 30 PID 2364 wrote to memory of 2996 2364 v3874102.exe 31 PID 2364 wrote to memory of 2996 2364 v3874102.exe 31 PID 2364 wrote to memory of 2996 2364 v3874102.exe 31 PID 2364 wrote to memory of 2996 2364 v3874102.exe 31 PID 2364 wrote to memory of 2996 2364 v3874102.exe 31 PID 2364 wrote to memory of 2996 2364 v3874102.exe 31 PID 2364 wrote to memory of 2996 2364 v3874102.exe 31 PID 2996 wrote to memory of 864 2996 v1941012.exe 32 PID 2996 wrote to memory of 864 2996 v1941012.exe 32 PID 2996 wrote to memory of 864 2996 v1941012.exe 32 PID 2996 wrote to memory of 864 2996 v1941012.exe 32 PID 2996 wrote to memory of 864 2996 v1941012.exe 32 PID 2996 wrote to memory of 864 2996 v1941012.exe 32 PID 2996 wrote to memory of 864 2996 v1941012.exe 32 PID 864 wrote to memory of 2992 864 v8536589.exe 33 PID 864 wrote to memory of 2992 864 v8536589.exe 33 PID 864 wrote to memory of 2992 864 v8536589.exe 33 PID 864 wrote to memory of 2992 864 v8536589.exe 33 PID 864 wrote to memory of 2992 864 v8536589.exe 33 PID 864 wrote to memory of 2992 864 v8536589.exe 33 PID 864 wrote to memory of 2992 864 v8536589.exe 33 PID 864 wrote to memory of 2264 864 v8536589.exe 35 PID 864 wrote to memory of 2264 864 v8536589.exe 35 PID 864 wrote to memory of 2264 864 v8536589.exe 35 PID 864 wrote to memory of 2264 864 v8536589.exe 35 PID 864 wrote to memory of 2264 864 v8536589.exe 35 PID 864 wrote to memory of 2264 864 v8536589.exe 35 PID 864 wrote to memory of 2264 864 v8536589.exe 35 PID 2996 wrote to memory of 2216 2996 v1941012.exe 36 PID 2996 wrote to memory of 2216 2996 v1941012.exe 36 PID 2996 wrote to memory of 2216 2996 v1941012.exe 36 PID 2996 wrote to memory of 2216 2996 v1941012.exe 36 PID 2996 wrote to memory of 2216 2996 v1941012.exe 36 PID 2996 wrote to memory of 2216 2996 v1941012.exe 36 PID 2996 wrote to memory of 2216 2996 v1941012.exe 36 PID 2364 wrote to memory of 2928 2364 v3874102.exe 39 PID 2364 wrote to memory of 2928 2364 v3874102.exe 39 PID 2364 wrote to memory of 2928 2364 v3874102.exe 39 PID 2364 wrote to memory of 2928 2364 v3874102.exe 39 PID 2364 wrote to memory of 2928 2364 v3874102.exe 39 PID 2364 wrote to memory of 2928 2364 v3874102.exe 39 PID 2364 wrote to memory of 2928 2364 v3874102.exe 39 PID 2356 wrote to memory of 2528 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 40 PID 2356 wrote to memory of 2528 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 40 PID 2356 wrote to memory of 2528 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 40 PID 2356 wrote to memory of 2528 2356 c7a55db1377ed620e3d4c4c0b6b90d25.exe 40 PID 2528 wrote to memory of 2464 2528 e9654383.exe 41 PID 2528 wrote to memory of 2464 2528 e9654383.exe 41 PID 2528 wrote to memory of 2464 2528 e9654383.exe 41 PID 2528 wrote to memory of 2464 2528 e9654383.exe 41 PID 2464 wrote to memory of 2868 2464 rugen.exe 42 PID 2464 wrote to memory of 2868 2464 rugen.exe 42 PID 2464 wrote to memory of 2868 2464 rugen.exe 42 PID 2464 wrote to memory of 2868 2464 rugen.exe 42 PID 2464 wrote to memory of 1404 2464 rugen.exe 44 PID 2464 wrote to memory of 1404 2464 rugen.exe 44 PID 2464 wrote to memory of 1404 2464 rugen.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7a55db1377ed620e3d4c4c0b6b90d25.exe"C:\Users\Admin\AppData\Local\Temp\c7a55db1377ed620e3d4c4c0b6b90d25.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3874102.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3874102.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1941012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1941012.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8536589.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8536589.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8051108.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8051108.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5537331.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5537331.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0718393.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0718393.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6129268.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d6129268.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e9654383.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\e9654383.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F4⤵
- Creates scheduled task(s)
PID:2868
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit4⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"5⤵PID:1428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E5⤵PID:2556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"5⤵PID:2796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E5⤵PID:2812
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2912
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B05C8110-BFB2-4C2F-B5C9-7CD9C69B4F08} S-1-5-21-264077997-199365141-898621884-1000:KOSNGVQI\Admin:Interactive:[1]1⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:1880
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
656KB
MD59d512e5e1bfb6dd7f89cdceb74924acf
SHA15112eaed0fe1157c3014697e1d1c8c62e29632e2
SHA2562deeb15ab122d13721b806f243f57e0ceafc4a92cf04a784c8fc3254c7ad739f
SHA512d7140b64a3f66ede15cfe5f99072e51f6740a3499eb3f9d6f92ccd7e11e5fb69e791fbcbe158d1a33652fa0f5da7c607406083fae9b6c6effce0ae52faaaad06
-
Filesize
656KB
MD59d512e5e1bfb6dd7f89cdceb74924acf
SHA15112eaed0fe1157c3014697e1d1c8c62e29632e2
SHA2562deeb15ab122d13721b806f243f57e0ceafc4a92cf04a784c8fc3254c7ad739f
SHA512d7140b64a3f66ede15cfe5f99072e51f6740a3499eb3f9d6f92ccd7e11e5fb69e791fbcbe158d1a33652fa0f5da7c607406083fae9b6c6effce0ae52faaaad06
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
556KB
MD54d23e46dfaee2334e0fb5d8cb4722dd1
SHA19732137bf57a9ecdf4d8036541d3670990998dc2
SHA256dbee5f423127f67bfeee125293b1f4320decfdb0f71387a54acc27359a4fdb15
SHA512f57fc480506780d08ef71bb4999df35b8463df48d8baa6e12d748d7b57c7b070dcffce95a7283563a910c995ef9799504b64748b800d5a604b4f02f6526e0a97
-
Filesize
556KB
MD54d23e46dfaee2334e0fb5d8cb4722dd1
SHA19732137bf57a9ecdf4d8036541d3670990998dc2
SHA256dbee5f423127f67bfeee125293b1f4320decfdb0f71387a54acc27359a4fdb15
SHA512f57fc480506780d08ef71bb4999df35b8463df48d8baa6e12d748d7b57c7b070dcffce95a7283563a910c995ef9799504b64748b800d5a604b4f02f6526e0a97
-
Filesize
1.3MB
MD5664b3d221ce064f92bd97a185bd5363f
SHA17d3bac30cb83f15585fcaec6c525795c74cc73bf
SHA2569763ce33b2458476dd95beeac1edbbc6853e5aa8acae54f139e32fc8eb3eec84
SHA512837c47d576f05f3b64a521b5a4aaf000353f55068045b18fc0edcdc66386053beedbb075ad8f5cf9e463ec54bcc744fa086c54b4c4502059f146ef2c0ee1d986
-
Filesize
1.3MB
MD5664b3d221ce064f92bd97a185bd5363f
SHA17d3bac30cb83f15585fcaec6c525795c74cc73bf
SHA2569763ce33b2458476dd95beeac1edbbc6853e5aa8acae54f139e32fc8eb3eec84
SHA512837c47d576f05f3b64a521b5a4aaf000353f55068045b18fc0edcdc66386053beedbb075ad8f5cf9e463ec54bcc744fa086c54b4c4502059f146ef2c0ee1d986
-
Filesize
1.3MB
MD5664b3d221ce064f92bd97a185bd5363f
SHA17d3bac30cb83f15585fcaec6c525795c74cc73bf
SHA2569763ce33b2458476dd95beeac1edbbc6853e5aa8acae54f139e32fc8eb3eec84
SHA512837c47d576f05f3b64a521b5a4aaf000353f55068045b18fc0edcdc66386053beedbb075ad8f5cf9e463ec54bcc744fa086c54b4c4502059f146ef2c0ee1d986
-
Filesize
220KB
MD5781ebc645434b5c0bbce061b64293b1e
SHA1a9fada1c811607d615f148a5815e5ed27c3b114a
SHA256a41fa2866e7b6de3aa7bcef2ef18b826872a7a61588b2610a941a507bd612c55
SHA512a64363f5346944ea868b6e15d09cee47e2b38b33037165f151eb94b9ba59357207810ab5725d814a9152686d7a9320634c0f205e5d9d647fd66fe5cfb3e4775a
-
Filesize
220KB
MD5781ebc645434b5c0bbce061b64293b1e
SHA1a9fada1c811607d615f148a5815e5ed27c3b114a
SHA256a41fa2866e7b6de3aa7bcef2ef18b826872a7a61588b2610a941a507bd612c55
SHA512a64363f5346944ea868b6e15d09cee47e2b38b33037165f151eb94b9ba59357207810ab5725d814a9152686d7a9320634c0f205e5d9d647fd66fe5cfb3e4775a
-
Filesize
185KB
MD5e28845746e55259b3cc3a6d87f0da815
SHA1e75c1352978156359a16de421f5d6e2ade6318ca
SHA256f0a9e3bada7590a40bb053879e8c0e5bd6d4548694e3d1e607756395d8357dfd
SHA5121258259eba8676165699d1c617e6e188239f008e5586b7339d904bb40429adb95f197e078af8bc9b39131ab5d44db155d896b44e11bda4e61832c86a87a18da8
-
Filesize
185KB
MD5e28845746e55259b3cc3a6d87f0da815
SHA1e75c1352978156359a16de421f5d6e2ade6318ca
SHA256f0a9e3bada7590a40bb053879e8c0e5bd6d4548694e3d1e607756395d8357dfd
SHA5121258259eba8676165699d1c617e6e188239f008e5586b7339d904bb40429adb95f197e078af8bc9b39131ab5d44db155d896b44e11bda4e61832c86a87a18da8
-
Filesize
185KB
MD5e28845746e55259b3cc3a6d87f0da815
SHA1e75c1352978156359a16de421f5d6e2ade6318ca
SHA256f0a9e3bada7590a40bb053879e8c0e5bd6d4548694e3d1e607756395d8357dfd
SHA5121258259eba8676165699d1c617e6e188239f008e5586b7339d904bb40429adb95f197e078af8bc9b39131ab5d44db155d896b44e11bda4e61832c86a87a18da8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
273B
MD504a943771990ab49147e63e8c2fbbed0
SHA1a2bde564bef4f63749716621693a3cfb7bd4d55e
SHA256587c2fb0cf025a255a077b24fe6433fd67bdfac451d74d321d86db96c369841e
SHA51240e325e6e50e2d7b6c9dd0c555e23c85c4a45bd1829a76efa0383dcc05ac5fd19a14804079a5d2523ded92b03b6e3051c3e8780053795be3359bf32dd3094a6d
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
205KB
MD5835f1373b125353f2b0615a2f105d3dd
SHA11aae6edfedcfe6d6828b98b114c581d9f15db807
SHA25600f972eb3d4d2fac05c10c0e6e212cf096b4142b5b5075b29c6c100d51432cd4
SHA5128826d5ff3ab691094eabf4cec3444752ed46714705dae25bc48b5c9ee36c7c9b9cf8606460e71df519dd26a91798ab8be3415e7465df82d362d602e96ebb25e5
-
Filesize
656KB
MD59d512e5e1bfb6dd7f89cdceb74924acf
SHA15112eaed0fe1157c3014697e1d1c8c62e29632e2
SHA2562deeb15ab122d13721b806f243f57e0ceafc4a92cf04a784c8fc3254c7ad739f
SHA512d7140b64a3f66ede15cfe5f99072e51f6740a3499eb3f9d6f92ccd7e11e5fb69e791fbcbe158d1a33652fa0f5da7c607406083fae9b6c6effce0ae52faaaad06
-
Filesize
656KB
MD59d512e5e1bfb6dd7f89cdceb74924acf
SHA15112eaed0fe1157c3014697e1d1c8c62e29632e2
SHA2562deeb15ab122d13721b806f243f57e0ceafc4a92cf04a784c8fc3254c7ad739f
SHA512d7140b64a3f66ede15cfe5f99072e51f6740a3499eb3f9d6f92ccd7e11e5fb69e791fbcbe158d1a33652fa0f5da7c607406083fae9b6c6effce0ae52faaaad06
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
30KB
MD535a15fad3767597b01a20d75c3c6889a
SHA1eef19e2757667578f73c4b5720cf94c2ab6e60c8
SHA25690ccd84f28e4dd03fb70b8739c4636acbcf8a030404b5a24264afd1acd09ecbc
SHA512c1ea2659e28130f00869391a33dfdc2a763a710a56de2acaa6c71caa9c1eb5809e7ca1dfa1620ac5c3174052d3e277b832853a137a4663483855295fdab23577
-
Filesize
556KB
MD54d23e46dfaee2334e0fb5d8cb4722dd1
SHA19732137bf57a9ecdf4d8036541d3670990998dc2
SHA256dbee5f423127f67bfeee125293b1f4320decfdb0f71387a54acc27359a4fdb15
SHA512f57fc480506780d08ef71bb4999df35b8463df48d8baa6e12d748d7b57c7b070dcffce95a7283563a910c995ef9799504b64748b800d5a604b4f02f6526e0a97
-
Filesize
556KB
MD54d23e46dfaee2334e0fb5d8cb4722dd1
SHA19732137bf57a9ecdf4d8036541d3670990998dc2
SHA256dbee5f423127f67bfeee125293b1f4320decfdb0f71387a54acc27359a4fdb15
SHA512f57fc480506780d08ef71bb4999df35b8463df48d8baa6e12d748d7b57c7b070dcffce95a7283563a910c995ef9799504b64748b800d5a604b4f02f6526e0a97
-
Filesize
1.3MB
MD5664b3d221ce064f92bd97a185bd5363f
SHA17d3bac30cb83f15585fcaec6c525795c74cc73bf
SHA2569763ce33b2458476dd95beeac1edbbc6853e5aa8acae54f139e32fc8eb3eec84
SHA512837c47d576f05f3b64a521b5a4aaf000353f55068045b18fc0edcdc66386053beedbb075ad8f5cf9e463ec54bcc744fa086c54b4c4502059f146ef2c0ee1d986
-
Filesize
1.3MB
MD5664b3d221ce064f92bd97a185bd5363f
SHA17d3bac30cb83f15585fcaec6c525795c74cc73bf
SHA2569763ce33b2458476dd95beeac1edbbc6853e5aa8acae54f139e32fc8eb3eec84
SHA512837c47d576f05f3b64a521b5a4aaf000353f55068045b18fc0edcdc66386053beedbb075ad8f5cf9e463ec54bcc744fa086c54b4c4502059f146ef2c0ee1d986
-
Filesize
1.3MB
MD5664b3d221ce064f92bd97a185bd5363f
SHA17d3bac30cb83f15585fcaec6c525795c74cc73bf
SHA2569763ce33b2458476dd95beeac1edbbc6853e5aa8acae54f139e32fc8eb3eec84
SHA512837c47d576f05f3b64a521b5a4aaf000353f55068045b18fc0edcdc66386053beedbb075ad8f5cf9e463ec54bcc744fa086c54b4c4502059f146ef2c0ee1d986
-
Filesize
220KB
MD5781ebc645434b5c0bbce061b64293b1e
SHA1a9fada1c811607d615f148a5815e5ed27c3b114a
SHA256a41fa2866e7b6de3aa7bcef2ef18b826872a7a61588b2610a941a507bd612c55
SHA512a64363f5346944ea868b6e15d09cee47e2b38b33037165f151eb94b9ba59357207810ab5725d814a9152686d7a9320634c0f205e5d9d647fd66fe5cfb3e4775a
-
Filesize
220KB
MD5781ebc645434b5c0bbce061b64293b1e
SHA1a9fada1c811607d615f148a5815e5ed27c3b114a
SHA256a41fa2866e7b6de3aa7bcef2ef18b826872a7a61588b2610a941a507bd612c55
SHA512a64363f5346944ea868b6e15d09cee47e2b38b33037165f151eb94b9ba59357207810ab5725d814a9152686d7a9320634c0f205e5d9d647fd66fe5cfb3e4775a
-
Filesize
185KB
MD5e28845746e55259b3cc3a6d87f0da815
SHA1e75c1352978156359a16de421f5d6e2ade6318ca
SHA256f0a9e3bada7590a40bb053879e8c0e5bd6d4548694e3d1e607756395d8357dfd
SHA5121258259eba8676165699d1c617e6e188239f008e5586b7339d904bb40429adb95f197e078af8bc9b39131ab5d44db155d896b44e11bda4e61832c86a87a18da8
-
Filesize
185KB
MD5e28845746e55259b3cc3a6d87f0da815
SHA1e75c1352978156359a16de421f5d6e2ade6318ca
SHA256f0a9e3bada7590a40bb053879e8c0e5bd6d4548694e3d1e607756395d8357dfd
SHA5121258259eba8676165699d1c617e6e188239f008e5586b7339d904bb40429adb95f197e078af8bc9b39131ab5d44db155d896b44e11bda4e61832c86a87a18da8
-
Filesize
185KB
MD5e28845746e55259b3cc3a6d87f0da815
SHA1e75c1352978156359a16de421f5d6e2ade6318ca
SHA256f0a9e3bada7590a40bb053879e8c0e5bd6d4548694e3d1e607756395d8357dfd
SHA5121258259eba8676165699d1c617e6e188239f008e5586b7339d904bb40429adb95f197e078af8bc9b39131ab5d44db155d896b44e11bda4e61832c86a87a18da8
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf
-
Filesize
89KB
MD583fc14fb36516facb19e0e96286f7f48
SHA140082ca06de4c377585cd164fb521bacadb673da
SHA25608dabdd0b0fb13d5d748daf1173f392aa27eb9943eef78bd29e6a8fa61007a6e
SHA512ba60d28195b8ce60fd6f4cd57919a190c910af3e71e2858ed266a958314798ed51323d3c870c572d2fb873aae34387afa0dd8c7624e5f5cf51e586aafb76efcf