Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
366e876c02a...bf.exe
windows7-x64
866e876c02a...bf.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
1qoit.exe
windows7-x64
7qoit.exe
windows10-2004-x64
7retook.exe
windows7-x64
8retook.exe
windows10-2004-x64
8Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
66e876c02af84b153315d9328d032cbf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
66e876c02af84b153315d9328d032cbf.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
qoit.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
qoit.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
retook.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
retook.exe
Resource
win10v2004-20231215-en
General
-
Target
retook.exe
-
Size
922KB
-
MD5
c81501a4fd4475596ea7af32f4912f72
-
SHA1
e3a9bd5bc49515f574fc8b66ef2990354aba033b
-
SHA256
f132a441aa9375dfef0765646f60934d2b95feeb929246272df2beba61787008
-
SHA512
aaad0a4f28e6a19ff0a201f86f889ad1462304288ff0b0fda29a54c0b28f2a67e1ae733118cff51d39a68cbf3513938918cdd80c4f88e8bc0ae6da1fe9c9b5c9
-
SSDEEP
24576:Oyoavmlfr+8S6B/fIzgEqVGnwCE8xQuRdIFdtaL2Pv:doi0c6ZfIcEqgn/TxXdS
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 9 1668 WScript.exe 11 1668 WScript.exe 13 1668 WScript.exe 15 1668 WScript.exe 17 1668 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2704 All.exe.com 2712 All.exe.com -
Loads dropped DLL 2 IoCs
pid Process 2644 cmd.exe 2704 All.exe.com -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" retook.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 All.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString All.exe.com -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 0f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c1320000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2828 PING.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2704 All.exe.com 2704 All.exe.com 2704 All.exe.com 2712 All.exe.com 2712 All.exe.com 2712 All.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2704 All.exe.com 2704 All.exe.com 2704 All.exe.com 2712 All.exe.com 2712 All.exe.com 2712 All.exe.com -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2240 2152 retook.exe 28 PID 2152 wrote to memory of 2240 2152 retook.exe 28 PID 2152 wrote to memory of 2240 2152 retook.exe 28 PID 2152 wrote to memory of 2240 2152 retook.exe 28 PID 2152 wrote to memory of 1308 2152 retook.exe 29 PID 2152 wrote to memory of 1308 2152 retook.exe 29 PID 2152 wrote to memory of 1308 2152 retook.exe 29 PID 2152 wrote to memory of 1308 2152 retook.exe 29 PID 1308 wrote to memory of 2644 1308 cmd.exe 31 PID 1308 wrote to memory of 2644 1308 cmd.exe 31 PID 1308 wrote to memory of 2644 1308 cmd.exe 31 PID 1308 wrote to memory of 2644 1308 cmd.exe 31 PID 2644 wrote to memory of 2432 2644 cmd.exe 32 PID 2644 wrote to memory of 2432 2644 cmd.exe 32 PID 2644 wrote to memory of 2432 2644 cmd.exe 32 PID 2644 wrote to memory of 2432 2644 cmd.exe 32 PID 2644 wrote to memory of 2704 2644 cmd.exe 33 PID 2644 wrote to memory of 2704 2644 cmd.exe 33 PID 2644 wrote to memory of 2704 2644 cmd.exe 33 PID 2644 wrote to memory of 2704 2644 cmd.exe 33 PID 2644 wrote to memory of 2828 2644 cmd.exe 34 PID 2644 wrote to memory of 2828 2644 cmd.exe 34 PID 2644 wrote to memory of 2828 2644 cmd.exe 34 PID 2644 wrote to memory of 2828 2644 cmd.exe 34 PID 2704 wrote to memory of 2712 2704 All.exe.com 35 PID 2704 wrote to memory of 2712 2704 All.exe.com 35 PID 2704 wrote to memory of 2712 2704 All.exe.com 35 PID 2704 wrote to memory of 2712 2704 All.exe.com 35 PID 2712 wrote to memory of 1668 2712 All.exe.com 40 PID 2712 wrote to memory of 1668 2712 All.exe.com 40 PID 2712 wrote to memory of 1668 2712 All.exe.com 40 PID 2712 wrote to memory of 1668 2712 All.exe.com 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\retook.exe"C:\Users\Admin\AppData\Local\Temp\retook.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe2⤵PID:2240
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Molta.wbk2⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^yNmEqrPOypxBlVnuFemmfzGnSPBDoxoqgOjuQxEteLTSbEtnlUplDSaMuqLlBkGLqxjvJsflnxbEmOwhKrzgkYbccmZQIzCQyoReaIOSFYMocOhaZnAnSameXQqpsn$" Bel.wbk4⤵PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.comAll.exe.com g4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\All.exe.com g5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\embjypotuspl.vbs"6⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1668
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping AILVMYUM4⤵
- Runs ping.exe
PID:2828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56286a0784c5abff7dbc679ee79bfd5b5
SHA1b557e06380344dedc8a8811b505d643a3caf4bc6
SHA2561e939f4c94a0833d8bfbd8703ab14c84b134d802f8df1a36fc1fba63dc54fbd9
SHA5121540ee73abd5cc88ad32af2e37831131240f4146d00eabfb27a159729ffae897f39ec903e635fc96d8a25e91aca7366296523e95a2804e9d0bcd6f293120e17a
-
Filesize
313B
MD5bee55e52500f967c3d9402e05dd57f65
SHA1d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6
SHA256b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0
SHA512b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
395KB
MD55d203ec516a3541ede237e7504739442
SHA1f085725f6d2f369b43b8707281ef02f98d5ce531
SHA256d694f80bb94a6c1e3fa77eb2149a631a825b668ebb030d463d1d61661b0d83cb
SHA5128f842dd79ffb5fe68b855f904c5e832ab44e2bc90d590b12d3f699c808ad9aeb4f18200c481cffacbfbfda81389718c6ae1917cac2c8d3bdc0b5e7cc7c622e70
-
Filesize
49KB
MD56d31d0416296754c21b95884d2a78954
SHA15d953b2e713b752dc5e532b32985503aec295ae2
SHA256d8344cedb684aa755d7d692e7f792644a897edd8583ef61c8f6bd66c18870090
SHA51256befec830cc58704069240e1c32dacea6ff056db6278e146a3ba83691ab0f29fdaddcab39d3f07394153b9c99918eb060233b68ed18198716da6b9ec3871299
-
Filesize
103KB
MD5801404f8e0ffa52b8dfed4d5e455b52e
SHA1e65dcc1702e19985f7384ef625f9f9a9a31cf1b4
SHA2563204ab8a6c5955f64ac3a9861324a02bfbbef6e524bfff19a0a5e29cabae1de4
SHA512a137416e6390c3aaa95a994348ee0869c76c8bb946e857c3d2322811acef3dc7516b8b24eab9cad01d81da456f2f8a49b0356530630eb7e101cc14f676400e0f
-
Filesize
872KB
MD51e682e599f4aee63bc7a6594c7a36d99
SHA15b41ba7adf84b3a67d4195510ab1c8ff8d10bfc0
SHA256619566d38849874a55c135ef9280cdce0df5eb05e32e576c03bf35c01241687c
SHA51251f4ce897f065b21712b5f4f92f24013d0877f1b3c39dfd7ef9802c1875401daedbfc44841fa7f58a6e688b803bcbd85c8eee4b629516eee07f6842ab00c12be
-
Filesize
466B
MD55c8a283903791aa4630e516bade66942
SHA1757539d1ff447dd52394504342ac4362b68d3196
SHA256fea27f988519d41f6dd26187176a859f471ec4ea2c2441d8e1dfc614535cece1
SHA51295b990630d6568259b0102a6ae7b654a43eee84388a2122556841a02e5a420ec3d625d296682511ca864efae89e620733a0ce1464f8d361baa4391b291044f5a
-
Filesize
642KB
MD56df2fef40b399f9baf72cb2fc34e8d44
SHA1bd715d439f12280b4f8c207131b2e23ec0c852e6
SHA256bc0f0192ba537e736834983332eb5939db8bc344e09f18e1280681dbc8726e0d
SHA51220f824a2d2f088ae0843c33487f2bf35d24b82da9188e0b849a173cb62cf1eba8ab1eb911574d66f0297d5438cf32874389281d2aa90351d82b10cf48d65729a
-
Filesize
384KB
MD5beb647de60d37feddbad9386dfb01093
SHA1a830598d0002d2ebcf1b8afca35213c77c600920
SHA256eca291b45848d4320ab8d8984e63f9b87715ebe2ae660242568fb00f43eabb80
SHA512eb15fe271a49a22ec87bf1b7092b7fc19a4cf14158b6224067f0e4980ed9b9b911998eccb5cdc5db234349e548edec40633aba3ba915ba09e78da9f5a08a02b9
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
145B
MD59bc3c65401a9bae369c1d9c2f83bcc6e
SHA18b4875f6c39d4d8289949d26fc2e48806c593880
SHA25604652b270e4e7ecaaf423ed9e6462a6c737882b208969b52e73d6e141580f7a3
SHA5122434fd55080709a5a534a87512cb602b8efab7b9cf2127d76ca1e3e8233f98d542d3b957be9cfbfc6dd89f7ccb9caa05d50648defdc5338f3efc7377496fe34e
-
Filesize
418KB
MD5ea38e17bf1e5f2f87d8679c2614b7486
SHA1d1879b67aa5efce4f2174028d7fad98a4b4e451d
SHA2561614e5ce6450b9e49cf730aeb8e41d0e77fad41542efc3453286337ec8ff15c6
SHA512604bb17897e1c7d4f1497004604aec6260ff165a1c9bcc0b4d2b8de3c8d83fa7c554aae47e27edff58c418f4eb59d2b584a76fdba1623e3bbe95b73fd078792f
-
Filesize
128KB
MD55de419f89025ec79495d1815f331a4dc
SHA1ff1165ebd796ba40063b8a2693ac5b4f67aa28e3
SHA25649dda37ef4ff129d2cf2cfe0612bc285f8eb0150a0b1e08b7c6af03cc0a367c7
SHA5125b7f019921aaae24d7f4af1c9e846ec6362cffd61813470d5fc37f2ed1aeccebd02e24258418e1ffb32d79365db6517d30a75d0055a8584037f9f937b1c5e0fa