Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe
Resource
win10v2004-20231222-en
General
-
Target
2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe
-
Size
1.3MB
-
MD5
f7abb84eabac6d7985aae51363242017
-
SHA1
6211757eef156b32552f62ad509caf87468e7046
-
SHA256
2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4
-
SHA512
02d63c22023c3a10346ff37458b883a707f9b89799990fe86ad18c5c575eb8316e716e2fd7ad471b4a05492f9a7c9c15eefb3bddaa46fa3a16ee637d9174302e
-
SSDEEP
12288:KK9B+VIUMAdB8qr0zw9iXQ40AOzDr5YJjsF/5v3ZkHRik8:KK9BHatr0zAiX90z/F0jsFB3SQk
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 472 Process not Found 2220 alg.exe 2712 aspnet_state.exe 2720 mscorsvw.exe 3000 mscorsvw.exe 1800 mscorsvw.exe 528 mscorsvw.exe 348 ehRecvr.exe 656 ehsched.exe 828 elevation_service.exe 2076 mscorsvw.exe 1780 IEEtwCollector.exe -
Loads dropped DLL 5 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\system32\fxssvc.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\System32\alg.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\3fa3b026c0d5d3a4.bin alg.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2052 2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe Token: SeShutdownPrivilege 1800 mscorsvw.exe Token: SeShutdownPrivilege 528 mscorsvw.exe Token: SeShutdownPrivilege 528 mscorsvw.exe Token: SeShutdownPrivilege 1800 mscorsvw.exe Token: SeShutdownPrivilege 1800 mscorsvw.exe Token: SeShutdownPrivilege 1800 mscorsvw.exe Token: SeShutdownPrivilege 528 mscorsvw.exe Token: SeShutdownPrivilege 528 mscorsvw.exe Token: 33 836 EhTray.exe Token: SeIncBasePriorityPrivilege 836 EhTray.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2076 1800 mscorsvw.exe 38 PID 1800 wrote to memory of 2076 1800 mscorsvw.exe 38 PID 1800 wrote to memory of 2076 1800 mscorsvw.exe 38 PID 1800 wrote to memory of 2076 1800 mscorsvw.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe"C:\Users\Admin\AppData\Local\Temp\2a97014edca51513ea44fe29325dd8efbe13bf559721d6e916bf0068766bd9e4.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2220
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2712
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2720
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3000
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"2⤵PID:2748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 260 -NGENProcess 250 -Pipe 24c -Comment "NGen Worker Process"2⤵PID:560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 184 -NGENProcess 1b0 -Pipe 248 -Comment "NGen Worker Process"2⤵PID:2604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1b0 -NGENProcess 184 -Pipe 244 -Comment "NGen Worker Process"2⤵PID:1108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b0 -InterruptEvent 26c -NGENProcess 254 -Pipe 268 -Comment "NGen Worker Process"2⤵PID:2652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:528
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:348
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:656
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:828
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
PID:836
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:1780
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵PID:940
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵PID:1048
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:2124
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:2436
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:1612
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:3056
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵PID:3036
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:1908
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:2820
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:1888
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3008
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:1816
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:2640
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3012
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵PID:1744
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:904
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-452311807-3713411997-1028535425-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-452311807-3713411997-1028535425-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵PID:588
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 5962⤵PID:1756
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD554dc6cced86491c206a3294d04154de8
SHA1f8a229d5262b3529dcdf4fd4213af226476b1376
SHA2569a8f7886cd1b18c2c80a1a2c9742ec26bdcb50cf8a9dd20ff06cb367996d2b90
SHA5124650b379eeabf756475de416d5b4fc3b2d8d3d93473c1a7c7199abeb95bc2079acc9d2ee04147c79d62767d9b34a6bba84c6e7d4cd269b84dd206c5bd8b86391
-
Filesize
210KB
MD5fda6b88deb3c5a5e227d5f545a1dde0b
SHA1e1870498eecc423d1b611599429a1b15630563e7
SHA256a272c6937f317e4374ea4a4d44a75b026c050d172dc9a8261d2efa968497e80b
SHA51285f80ceced467392cae946f545286ec223a771bc78dcdb3411b75d6323e3f75f4d828a1343f2ad6429bb441a2121f623f468095d5cf4366bd51bab8db9506148
-
Filesize
301KB
MD596f361fe371229f0ab27275cb626ac9f
SHA1b288fb8d23512f2d3207f2316a4f20d9672eefa3
SHA2567735cf157f8329f1259f6597b41cdfe69bca850a3d226c38b8a3715c2a64e4e3
SHA5124c3c251fbc9da2b3c895b5ec514dbce369a55534037ced4e910db8abb81cb97351a754723785d090dfd125d1b49cc40359af5238ba7ac4130a3dfa8280cc0a3b
-
Filesize
661KB
MD5479c66ef810da0c0f91d68b1005c1866
SHA1c2cd8b49ec855c2ae537a196b0dfdb903027145a
SHA2565d62b615723827b04612bec46c1546961fd361f6f83a24f7658d4acdad6c0e61
SHA5122a4ba1cc45960a7f33fe7167eac78f97ffc835efeca8d6648ec03c1d25cd0d8706f4ee55b4d056bfec6375598b4e6c60b71163792bb2b9d62f9c1b661a8ddcb1
-
Filesize
475KB
MD5d4bd99f6ee4db02d96916d7a1c0b2ad5
SHA1756ca6f2dc4166ebc0e3fe38c46192fe418c82c8
SHA2563f8b79707b135b5c6b3b24370b337393dd9afc8e9445ae3f010feaf98a5d07a8
SHA512b2f0fd1ff640bec35ac9669a2a2a69911f1838a862707c010e89c99480eb10b42534c560a43e463fb353258f6f4a551f75ef5d45d5a2c61779f14b77c00054d3
-
Filesize
340KB
MD58ddc37e7b87992256ab5246de7acefe4
SHA1e54f8ad7e2c9a9ea422ac0e4c0689f7f844c7bb2
SHA256d0e65631e0bffc3aded38cccc52a89f58065c6087fa691ae65b97d960c5242dc
SHA512b49bb1b31897cb23088f795976b047909dec08dd5df03a00b292c6cef902d1b60cac243b24999dafa903386c6ca44f774707592b01c0ee38a954c2b87d21dcb0
-
Filesize
1024KB
MD5bd1cd4a17173e8ca10a4bd612d0b6d8c
SHA1eeee9aae2e738c1e9c7673762fb297c77ce949e6
SHA256d35f149d61e08fe8cfe79bc7e285a059c678d558f81be5bb24c187a491982c69
SHA512c92a6503ba52988892dfba3edd00a3b42de0260ddc68e6df8e8e06cbadb77e7b6ade46cc371eea21824a59e5276d92c5cd0cfbb26538ca40bc6af32732534c9c
-
Filesize
23KB
MD5472509f8ba03fcccbb90dd2454db7bb8
SHA11f56d11febfd4e8ad17695b075afb46cd5e5a8f4
SHA2567118fef3bacfab3844ce820f45c32660826b62262e94b1e41fdb99264fffdc13
SHA5125494d0121bc5b3d6d6e3f182e4b33ce5c7a5f2e445978a9299a3d1bd3211c73d8d108a598c369dcdde677d519959e220158c5155c54564291e35b9e72af46878
-
Filesize
445KB
MD54d487acb28bc0679642ce0335547d9d9
SHA10674a3e5cba7769b916e9ac9633bbe27daa64a46
SHA256aa13ba9816eda2d4de12d381720412b3f13920616f1f9931b7b5b2c9663f627b
SHA5122a5fd03e93d1bed745a785e73c10d6844ba3ee52be76f43eb08a4d7df239c8cb190d6718ce7b8b688189afd8d5c9f7810d4359d294aac815f405570c74308e7b
-
Filesize
411KB
MD5530e74e7263abcb3011701bb59ccd872
SHA18205d60a0cc456e5c524967cbce34b965e55a10a
SHA256b3eb7a9334f1858c3515fc36532ea2a144bbd12400c2c40855a1d1b0497d3677
SHA51295285c247a2502a9da5cd59ba3072977b742fadc38aa15a3921f6c5d830278503196651e8894c4b37dee5e618ef17f7a98ab260e4d7f110c6e7433c25f3822e6
-
Filesize
530KB
MD5920362f31b01c70cc0f7c02b7e6f50e3
SHA10538cc185704a9ed0b8a164b0c80684caa106233
SHA25607099c04301cc86ee5f34ea314b91b0c339018b8b8e2482485d7bd56c5e4d94d
SHA5123e18835187bed8303063608e7ab54b5f5f758eafd652141ec6ddb073b0479eab1c3b67d25b2154fbebca498087d1cb7be4d02095edbf96f15b86bf8e73182b8e
-
Filesize
48KB
MD57153bb3245da8c86fc0e508ef2a7a537
SHA1b38bac222cc075f310bcaf77f6bda5d00f5b17b3
SHA256a23695f2ea19967b7d513b17ea4a8420c75dc222fa6873ac52cd396ae8f8f7fa
SHA512da3731ec32c2221971fa4dcfcee5f640c1d96b77ca7b2797c01c880ac65dbd3f9cdf767f465787f713b2a785da75d49cccdb66dd1af7224d74d4bb8eb397139e
-
Filesize
405KB
MD50e0a4bd461bf9b1d390839b18db291ba
SHA184e44685ed1d172e17f654002aecb1adbcc65135
SHA256f73a5407ffbbbda18afa2d7f3494ae108c5ed806702e4093addef3e445125df8
SHA51260f1baab2506ce5be16ad898f99e8139ac99a1826c8a7201d5dd33edd29cf7890b66cd51b9ab97c436f05bf5258c31edb9988b459db61695b5c40406073bb90b
-
Filesize
270KB
MD5ff4eb3a71f69be0a0f63cbada79ba900
SHA1d1ad14382b4429ba82d9d8e6fd25ed34bc44f884
SHA2567fe297fdb9334b5cb08ff52594b52a12411399bd9f3c74c4738d32df676752dd
SHA5122b713cd88525bd37b2e9e4fec3f20d4a8ce06d05d2b0391c7ad39ff5a1600e56a9f71f363369b6fbec025c6a8f62ade66ae26a7f5eaba7f5c74fa219ef5d47de
-
Filesize
50KB
MD59de495371a42120fe9183fd4ee8d5d6f
SHA14303cea96cc98111ce52c63738b168c6c27e7943
SHA25651e202ba5cc89c492891f24354fb2df8a74ba96db40416b6af8677275d79be1d
SHA512dc30e93cdf68e1d9dd3e4a49d1eff85f75a5ddea037b514d822da4765ae80e73ba82d953897455a8fce27f1dda9448789419f6a862486de47d1b5ea74a7d3f64
-
Filesize
537KB
MD574545bc166679a7615c6e4a21c602b13
SHA115db44ea9213e502d0a530d4f11790291ab2e08d
SHA25656b7d7a6175c4b8726ce37d8f090080f811efc1799c385f369ac2df2fe635401
SHA5122671973499deb00457792370fea12ae2e1080d5e5e8cbe3a06fbcef5a633ec794aa10ccf44f654d0d1202be692dab27ffc1ee3f8c1e834f6bb19d811514b1faa
-
Filesize
698KB
MD5aa7f84b9583813b11fd09029eb6c1674
SHA142e34725a4ce0e3ec47a5a0f329a1204584a61d1
SHA256ef29594522117d98087c4c4ea30a14af6f26729f2719af7952384efd89e3362c
SHA512c6a1fd77d1b69d28033912480005b088fd88d5aab9dde1a6fdad2a5cfde2c05f76bd57a8e3e927cbae6853dd8242e18fc036ede03b34411aa2a9e113a1d00ac3
-
Filesize
145KB
MD5d20bfdeded2d1960b4d0a2957f9ab9f2
SHA1b3cc9b223ba85f0f3cd5a74a9152393fa5e4e95a
SHA2563e6a1c8dc27bb96f8069f6fcbbdca79adf27503aa3113c9959badacecbc138b8
SHA512e73e8c4fcec2c081a3880f3d6613928b5238905fe092b620494dd1f31f4b99fa4048b76029fde702618fc4bb2007dcaaed01cfc5be223ece2644e8ca8bb2d9ba
-
Filesize
146KB
MD5f0d17cec6840c073c39f4cb6868cfbbd
SHA12dd7ab3c68ffff20df46cce35ca334a97a14a55c
SHA256233c92fd563637c4e9359740691aa5a4547ab3c1f63e6d2ef3a454f8f185bb19
SHA51203b6126bd317e4895a252a52960b72bcb712aac4f632570afd4d4b69b526208c8f47a609c85dc992bd7db0c1b0676712c6c6736f3b254dc62c77f8de86a127fd
-
Filesize
489KB
MD584542208e969bd66d3b09e9643f3e218
SHA1df532847faf100dba8cb5257e9926a05ccde0d53
SHA256a599194bf7262274b0fee9ecea71da84ff6499e7a4f1123890a156c3fd3e8500
SHA512c06e3210dbac14d2b7b44cf35a00517fbfbd50d4774200f78bda593ba7214ffdf87e7d50a919fb53c79e1fa63f4e134e9a0d2b147cf2eede8e6780053e4ea4ba
-
Filesize
295KB
MD53abee73937933774e147151535e64abe
SHA1359844ae3c675bf01b96a6f203cdec5212b71926
SHA256fbd42017e20fab17984868638e191897d99fd31b1452d09e8e8a7dadfe0648e5
SHA5121be4aee276f46633c409d22b32a558e765b673aedab685641819f7f1e361d50a2298642b1bf8fb337262233ce8575787cf85ae4c3c1d92b0a49b1e847da216ba
-
Filesize
1.2MB
MD5f6d0b98b02bc6bc12e46dab176a8063f
SHA18ad7dfb7d6e1245e8dd93ee492c47fe38eac374f
SHA256505833fa33eaafaadd5f513be1528ea7cd06e9255399b21150b9ed49b06f7fa1
SHA512d4384fe931faa9f13772185e5c941c72254173e86508cfa19d5c277f968cc5d9bb966fec3fb5f5482a29be6abb5ac84b8adb527651863171060b3fa248bad34d
-
Filesize
1.2MB
MD5bb0e7cc1407eb85a26dd1e35d098b302
SHA1fb68cc3192610f008bc751df2716a449cb0fa084
SHA256b77aed2f2450b9cf06dfc32f5567f5de2f878895d8d8924511c5fbc14b4f3c32
SHA512d09e6748073612cebe35739c1fd981c65428c02a7d24ad2e12e29b80f66d07367af4c6efd9bf542f72be5d70ce0e961cf759ae476035422e58fb28a341fd2341
-
Filesize
484KB
MD54c5d9b3a301e13a38e9e4bbb2eb36aa9
SHA118cb0eb018c47a59f43989234fcfd2e4fc6c40b2
SHA2569cde1a4e3d0bd74c04f627f25764fdf0d8e4cdb8bb32e509dc19a921a356d934
SHA5127166d98cdda9d7591d18b0de564a685e9a5747eb96c73fa858c89f80e0f9a44ed17d9b579492b40890b2b13b5cacd1530fbb7068ee2a1b478b735d3a24fcc3c1
-
Filesize
28KB
MD55e2bde9903bc95f661e5b6d93d2fec95
SHA1217782a5f18618531c3daff8c7eadeb1cf77b56e
SHA2563d0040a431175882be544e1b2efc34a0a7050b9ba6cd054fc5f41540a2922dde
SHA5126ef45a7e9ce1dd6d17a78d9930c4fde14540659fb5fcd53532ef36e877e4936dd6c9f4cb735ee82649de5ecbe044bcb97c1964e4c9b7a12acd08822eeb5fa494
-
Filesize
52KB
MD58cb6a0d22cd19eacd3b9a61a2e4f55d6
SHA1900b80ed04d335ff2338ddbb13b5fac1635d7abe
SHA256957d5e755dba8f25b10daeaf2117849c4f97743728ffc8b70037cf63d92cbe42
SHA51241f892016167cbdb3cd5501744a4ad3134b2160b6771e537504c76e04a2514c9502c7dbf63972422dd3e27458c4840fed912fdb6136f54b4fc274d810dafc1bd
-
Filesize
143KB
MD5cbe5c04aeebfd7fffa7bc0b7c1c94abe
SHA158de70c08c8b8950f29a6bd3ea06c17a97480af4
SHA256d4be31d5f0ddee2e97c0170543c2be263a54663d67b9ce6e1c88ee35e3a0bc34
SHA512075d424754e101cdb6b16b9791d73e4047aa54509d40c17bf1e6509a892d49f5c818ed516569a8ecc26585f54cd088b7903302f368c552f7a492dcca4a410298
-
Filesize
87KB
MD57256d74f11a98d5c5d9244caeebb0dc7
SHA10333a3ff6a315892a2788eda72285d310dfa68a0
SHA256dda0a18d6837feb4dbdb34e068892361fc9b7c3d60ec53c28e5e52179e8c218a
SHA5121c9c1c12b461e9db5c972032e9c5a585e0820bd040eb5d1de75731ffcebdb0e38f44b16b979f2c910303306faa09209af1657fec22f71f3bcee69dd54bc2ab34
-
Filesize
1.0MB
MD517bc5a3fb42f6f48a4eb14758ae7db97
SHA1b048a642ff8e4a664ba7846382ec157089f58050
SHA25648a5cdb2f5e3d46236719be19d731f0579eaca2574866f3bee056975f5e9514d
SHA5123af509f8f12c0896fef94d2c4bb75a0c6132610e9aba6e0f8573a31a32c02eb6e26e6f1816e710d66057b439916de482464f87ecb736219c01377681a8c5bf39
-
Filesize
704KB
MD50da6725f41e87fd5d67269aa42c35a0d
SHA1666b99eaf8e6322629dc213d7301ce2ba962fc2d
SHA2569bce93365171c37b7000e939a7f4dc56e51ab0c259becd153b5a848524a7aa0f
SHA51222e3fbdfa435bf001b847bda6ca8bce6ada6b5dc141dd47731af5b6572820bac84499c52a8bc7efac7eaab24e04f13e7ab54c90c3e5c47ec4d349a499c35fc46
-
Filesize
92KB
MD5abe667dd3a9323ab60982bb7e1fa4ca5
SHA1924a979b9b6c5743c577c438fc7307f3ff4cc882
SHA256ceee6dbd6b0071066cafc0df84aec9bd1608d4dbaf5ce25fa7328a94498bf816
SHA512d14fe87497e9fe6d3de6b3846436545672a4c73b372c1b7709f881ede7ddeb100594c1a7d0d3c5d0df9771c61ae4cab4ff947e5a734e12c04683e43051132a4a
-
Filesize
2KB
MD5e28c4139eae82668f74701662e2a38f6
SHA17784f7cfbb6ab6d3bf83c670606fe8582f3ce989
SHA256e1fe8c6b0c80b0a20703ce9eff28b38a3c86543df93e4bab83d2d0839caa9a59
SHA512321af28bd8c38fec460f20718c7e0afbc3ba3dfc8b39f52767c508590ef1b3627ba5cc58b3685c392216386566a1d6c949694a9d76d446c5439ab177e06c4106
-
Filesize
273KB
MD563466d7de49665bb5ec2bab5d6e7272a
SHA1952ad575f933660ca5a49c5c5911ffa7db623862
SHA25691c0acaa1eb259d95d53b21887268e23f6d51ca088cae989be6865844265f1e3
SHA5123ca87adc3f59019cef3f8b0ca096c9610c898b7f15060aef831575777b04f2d7edf4b910a2bff2f70337939046e6c6a23cff0a95d47ac2ca38c65aa5daf40ae9
-
Filesize
24KB
MD5b401a6a24126b887053b621e3b28f853
SHA1c08b7e2ae73c1754da69db935729235661e9c663
SHA256a6f6d4235a144731a9781723cbe44efb293a6d40ea7266f4f1567e142df82c1a
SHA512f35c393b0fcce83976e748808ec58650aac71eaeecf5072f1467905e06ae3308463d8204858d3864350d9a4718942edea35324f844cf605c57bfbaf34d4169cf
-
Filesize
553KB
MD5f98d9edc5acb61cfb9cb2c6b935cafbb
SHA137e3477047f6040ce897d0406ca45c82797df018
SHA2562c8d87808172c33a9e5129fcb16ae3e72b9e42488973beeafee7953a26d41c8a
SHA512c9bc207408231e6ce1f7f8c13928656e4d9c5c490aa1f1c40e942826c1f7e282061546cb46f65d03a928b2d92cc220690295e1c94e1ded16e6c4ed08397162a5
-
Filesize
371KB
MD530ac848c900f44456fb88f7d3ac5521a
SHA15c3bafe5cdaa7d3d82d26ec6bd87695e7ddeb081
SHA256b135abc7a74a3e14e472529ab39d5f397d9a12b95fead7f98355c0ded3de0e1f
SHA51267bcc527525484169f36e2fcf17a70096a42d5afc9658158d5f6155f0382c8e068c1846535a315b67708b6a2be39d94c77bf956ab8c37ddf0a33764a079cf129
-
Filesize
369KB
MD582ba68f5a3149b91a4476142888f7277
SHA128f4d733a6c4adc4dcaff5a97d81782104299f64
SHA2568573d1c2fa4c06ae58bd1f6fafe738f6f27477fcb835c11529ae98da62a0bda7
SHA51243d389fe26fbcad372e0a4ae6c532f3ccfe6673e396c5572bb3e94898d56ed979d5f2c8c2aed71640ebd2d7e3e272895f0a0a3bf574363400d12e8e4eaeffaae
-
Filesize
45KB
MD5572a491bd24b1a5ec6b7f6da1ef33bca
SHA13eb62da268044bc723f3040a4ddf295d4dc54f2e
SHA256205b459d6d1e9f26057ed7b89f9c4458f149e006d0c130cafb545f1b2759b28b
SHA5129ad1f19725e3990f2bb7b58d9f842dc581659e6d107b4c68f5248f419e7035dfb10e403e00e085b39c9e2e66386a457c22598399bb61048cb528b4e2de6389eb
-
Filesize
50KB
MD5983dbb17217df6b4cf8c8733ada9dd2e
SHA1a30a917021efc7a24fac926a7b535978bd254ea5
SHA2566cfd8b48fb8661074a00c0bc90194961b7d121107e7572c1feec979816c4da7a
SHA5125971c5308ec42f245a27a154faa531c73aac1ac2d9d5296f9e56405e3d70271a345e89fa2fac58db8bdcf9ab7a242dfe9ef17d3a53ab22142a4ef7c5b218a285
-
Filesize
497KB
MD54653c77a2b191e03d99c565a0090f330
SHA1667d462fb49b241e3e0e7129ffbeb1e6bc3eeeaa
SHA25671a4c87166e22fecc71145eb78f1baf39a22aac0975147477694947f5f8d3491
SHA5124c875e3eed834f0274a1eca98eb6b1f1a2b692378a778e2247c446adadbbe78bab473baad287cf18127d91fc9e9fe113caa247996a76145bfd8008ab15403045
-
Filesize
29KB
MD5ef3fa5fcd1b978dc4a483827c519f9e6
SHA1163b3a35758481e5e3604636059121d3469a2876
SHA256c2c6dedee85899ed4284ccd0a41f707a992acbc27653091c9af556bb66eb6229
SHA5123d27aa5cdd8afdc1d659140c6c5dffa35e95bd0e022be8b10a70d6fa2222d265c78021197fa2c0b150668d3465f5a16c49e001a6c46bb7a74e4ba1a3b94c1d53
-
Filesize
5KB
MD5dc876b8e33f7f16e1d6761facba74a80
SHA1375ae5dc409170e087714128d1c9663dbb906df5
SHA256e4211338a2409c6648c12aaa3d16c75220c3009413689b30332f37b3dfa3eac2
SHA51267846cb2779b2321f15a0471fe12bf959bcdc974d481b9051a718c37d0571965d9785645e113878ce8878ab26c2b6ab942056c103334ed8c593ee9ad3c19158b
-
Filesize
658KB
MD55d9f34436e214822e45089586a1322c8
SHA17cc2c7c9f043b26146bd90c9c45d8d7af391f0b2
SHA2563507232d17c1804694a716e0960972cfcc260710e03163cbaba9d0f58fc31c42
SHA51260a99e267241f8e0a04ad804c2581e5a54be1b760cbadd39ccc51002e70cc31a0e7427ec6e0e4290193474e9c758090b3ba2f434a5eac0290598e61e4e14dd96
-
Filesize
105KB
MD51bccd68fa5e9403015c9c047ce499c30
SHA138acabecd82583bcb3b2b5ef59f9b60374fe6104
SHA256c9ea4a6917012bacf30b0220e2d27af8a5cb1483e01d47b96b1d6579661cccfd
SHA512825db89016eeb3d5ded48390ab66a8040bf65b3f6d89c717830ac2b46eab9326d2badc7565873fff82e12e4e25c69c4a663f3f69a8fbe296b02165880b3ce726
-
Filesize
1.0MB
MD57999374411b1dbfa272400747ffa7c0e
SHA1d6fae2a44faa77d4e0b1d37cd29c8f667b3123aa
SHA256db0cf7189e26879c857655de2aa3265a57fb8a14094fc2e40e7796ae4f298459
SHA512953aaac55c670bce76b3b84b2450fef4b60a959d0915541ef6c9462e6ac33dda89e6f2be5538c3726ac50c0728255740ac18a471045815e4d7d82f082fd1f567
-
Filesize
690KB
MD5faeef90ae6f9a5367ca75d5ca505af9f
SHA1febf69a8674da0f8e2f72b9aec8c867f3ded050e
SHA25650adc9e7b588bd5a561824a2cae69b36c660e8305872b29372e4f7e6c6abb687
SHA51205959cd7f2fb4e67cb43ec72c214bc46c8e3621ffa5ffefa739f57fb13354b70c5b74fb09365e4395be2687114870024b533fb9fe7a9998aa6bee0b64df9ebda
-
Filesize
198KB
MD58776792403b9dff14942e618918212c8
SHA190730f55a69b516a8a313cc7c61b70b335c28e0e
SHA25690f39644692f4a37e4cc7662aea219e613c14f02237937e6d42f893c618d6c31
SHA512a100831acafd2c0fd809ee69b26a8f49e3063cf4aad024acf456245e427ef8c710cf81c01a050343de727ab8c62a008c0d11c9b1ffdd213a449a849963a59fd1
-
Filesize
680KB
MD524b2269bfe4d1190442614ffbbebe7b5
SHA1e8e3c43ed7564e8668ff8442111a9d225a8a2c8e
SHA256b405d1c84eef87594593b92ae2f2d41310f48c25ab917690c28f64f7c086c7a6
SHA51211e5ecbcf6e5ac2e4853ec917f8160a7d22b83af11d9c02ccfb2271644ba0dc42c44d0e3d118edac5d54802d021b8aeebf33f527ee188ccdb3b192718dccffff
-
Filesize
448KB
MD52da35d1d6a811ee2bde08c468c043113
SHA1d39390ff1d3bf4aefaf5513aa88aef90ed3b4fc2
SHA25647ae09b1135db50acbf4033e05cb38d185e0cd45cdc56e5b39ec87d558ee859e
SHA512670c1354054521437a4ad9f2c8ff6e8c1ed7849412a66fa324135ccc16ccfb4621a59340f445ab6601f166c80c695242924fb85f30fb2cc389866b2c8469bc1d
-
Filesize
204KB
MD5272558629cb1bba3a8e61a2da56c412a
SHA1f0b63c6a47f36a95492bfcc9fe1dc1ec9248816e
SHA2563928377da1ddf0c53a8a6b23f1e9e9aa2293e7767903d77816b9824df2a3b50c
SHA512ca658bfec89a42820e3278e7dddc276971a3a635d1a8ecae2b761e53286ae49a908d9796bbdd63e1360934287e0f2f88aa9c47ab888ec85c84889d1f48938fd0
-
Filesize
361KB
MD55e1b4a2cd0800e451f7b92761eec9e5f
SHA192f4cec5c51c06b211b0229e4f1ea061cdc1bbb1
SHA256306f455561f67821d5ba0029d3098f6543662782d7658da4f108a6fbd03c543a
SHA512b07494a122d80e10c56528544dce527bfd65faf5a07ebe44aa0187a4ed53a73f68fca452202ed280b7d0bb438e010caafe5f9835d3259f7778e95a66af009ec0
-
Filesize
64KB
MD52637d34f8b3609251c8c508044f5b75f
SHA179c6ed4d9da7b375eae1acee4abf89fabdc3d8c4
SHA2569fd4cee0d3d22b8acd01eaaae4917c3ee0146231ceb156676ed1aafed3ccc53d
SHA51268530ec5a645fd5839f55c237a8348063e6a136acd0acfc65898daa3d14a04cf63803a654d1b38a6f11c0891de378e766cb8048aca4de116fa0656162c815e75
-
Filesize
498KB
MD59eca46668f9b88c0048c9eaf4d258618
SHA1d1bc22ab344aeac0b6d1e29da346f0f9b80a4948
SHA256d1483b62622cfe35a32c191bd4d2ec2f9bf849992dfd82fc0eba3bc09cd3e826
SHA5124754a16e513827faf8ecb427197e739ed0ed607c6c9f892d2a9797b5187069cc30f736a25edadefbe40ddc60df9b2d06ca4e08b067c3868f7e3f0bb990a833c2
-
Filesize
64KB
MD52866efe8aa3d9ec720f103f967000285
SHA188c316db7b74565b20efb83a02b7c68b7d362946
SHA256b52add337979007a292f14782a1408257b1c9b50cbd1ebbcbe33cba1e9be7cd6
SHA512ad757fe453bcb17e9ab9873a1138889e8ace5c45c950cb18d6962d018d5f3e04b53ece39830511493e77b71a41e6544ee1868d4717d572e6da250275a664f498