Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe
-
Size
344KB
-
MD5
ab1277242a6b4aa8e18db0602804abc0
-
SHA1
56fa4481f7a8c06b4e9b4d38f3b16c920aa56c85
-
SHA256
ba7c061fc829aacb4170b9fca8d6337b8c3324cdbdbfcbfdb26d2a92d06f7d2b
-
SHA512
71fdd5e615ed9aefb4bc76770b188c7cdcb8d7a0bb0215143a63adec048b64f2b32e103ff3e5e328018e25ab31083d385c97ece733e92561a4cdc0bd99ed823d
-
SSDEEP
3072:mEGh0ozlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGJlqOe2MUVg3v2IneKcAEcA
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 47 2356 cmd.exe 50 2356 cmd.exe 54 2356 cmd.exe 59 2356 cmd.exe 62 2356 cmd.exe -
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAA97C71-C909-423c-9283-F0F3F749BF23}\stubpath = "C:\\Windows\\{DAA97C71-C909-423c-9283-F0F3F749BF23}.exe" 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D78F0873-5F70-4aba-A0F1-CC85365B80F3}\stubpath = "C:\\Windows\\{D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe" {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A72188CA-A337-4cd4-A560-D407EACA8DF5}\stubpath = "C:\\Windows\\{A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe" {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FB22F4E-B4D1-40d8-9FA6-058D0E9F0511}\stubpath = "C:\\Windows\\{6FB22F4E-B4D1-40d8-9FA6-058D0E9F0511}.exe" {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5EC38A4A-5B87-461f-A178-CF93587F8FFB}\stubpath = "C:\\Windows\\{5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe" {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6FB22F4E-B4D1-40d8-9FA6-058D0E9F0511} {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DAA97C71-C909-423c-9283-F0F3F749BF23} 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D78F0873-5F70-4aba-A0F1-CC85365B80F3} {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A72188CA-A337-4cd4-A560-D407EACA8DF5} {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5EC38A4A-5B87-461f-A178-CF93587F8FFB} {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe -
Executes dropped EXE 5 IoCs
pid Process 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe 1544 {6FB22F4E-B4D1-40d8-9FA6-058D0E9F0511}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe File created C:\Windows\{D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe File created C:\Windows\{A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe File created C:\Windows\{5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe File created C:\Windows\{6FB22F4E-B4D1-40d8-9FA6-058D0E9F0511}.exe {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4696 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe Token: SeIncBasePriorityPrivilege 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe Token: SeIncBasePriorityPrivilege 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe Token: SeIncBasePriorityPrivilege 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe Token: SeIncBasePriorityPrivilege 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1944 4696 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 100 PID 4696 wrote to memory of 1944 4696 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 100 PID 4696 wrote to memory of 1944 4696 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 100 PID 4696 wrote to memory of 2508 4696 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 99 PID 4696 wrote to memory of 2508 4696 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 99 PID 4696 wrote to memory of 2508 4696 2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe 99 PID 1944 wrote to memory of 3740 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 102 PID 1944 wrote to memory of 3740 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 102 PID 1944 wrote to memory of 3740 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 102 PID 1944 wrote to memory of 4920 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 101 PID 1944 wrote to memory of 4920 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 101 PID 1944 wrote to memory of 4920 1944 {DAA97C71-C909-423c-9283-F0F3F749BF23}.exe 101 PID 3740 wrote to memory of 2292 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe 106 PID 3740 wrote to memory of 2292 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe 106 PID 3740 wrote to memory of 2292 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe 106 PID 3740 wrote to memory of 4872 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe 105 PID 3740 wrote to memory of 4872 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe 105 PID 3740 wrote to memory of 4872 3740 {D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe 105 PID 2292 wrote to memory of 3208 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe 108 PID 2292 wrote to memory of 3208 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe 108 PID 2292 wrote to memory of 3208 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe 108 PID 2292 wrote to memory of 2312 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe 107 PID 2292 wrote to memory of 2312 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe 107 PID 2292 wrote to memory of 2312 2292 {A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe 107 PID 3208 wrote to memory of 1544 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe 111 PID 3208 wrote to memory of 1544 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe 111 PID 3208 wrote to memory of 1544 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe 111 PID 3208 wrote to memory of 2996 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe 110 PID 3208 wrote to memory of 2996 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe 110 PID 3208 wrote to memory of 2996 3208 {5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-08_ab1277242a6b4aa8e18db0602804abc0_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2508
-
-
C:\Windows\{DAA97C71-C909-423c-9283-F0F3F749BF23}.exeC:\Windows\{DAA97C71-C909-423c-9283-F0F3F749BF23}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DAA97~1.EXE > nul3⤵PID:4920
-
-
C:\Windows\{D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exeC:\Windows\{D78F0873-5F70-4aba-A0F1-CC85365B80F3}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D78F0~1.EXE > nul4⤵PID:4872
-
-
C:\Windows\{A72188CA-A337-4cd4-A560-D407EACA8DF5}.exeC:\Windows\{A72188CA-A337-4cd4-A560-D407EACA8DF5}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A7218~1.EXE > nul5⤵PID:2312
-
-
C:\Windows\{5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exeC:\Windows\{5EC38A4A-5B87-461f-A178-CF93587F8FFB}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{5EC38~1.EXE > nul6⤵PID:2996
-
-
C:\Windows\{6FB22F4E-B4D1-40d8-9FA6-058D0E9F0511}.exeC:\Windows\{6FB22F4E-B4D1-40d8-9FA6-058D0E9F0511}.exe6⤵
- Executes dropped EXE
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{6FB22~1.EXE > nul7⤵
- Blocklisted process makes network request
PID:2356
-
-
C:\Windows\{C2EF38E3-2B3D-4567-902F-E2B9C5A782AD}.exeC:\Windows\{C2EF38E3-2B3D-4567-902F-E2B9C5A782AD}.exe7⤵PID:8
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C2EF3~1.EXE > nul8⤵PID:1540
-
-
C:\Windows\{34A49436-9893-4d54-82C5-47714CEE1F45}.exeC:\Windows\{34A49436-9893-4d54-82C5-47714CEE1F45}.exe8⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{34A49~1.EXE > nul9⤵PID:876
-
-
C:\Windows\{0634A832-530D-4b2f-A4DC-7D2DED71C337}.exeC:\Windows\{0634A832-530D-4b2f-A4DC-7D2DED71C337}.exe9⤵PID:3112
-
C:\Windows\{35821CE5-6265-4308-9737-306E4ADCF2D7}.exeC:\Windows\{35821CE5-6265-4308-9737-306E4ADCF2D7}.exe10⤵PID:3180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{35821~1.EXE > nul11⤵PID:5048
-
-
C:\Windows\{3067E61E-2DA6-4bac-9E74-0D9261F3A377}.exeC:\Windows\{3067E61E-2DA6-4bac-9E74-0D9261F3A377}.exe11⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3067E~1.EXE > nul12⤵PID:2888
-
-
C:\Windows\{A62D3E18-48EC-45c8-8164-DDEBFF2967B0}.exeC:\Windows\{A62D3E18-48EC-45c8-8164-DDEBFF2967B0}.exe12⤵PID:3548
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0634A~1.EXE > nul10⤵PID:2884
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5cf95c12951d78ef75e8e5d79c42b1417
SHA1ea6050e8bdc58ebcda1b441653313df884af0d0c
SHA256c25c08516d164ffff55d29d31b9c2edf688b54c40dcb05e4f388c0fdddd905d9
SHA512854eb0a46d6d0b35afa9c24b8cd77d1f7703219e18dd96080f7f715c80c10b371312e58f76f2475d3aa413d89d5813af3d47af4d5b6249317315a29a9739781a
-
Filesize
35KB
MD5b47b1147a94b06d07cb2cea1ce7b28fa
SHA10a737150ac6faef5fc08ad031fae4d827f7718cf
SHA256f22de30de0b5110688e4067e0bb37f6f57eb3c8cac0e6e4f277e2602f0ba9078
SHA512d3b1c3ec973dee8943080826ce2c3fb718cc70ca75e0200f535002fdf0b7247cbccf1b547f9e1808b84f1863581be9a64964a6e3578522ac2fb5f432af130e3b
-
Filesize
2KB
MD53cce3c2124a4e779d26e4bd7847635c2
SHA1244448def30cf10e1f68983031b4cab34e5cd6aa
SHA256eb23107d8f6aed39946ca46b5d3eba2b41bf6d99dc5b0d44c80cdc751b468857
SHA512ffedc498bf218de7e1468fe3c8c935978b2ea3507c119fee798a4bc894f0b9733a091b78341354b5534ea8a46bd50d293d5b90b6453202664af6a3fcf70d2da6
-
Filesize
16KB
MD5e9a3de71951e79e1401bc643f910b1bb
SHA14fb84a566470850934bd733a8828788cd6d0f430
SHA256a218a5f4d6a29b841e6379ee0934e3ff7b58f3ea5fa45448677f3d3e86fc0d2b
SHA512e91b42d3e295d97565bb720859aabbfae7b2b9fbb5756d394e565814c33bd6da77d0c390a83af7f5f298f4ff1b5b3ddb63ef8bda435a242718f5c9b62f07cf55
-
Filesize
30KB
MD5db978ee3d5e62a4ea30a832d24a19fae
SHA1e99822f98ee1b31731108f9c60c74d94bfd5b477
SHA2568c71988289076e6f34be5f0a197d6d9cfe5507d3e431c78521dc4c52c803a129
SHA512a7ff8706599c1bf4540f3063a881c946454ae61588df69b5ed9e53c71fd0d5cb8ef53e8e64c9e77bbd53329bf6e29a040b4d5aaebcdb7b9c7753d2081a7db873
-
Filesize
5KB
MD57b75e3026782df110d7a5fa2166ff764
SHA178e104780270877d95738c97167af944371ae19b
SHA256508eca70968bc2ffbd35e4119297bd773e676a4b92564e2dcf10e6ed40066d39
SHA512c6f8551a9e2526c58418eebb1d4484650c45e75e2850be8644a18d6ac854cf598f2375a2c00adcb12d2c900ad9c682717de4654a7032ecc4493424344781d7d5
-
Filesize
64KB
MD52129390d9b309ebc55bc4bfc1f226e05
SHA1e4164565ab0f2b655bac54cc90c65f2181180777
SHA2562ecf081a6bbd55ff6951d251d7b84413c5b8393cec1b71b9e20ea5d6b610edb7
SHA5126604d900c899c481141b95b03df7d0eb12c4502e09f7afe47727249f02b4c10fe84676ed92921a59da1535a84ad2350e72f6357cf60c77ad336c1d587c5216e7
-
Filesize
76KB
MD57b32251f76ccef32156a40f6f63b16fc
SHA18326bc70c2b441c62ce83fb36f227d5524cad2c3
SHA256680e4562bde798e57392726b4361625c339d54c5c5c53fe3002974a1ea925adc
SHA51215e44dba425829f10e2a23942d1226693916a2ffe7fcbaa384390656e74fda9b6333d4fb8f04f936ae78fb00b228b11aa84946cd7c14e01a9d73ac02c4ef12cb
-
Filesize
46KB
MD59e5d0cc2f81e3b150f4394b7cfb0e6c7
SHA16802d3f58600774728537f08761f3d22fa5c1e5e
SHA256de51fc30f5bb513cdfd756c16bb66f710a3f25db7fb5bacbe4314b03419669c2
SHA512b16c6b9e87f1c0a4437ddcedc040c7afaaa822a01c3a2dfd9acd86a539af5c09eeaaaae94133921aa127107b94790733c97b36a219dc94cd9377098823cc5803
-
Filesize
77KB
MD5954f63c225a433161155e1712f4aed3f
SHA103e993fa398f9345efc34e449ae80ce076b838c1
SHA2563000215ce2065fd649ab5a92e5eeba7cfe3211d8301259ac5d96dccc6598472c
SHA512e508796830edf5a8a0978e4a4f87b7e65363e2d6bf984656c0d75dbce1f9cbe869d3d1e8d07055792084cd22a72541a8dfe1e469838d0fb69c9bc44305250992
-
Filesize
92KB
MD5227ea420d8dbc4f1dde7d17c438a4ab3
SHA1f54a25ecf768328f3f615dc4f1637ea370e56db9
SHA2563b3ea40218bec64599b19cba85fac802b7961d16d80de35a6d777201d20abf65
SHA5121f7f2da442e4767dbac2fcc729d198456f260732ad7410d7cda0c19f3bc4d7267ac0864aea4535e276f09ccbbc788eaa2cf498b8c0f8e0b43fcd957d9487452f
-
Filesize
64KB
MD57043730e665a2e1534d01fbbea23faa7
SHA1557e93c6782d5bb119fdde83f50d04c6d5042f7a
SHA2567dc22e73086b7eb63d8f8e84f966de68b2e8475764fa0e53cf81ce02e1530ebf
SHA512853d38a6da508bbbf5beb8571f72bf888b758eedf675bc4509295a0e07443d834d27cd014fac05b1c67c34105b55594552dbdf657b62dee63a3fa375d20b5e14
-
Filesize
45KB
MD546c2e122247884b36b92093574ec6b10
SHA1f00677d983b46dd44dc974e05177e694d63994f1
SHA256b8569615090534d96bbdae536123291c72938ed61a6339888879bd9e6b2561f5
SHA512bfc112faddd7c9fa94aa252d3f4058b4b5d069bd59345c88d9d670974b26ea7c3a698bc072e14d0513a908fa9793cf82773926ab84a83003e659b133adc7f54b
-
Filesize
13KB
MD58334fecf8afeb8aa89dea8853601b54d
SHA185f995f64431c9c0699251bd03252cad684b5c56
SHA256239e1e6ccc7a6df4b2c2270bf2adce0061ed7c2249dfb7772a5f2a37bc66dbef
SHA512cc48c70f02c11ae46a12cdd5823f3f26dfc461927b312cfde84e6de0f2c4761167f112edcd11506ea3c1c2cc5c7738b8de035870947ec3e12e389e656c79e82f
-
Filesize
46KB
MD565aba279fce6a098c0fc29092ca84341
SHA149f41e9bed64f3197ac78a490b8fff5a1874ed10
SHA2564cca9b902e3c011a8592303ee0bace46fab8c391c2e6daba1a65a5995d9b436b
SHA5120bdcb49d3a527a3ecb48ba48fc49e5c2b236284508c83b2042e21a784e20e11c060aebc25de491dc7fe848840138a940dff3eac109b9a23d4e18ee24c3f917e9
-
Filesize
18KB
MD5c1272bec03704afd9f14fc90046f788a
SHA15c88b72044d415b8fb255cbbf9cc0af1a037596f
SHA256d515f12405f0988c1bc37cedfc35613c2d6ba000f383cbf34f6c9b0b693b2c06
SHA512bc4fe52317424dfd6ac476670abc124327c338d81a826cebd040a79c6596eac5152d31de4e201b1cf975b0d9e715a6b4d3fee730b86c111aba5ada6034a9e8d6
-
Filesize
82KB
MD57e4a8e364cc7ab6d9a6d00eac84cb9a8
SHA135241c00df48b439f73a738c82327d72d8565c35
SHA25698c8082a5f2da47fa6fcd2c799ece2cc2fd1b233c955f3cf81d383fe1be9c927
SHA5123ee62ae8c59c82eb733c9b3a195e1069af98edd3da66893cafe8a6cfe7f75f454dbb02015d802816d5cff530d3d49623f188f045077bada89d56386188189ad0
-
Filesize
31KB
MD5eb8dca967f4893ff829b70ff04008129
SHA1288dd4f4c9d167cd81d1afecd3b2f4eac79e1f2a
SHA25670604be8bc7297aad6963553af49e656db157ec62256ad746aca6acdd6491916
SHA512a939540a39436340d3ec9b2a69c3a777416be4b281313979baf67bd17b1e823c33d4f6782ac299369c5cb320377300b89ac6b03d130dc84105760e2413058ce8
-
Filesize
15KB
MD54691f65de7ab8ce3ce376be5e12f9cbe
SHA13062718c45b30d150ebe6213ccfbb2858a86af86
SHA25624252bdafcf4cda639a54d4d58e0afe9d4153f952fc0e858f4cd6a34f92e5ec1
SHA512fe80b0d71c7b4b76fcd97b9ecd5b96cd9d5a64ba14dca5dc4a98417facec2acc73cf65fc416e27757a6956dc4dc1e4b862ab78b1df55f0fc227bec3109c5d6d0
-
Filesize
58KB
MD55236d5654696be68d0100dfe89fd01db
SHA152eda0cb527a1ea0722cf4b5233faa4b72364c2c
SHA256adf6c323123e0cbf9a2c2fd33d846057d0c95c1d6538b13b2d1bc67331841d2b
SHA51277b7f93b0b0bbd8e42a7afd9ed7e305705ffc6a33ba92e74d65763116da55595836817e2e44b4a0577fa8a2cff1cddac2a3dbd99ec9b21c39b368c012219a9e1
-
Filesize
19KB
MD5a523cb99e551c0394e7a01d075ae2ff5
SHA19fb284cd80ec242466c961f1132365db259c4e9d
SHA256c577170e1fbaefa78fc48bef754c4aab067ea7664e342ccf0d59165b0a64a497
SHA512f95ad08aaa7bf9234a56077e4b4b66e2f4b10888ad559315e0e08e5178550e1494fe3fc783adf50c63c5d9001ee7276b3c7723ba4f03d865d1dd9f5c4ae76d8b
-
Filesize
1KB
MD50469c37c06779c374b10516f746e54cd
SHA1a554cdfb5bfe2fdbef5626dff44175a0a14c9aa7
SHA25642a50b9c0cdee18b6513ca0684fe36d5108fee23b4202466ba22f5312f2c43b5
SHA5128116e597ca3fc7d7b801424a1b37533ade4fbe62b33f7045e6eaeb6b03275c7e981498b4e237230262e157aed9d257faadb6ba1586191f0ebb8d87f292cf4ce0
-
Filesize
16KB
MD59c5a5d582213d715889dbb0f4bf7d9a4
SHA16bbee6c87b4abda5a3ffb597f719ba021156a82a
SHA256d781ec6a764dceb81cb19245968630d9b05e3fb6ab49a06391b6bfd7ea701b7e
SHA512899144804a6bc6f980eb0f7f4cec2a510b26a3438be13e9460d43895fa64dbfa8daa8471767e2eb576d2f9e16beb9f31d9213e4af2556c0c2c5dd17d481b805a