Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe
Resource
win7-20231215-en
General
-
Target
2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe
-
Size
5.5MB
-
MD5
be4d82de41c950562bf196dd324be758
-
SHA1
c9c633e0fd6cbb7feb6589112386c21335190089
-
SHA256
c6a77b1b8d919e7c33670fc3bf9454b542adb1ed4081ae411622063597d4a82c
-
SHA512
ff4a51a866349c653ae7438df107241a24b2e0137b0dff04928435e3bf1df11fe0452df748e3ba5e9509f424f5b9fd4195d7b9fafc4029cb47e1cb5e6bebc2be
-
SSDEEP
49152:iEFbqzA/PvIGDFr9AtwA3PlpIgong0yTI+q47W1bn9tJEUxDG0BYYrLA50IHLGfP:oAI5pAdV9n9tbnR1VgBVmVrvvRe12fD
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 628 alg.exe 4800 DiagnosticsHub.StandardCollector.Service.exe 1872 fxssvc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\4a177c064d74bb6b.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe File opened for modification C:\Windows\System32\alg.exe 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2664 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2648 2664 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe 17 PID 2664 wrote to memory of 2648 2664 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe 17 PID 2664 wrote to memory of 3592 2664 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe 64 PID 2664 wrote to memory of 3592 2664 2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe 64 PID 3592 wrote to memory of 1232 3592 chrome.exe 63 PID 3592 wrote to memory of 1232 3592 chrome.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-01-10_be4d82de41c950562bf196dd324be758_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=113.0.5672.93 --initial-client-data=0x2dc,0x2e0,0x2ec,0x2e8,0x2f0,0x140462458,0x140462468,0x1404624782⤵
- Drops file in System32 directory
PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run2⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2348 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:23⤵PID:996
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4172
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2104
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:1660
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4628 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:11⤵PID:3196
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4800 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:81⤵PID:5072
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:1132
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4924 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:81⤵PID:4780
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:3804
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵PID:804
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:2692
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵PID:5192
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:5316
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵PID:5436
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵PID:5584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:81⤵PID:5904
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4744 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:81⤵PID:3412
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:5264
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x238,0x23c,0x240,0x214,0x244,0x7ff75a217688,0x7ff75a217698,0x7ff75a2176a81⤵PID:5496
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff75a217688,0x7ff75a217698,0x7ff75a2176a81⤵PID:5688
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:5712
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:1976
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵PID:5924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:81⤵PID:5464
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5880
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=01⤵PID:5636
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings1⤵PID:5164
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:6012
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:5852
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵PID:5736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:5604
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:3500
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:11⤵PID:2092
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2992 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:11⤵PID:4812
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:81⤵PID:3992
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:81⤵PID:4612
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 --field-trial-handle=1900,i,10303390199372080887,3373041566560175277,131072 /prefetch:21⤵PID:3940
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵PID:4036
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
PID:1872
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:4800
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffeeac9758,0x7fffeeac9768,0x7fffeeac97781⤵PID:1232
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b271c41e6c6d7e9c0c7b947d52824d51
SHA184f488bb47f0f2e4e90c37ab06b48c8608dfb138
SHA2561e0db43cdb86a1ee812433a7add6fdcca8cec8d1916b6799907e1f06da39218e
SHA512abe30fdbf30279265ef59ad808105f82783f687e4e4d1c1bd6e167a8f366c302c3086be96b7b62982ab96d9fd1460ffd5542468357c674505e7249066b8cb85d
-
Filesize
1.4MB
MD53b4053f91c874e0f417207be046be115
SHA1036f1d5aad590a41e8bccc02763b061c94772565
SHA256c4c23ea86bf7f2a02d5814831ccdd83eda476cc6f8dbcd220f6d641dea2c5635
SHA5123ff7d33e86bba934636f6e82a7415a1e0e35b1f9dedc60ff6f36ac5a97ece1e097e1974bea543b3831b96cbaaa53c2ce9dc3af5d29d956fba5ea68cbf052ffaa
-
Filesize
488B
MD56d971ce11af4a6a93a4311841da1a178
SHA1cbfdbc9b184f340cbad764abc4d8a31b9c250176
SHA256338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783
SHA512c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f
-
Filesize
4KB
MD51ee9ab37d47954a0d41ce20310266a99
SHA158f7df368eb48d56725770dde3afecc2e71dfcff
SHA25654ec806d3cae8aaccb3ccc21cc5d80e128f8f3127616bc574d0306748f9c5a69
SHA512cd42c57c4e8ace0a2a151b7719eaa5256d45c91384290bf5d7a9e18c2847a3eea2e59028c599b356ca20ab6f954e68a66e9da9e401847b2fdcc3d498d92a0a2e
-
Filesize
7KB
MD5f995adbe79e7b18adf814d955b6cf1ba
SHA1ab84d285992d6af1ae8ae0b7dc2c189fa214fd64
SHA2564b9dbb5846a032746ab08a59e07c7c4796161fd6378c4a631ae9c8485f8a86b7
SHA5129f26ee23f537204f48950dfad58888ed7a32466b4e9c14f525d5b23c841ed8a272f2ff2b4f450db33ca9db1269cb4297e01ca2f97fe98eace58bbf51fbba9482
-
Filesize
8KB
MD58c2f803d3581bb178fff77acf5855a2e
SHA1b8a6ba695f3f151741ceb2d6c40f4acada17822b
SHA25630339542c910dfb8c579accfb32af03e33c40e118e377533e69c2fd75334309b
SHA51202ae8da4d9d08266a8d7ab9f11cd711439685db3ae2644f479e5e01dac0d9f1d7f7b0ef83aaa6dc9b06b097412c05370d1384be19c5c2beae88851cec0cece7c
-
Filesize
1.2MB
MD577e12674e0791e35dca87c6fc4ebfcfd
SHA1bafe436758e563d959ee37e540917d2e834f39c3
SHA25605a9b88553dac64bb17f96cc683ad58417480b2155398e53130f3ab40e228630
SHA51268945287f822ff1f91b1f98a7e490947038f4da28e15b0811a8910d3ee43fbc7d24ea6ee34fdcc78d9cbcf3f9fd67f0263cec88c38ecb2d2115ccee06b999242
-
Filesize
1.7MB
MD5a2da828275f4be73909ecccd52d92f54
SHA17e21b6abfe9c8fe5af9a7e907384ad5eab7784ad
SHA2569bfc318f18007197259830a792aacafbfec32ae6dbe3535212f7380e18b6bf94
SHA512da82a1efe2b963c399a41e777c6ae7307990e25191638cabe366d7d003e8243681a4652127bda0dbb1519c5fdd74d7bf364e5d0a8bf9207bcbcda8edba5ee8b0
-
Filesize
1.1MB
MD5226d150b0114681310abcfc1247af4af
SHA1ffa190e3dbd67ddcf9fbc47a804699336f79b0bb
SHA256178653182a6aa477acc277d86f8755305c0b612bd10b28af658f9c3396b641e0
SHA5120569c072aa8e18e63d7ea4d29720cfef8ea8cc5161ee389f6b9043bbf9ab3864e6b9683773c2617e80dd0658cad56e67c234ba294723628098486e9fe0b15aad
-
Filesize
1.5MB
MD50717b5d3cc5470110a2613020cf869a2
SHA100952b6c9b9dbc65a3e1ae226cc5f50ca2023521
SHA256f611b8793ee07162da6ab6d5527f49e9e4ff5755d877bd206c5e1c92b21b4e4c
SHA5120c54499e256b8e601d7645dcf3ae5e38623b6b8eb9dca2b9907f40332875039b3d8dd5ad5c10b7678a154439e24a456b05155f5f0301e7713dec00a87e73d9f1
-
Filesize
1.4MB
MD54441ae9fff5f1e23110e68fb8496c7d3
SHA151142cf61be34da11b39c064ce5e8928807afec5
SHA2567af1b904da1c0345ce4a44aa049587079fb20f1c30557a9c411e566475c6bdff
SHA512f32a3fd6e2caeaae09a140a2732ceec48f171e370b2246572e459454a5009935b8f86c35f2f70acff9156ceb6ce3da1a93294834ea4bacb9834b661c39b12f3f
-
Filesize
1.8MB
MD506e53240277f7a2a8161d7568fb64c08
SHA10574717a885e9d556cb5cab69f5b8c53beaf0fd7
SHA256549d47551a29306b376168c2f7d05921ef3da66909bb1466ffba89e5c9958a76
SHA512021c5acf6422bf00da0b19f481f2b6abec9b5529ee9f055cc1bbcd1ef98678c387d4dc69b20b4efd8a62cf68386db2020f66cbaefd4106884de4370289ef55db
-
Filesize
1.4MB
MD5c2dff6cd31dc3fdbdf9f3c3d57be5519
SHA1dd47d1044ca156b1464466b4db811c0edc3089c5
SHA256540d3c2768ce2c2fbea7e4c170b0c6c9200c339854e9f6e2503307ac243e8131
SHA512344871fdde84d40ec9c69d8593b8e047214f020ebad9220cbda58d053b43708ae1a43143161937c62edc7785954c85329af2409f3f010cedb26e2301e2faf54a
-
Filesize
1.4MB
MD5272d3e5641e1515ac844c40500be1176
SHA14db2e27d8494863c232d9ecb9f5999e9ab4fc0dd
SHA256832f829bbcfa46832c6ea101e15d40d7d219f543feadbb5734e7eab4ed218892
SHA512dba7e8706d314552951aa08abf955d9eac6562109cc2cb28581a68171bf71549bbbcf46979cdfdc9c8a290f3426e196c9d6de1c9cfac45853a7d6ceeb13b2de4
-
Filesize
2.0MB
MD536361baa52d5ee837cfd6e330716a8da
SHA1d0c43ad7c1adf99f48f9639c12a35781db265d99
SHA256c835d2cc6106021256a0c4d6a9972810183ecd082e43a28de1b3759de82d72a1
SHA5127a18c232b3aca1c272891ecffba7dbd857b95f2302cc6af7db29d2edc6c7c17dd0a00b429c2028107b0aedfc58972d00cac4be18857878c3b7fbcf9142512b94
-
Filesize
1.3MB
MD592d2f4058cb8e06a1632c710eebaaecc
SHA16e187bba69e876d356a73723f5edd070ab687314
SHA256f8f0001217aba21ff1e6fee8fe435c192f51b47e23d5902bea538029a15fea1b
SHA512ceb77a85e98f5f015655cdb4fe3b5f4d93f74cc71925ea2dcdd12bff6e6fc34c11951c07350c325a3a6f6da267dab7b3c955e8ae1d9fc0cd8d682e7ba365aeda
-
Filesize
1.1MB
MD5259201396f11d37e3a6d2589aa266b24
SHA126dc5fb840986bec48dbc5776630b15d870bafa1
SHA2564a3556a2539718f4695366cf699855d767b8721aa8b2a93e4e3e4b8e9b50a71b
SHA512f8ebaca528adc3ba7f5f72b314aaf7e4ac5c7326ba1fd41d9e835ce55e5dedc7537979cd7a2f445b130bc7fe18c7fdb16b1b034490344c755af276a081ea57e6
-
Filesize
1.3MB
MD5be038df442b2ec80b772a340a0b7d554
SHA1fac6fe478ba4397e4878dccfa3a47285a835d49c
SHA2563c197bdd6065fb0c27c9a5d85a3fcc7b109ab99c362c19283f4a1cd735bbeb21
SHA51216e2b8c3ab1081b94ac3ee57f83832fe22035929443e9b51681b111235832bf0febd39777b2ddd6bbf2b9aba40607e5b4cd234f65857bb50c53a6426e9e89919
-
Filesize
1.3MB
MD5e107a200676e466bc267a0de7bf77c22
SHA1da7490fef6222208284d840c4849ba5022a3fbe1
SHA256c1becd144fd1ff811f9f0cb23950e3d56e10127b5618da1b848f41fada8952a0
SHA5127831a50b028771957c81abdbd237cb0778c9991cec616671109b96a46b233f7e2f1ce59f1fcb68a1a171b03816a7147578b97f2c11edcc0ee9dd0082d6a750ad
-
Filesize
40B
MD54c673548cddb6b082f48537ce42f0278
SHA17077489247ee9e8640de79562dcd484db9f950e5
SHA2562727141051205cc7df3e821fbc031eda6187e568a3507ee24d00062678d9d666
SHA5126ccabdb781dc8ea917193221ee4a0b8b03f573eb0055470e68a5eba793e5a501a48ea3b0044780160ebd922b13159a23ea8f9c07d8956d612216291573bfdbb4