Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
235s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe
Resource
win10-20240221-en
General
-
Target
b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe
-
Size
150KB
-
MD5
5b9ea10c9f277c2a5c89df19044731fe
-
SHA1
7327c3d7f737e96c37c7bf24100608ce7479d477
-
SHA256
b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b
-
SHA512
bf5170bb3ac64b8226c1c27ce05b2cc61ed439f5fb7e8d1f9f975451566c62e888de028716157d37e86070733dd77e187bdfc4d6821548857e436e6e55ab96ab
-
SSDEEP
1536:0QkC/DSwveRrnxpGPM0aR4EM6VwAVXlVH/ANDJmEpjklo1CgC9VSJ4etRP:0QsRvv0aR41mwgTH/bzG1CcJ4etR
Malware Config
Extracted
smokeloader
2022
http://selebration17io.io/index.php
http://vacantion18ffeu.cc/index.php
http://valarioulinity1.net/index.php
http://buriatiarutuhuob.net/index.php
http://cassiosssionunu.me/index.php
http://sulugilioiu19.net/index.php
http://goodfooggooftool.net/index.php
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload 6 IoCs
resource yara_rule behavioral1/memory/1844-206-0x0000000002C20000-0x000000000350B000-memory.dmp family_glupteba behavioral1/memory/1844-207-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/1844-258-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2388-265-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/2388-289-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/812-330-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Pitou 2 IoCs
Pitou.
resource yara_rule behavioral1/memory/1920-42-0x0000000000400000-0x0000000001A77000-memory.dmp pitou behavioral1/memory/1920-53-0x0000000000400000-0x0000000001A77000-memory.dmp pitou -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ C40.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 948 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C40.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C40.exe -
Deletes itself 1 IoCs
pid Process 1084 Process not Found -
Executes dropped EXE 15 IoCs
pid Process 2416 C40.exe 1920 118F.exe 680 BF4C.exe 2192 BF4C.exe 1240 4B57.exe 2112 5891.exe 1412 5891.tmp 1256 InstallSetup_four.exe 1844 288c47bbc1871b439df19ff4df68f076.exe 3052 uyw.0.exe 2408 uyw.1.exe 2388 288c47bbc1871b439df19ff4df68f076.exe 812 csrss.exe 1360 patch.exe 1964 injector.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Wine C40.exe -
Loads dropped DLL 29 IoCs
pid Process 1448 regsvr32.exe 680 BF4C.exe 2192 BF4C.exe 2112 5891.exe 1412 5891.tmp 1412 5891.tmp 1412 5891.tmp 1240 4B57.exe 1240 4B57.exe 1240 4B57.exe 1256 InstallSetup_four.exe 1256 InstallSetup_four.exe 1256 InstallSetup_four.exe 1256 InstallSetup_four.exe 1256 InstallSetup_four.exe 1256 InstallSetup_four.exe 1256 InstallSetup_four.exe 1256 InstallSetup_four.exe 2388 288c47bbc1871b439df19ff4df68f076.exe 2388 288c47bbc1871b439df19ff4df68f076.exe 852 Process not Found 1360 patch.exe 1360 patch.exe 1360 patch.exe 1360 patch.exe 1360 patch.exe 812 csrss.exe 3052 uyw.0.exe 3052 uyw.0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2192-85-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2192-88-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2192-89-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2192-90-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2192-91-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2192-92-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/files/0x000600000001621e-229.dat upx behavioral1/files/0x000600000001621e-234.dat upx behavioral1/memory/2408-240-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral1/memory/1256-239-0x00000000036E0000-0x0000000003C10000-memory.dmp upx behavioral1/files/0x000600000001621e-227.dat upx behavioral1/files/0x000600000001621e-224.dat upx behavioral1/files/0x000600000001621e-223.dat upx behavioral1/files/0x000600000001621e-220.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\288c47bbc1871b439df19ff4df68f076.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" 288c47bbc1871b439df19ff4df68f076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" 288c47bbc1871b439df19ff4df68f076.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" BF4C.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 288c47bbc1871b439df19ff4df68f076.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 118F.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2416 C40.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 680 set thread context of 2192 680 BF4C.exe 35 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 288c47bbc1871b439df19ff4df68f076.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\explorgu.job C40.exe File opened for modification C:\Windows\rss 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\rss\csrss.exe 288c47bbc1871b439df19ff4df68f076.exe File created C:\Windows\Logs\CBS\CbsPersist_20240311002436.cab makecab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 uyw.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString uyw.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2796 schtasks.exe 1312 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-103 = "Microsoft Corporation" netsh.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace\Session netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-262 = "GMT Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-72 = "Newfoundland Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-21 = "Cape Verde Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-472 = "Ekaterinburg Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-421 = "Russian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-448 = "Azerbaijan Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-601 = "Taipei Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-551 = "North Asia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-961 = "Paraguay Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-242 = "Samoa Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-3 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-331 = "E. Europe Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-192 = "Mountain Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-582 = "North Asia East Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-100 = "DHCP Quarantine Enforcement Client" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-81 = "Atlantic Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-271 = "Greenwich Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-365 = "Middle East Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-471 = "Ekaterinburg Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-201 = "US Mountain Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-541 = "Myanmar Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" 288c47bbc1871b439df19ff4df68f076.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" 288c47bbc1871b439df19ff4df68f076.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 csrss.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4 patch.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\DF3C24F9BFD666761B268073FE06D1CC8D4F82A4\Blob = 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 patch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1712 b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe 1712 b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found 1084 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1712 b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1084 Process not Found Token: SeShutdownPrivilege 1084 Process not Found Token: SeShutdownPrivilege 1084 Process not Found Token: SeDebugPrivilege 1844 288c47bbc1871b439df19ff4df68f076.exe Token: SeImpersonatePrivilege 1844 288c47bbc1871b439df19ff4df68f076.exe Token: SeSystemEnvironmentPrivilege 812 csrss.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1084 Process not Found 1084 Process not Found 2416 C40.exe 1412 5891.tmp -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1084 Process not Found 1084 Process not Found -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2408 uyw.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2416 1084 Process not Found 30 PID 1084 wrote to memory of 2416 1084 Process not Found 30 PID 1084 wrote to memory of 2416 1084 Process not Found 30 PID 1084 wrote to memory of 2416 1084 Process not Found 30 PID 1084 wrote to memory of 1920 1084 Process not Found 31 PID 1084 wrote to memory of 1920 1084 Process not Found 31 PID 1084 wrote to memory of 1920 1084 Process not Found 31 PID 1084 wrote to memory of 1920 1084 Process not Found 31 PID 1084 wrote to memory of 1596 1084 Process not Found 32 PID 1084 wrote to memory of 1596 1084 Process not Found 32 PID 1084 wrote to memory of 1596 1084 Process not Found 32 PID 1084 wrote to memory of 1596 1084 Process not Found 32 PID 1084 wrote to memory of 1596 1084 Process not Found 32 PID 1596 wrote to memory of 1448 1596 regsvr32.exe 33 PID 1596 wrote to memory of 1448 1596 regsvr32.exe 33 PID 1596 wrote to memory of 1448 1596 regsvr32.exe 33 PID 1596 wrote to memory of 1448 1596 regsvr32.exe 33 PID 1596 wrote to memory of 1448 1596 regsvr32.exe 33 PID 1596 wrote to memory of 1448 1596 regsvr32.exe 33 PID 1596 wrote to memory of 1448 1596 regsvr32.exe 33 PID 1084 wrote to memory of 680 1084 Process not Found 34 PID 1084 wrote to memory of 680 1084 Process not Found 34 PID 1084 wrote to memory of 680 1084 Process not Found 34 PID 1084 wrote to memory of 680 1084 Process not Found 34 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 680 wrote to memory of 2192 680 BF4C.exe 35 PID 1084 wrote to memory of 1240 1084 Process not Found 36 PID 1084 wrote to memory of 1240 1084 Process not Found 36 PID 1084 wrote to memory of 1240 1084 Process not Found 36 PID 1084 wrote to memory of 1240 1084 Process not Found 36 PID 1084 wrote to memory of 2112 1084 Process not Found 37 PID 1084 wrote to memory of 2112 1084 Process not Found 37 PID 1084 wrote to memory of 2112 1084 Process not Found 37 PID 1084 wrote to memory of 2112 1084 Process not Found 37 PID 1084 wrote to memory of 2112 1084 Process not Found 37 PID 1084 wrote to memory of 2112 1084 Process not Found 37 PID 1084 wrote to memory of 2112 1084 Process not Found 37 PID 2112 wrote to memory of 1412 2112 5891.exe 38 PID 2112 wrote to memory of 1412 2112 5891.exe 38 PID 2112 wrote to memory of 1412 2112 5891.exe 38 PID 2112 wrote to memory of 1412 2112 5891.exe 38 PID 2112 wrote to memory of 1412 2112 5891.exe 38 PID 2112 wrote to memory of 1412 2112 5891.exe 38 PID 2112 wrote to memory of 1412 2112 5891.exe 38 PID 1240 wrote to memory of 1256 1240 4B57.exe 39 PID 1240 wrote to memory of 1256 1240 4B57.exe 39 PID 1240 wrote to memory of 1256 1240 4B57.exe 39 PID 1240 wrote to memory of 1256 1240 4B57.exe 39 PID 1240 wrote to memory of 1256 1240 4B57.exe 39 PID 1240 wrote to memory of 1256 1240 4B57.exe 39 PID 1240 wrote to memory of 1256 1240 4B57.exe 39 PID 1240 wrote to memory of 1844 1240 4B57.exe 40 PID 1240 wrote to memory of 1844 1240 4B57.exe 40 PID 1240 wrote to memory of 1844 1240 4B57.exe 40 PID 1240 wrote to memory of 1844 1240 4B57.exe 40 PID 1256 wrote to memory of 3052 1256 InstallSetup_four.exe 41 PID 1256 wrote to memory of 3052 1256 InstallSetup_four.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe"C:\Users\Admin\AppData\Local\Temp\b2c1756978600389612d1bdba43ac1195399bb0c56c59b4b9a72c3aa6b70b81b.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1712
-
C:\Users\Admin\AppData\Local\Temp\C40.exeC:\Users\Admin\AppData\Local\Temp\C40.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2416
-
C:\Users\Admin\AppData\Local\Temp\118F.exeC:\Users\Admin\AppData\Local\Temp\118F.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:1920
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\511E.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\511E.dll2⤵
- Loads dropped DLL
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\BF4C.exeC:\Users\Admin\AppData\Local\Temp\BF4C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\BF4C.exeC:\Users\Admin\AppData\Local\Temp\BF4C.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\4B57.exeC:\Users\Admin\AppData\Local\Temp\4B57.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup_four.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\uyw.0.exe"C:\Users\Admin\AppData\Local\Temp\uyw.0.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\uyw.1.exe"C:\Users\Admin\AppData\Local\Temp\uyw.1.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "4⤵PID:2580
-
C:\Windows\SysWOW64\chcp.comchcp 12515⤵PID:1232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F5⤵
- Creates scheduled task(s)
PID:2796
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"3⤵
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2388 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"4⤵PID:920
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes5⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:948
-
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:812 -
C:\Windows\system32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F5⤵
- Creates scheduled task(s)
PID:1312
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f5⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll5⤵
- Executes dropped EXE
PID:1964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5891.exeC:\Users\Admin\AppData\Local\Temp\5891.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\is-NNQM6.tmp\5891.tmp"C:\Users\Admin\AppData\Local\Temp\is-NNQM6.tmp\5891.tmp" /SL5="$80122,1542094,56832,C:\Users\Admin\AppData\Local\Temp\5891.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:1412
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240311002436.log C:\Windows\Logs\CBS\CbsPersist_20240311002436.cab1⤵
- Drops file in Windows directory
PID:2160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
144KB
MD51c2d1c28891641c40fd85cacf506ae23
SHA109cf13a65c8c31c3899554f9021670e4167441b6
SHA256042aa5f7130bd69414e4c3f8ece7bc3a12537e301765389eb5a3f59367790eeb
SHA512639e7b31dbc03b8d77d666d5fcae1189bfe3fef8b78d7bca32c73a3127fb490a892ce3ee8eb5a354959d0cafa1b95524178a3e9026faaa8b5f8d2ea1cf129635
-
Filesize
554KB
MD5a1b5ee1b9649ab629a7ac257e2392f8d
SHA1dc1b14b6d57589440fb3021c9e06a3e3191968dc
SHA2562bfd95260a4c52d4474cd51e74469fc3de94caed28937ff0ce99ded66af97e65
SHA51250ccbb9fd4ea2da847c6be5988e1e82e28d551b06cc9122b921dbd40eff4b657a81a010cea76f29e88fda06f8c053090b38d04eb89a6d63ec4f42ef68b1cf82b
-
Filesize
36KB
MD5dcd7f6982276041179747e5cc7532aca
SHA1e90bd6c85be170fe846e73c7f730e7251eb26585
SHA256441fc06b7555956d0c64063b213f0bba10d0271d61901192bd61318790ee1eb1
SHA5128ee61b5685d2d2105fe23c078cdb06fe4bde3cf47f954e39885da8ca0aa9f52dbb23ca29556cba8356ca7d9004fc9ba08a6ece088aaa4656e35decb921f09aa3
-
Filesize
29KB
MD53fa9543cb0c9834825d72aa542b2c653
SHA1e9a495d81010f00e4895ebd4afe92ec8e34226cc
SHA256097ee5863d46adfc6f1070489c0bf063f24c32a363f318bd7101ba2fbb3d32d6
SHA512f91240337cb24ae747f7114457d9f27b8dcae58c3a3a4643862d67268e2dcebcdddada3468d5b1edc39ebafeee4d3c5f0ac2e39b5ba312a4ab9023a886771cfd
-
Filesize
22KB
MD52834aab3d84b32a449d0408daf9ead4d
SHA1a1d22ea8722353ca04e90b3c2b874cb9f7874365
SHA25643bdf649335c7adf74ad3de2f2aa177a531aa8ce7597e64be4b017ee7c94cfba
SHA51213dca32f21665cd1ee20e1703515ded04fe34d5273201b6999da85542a508b30349466b940a4c7eed939abe27f2b6dee465cc7f012bb180b599a19cdfc8f94e1
-
Filesize
217KB
MD5470929ee9680f2e4a931cb2de641ac58
SHA1278c5947ec9bc81f87ebe74688ffb9cb985c1662
SHA256b7b8142cebfe20d70c8c2293d9a335b81e0acdad50666cf4f0523b7714528be0
SHA51257eed73afec0a7608485d45951db306d36bbb5979d21e1102cb7c7f0c6bc6d1f483dd6e87fc242458d0ba4878d8b99e8e12f81d4c048f7b3285f792f0db62536
-
Filesize
1KB
MD5e2c7bd9d82c868dc8e79599e945a2b9c
SHA18bb031b18e62d2f80b375f4ce87de15e6fb827aa
SHA2568adf5244751a2ff2234292bcc7b657229235c415326f64bbf5fdc648d5bd6af7
SHA512665ca43ccf61a94a8fee153aa5d773415dfcf4081009a393858c8ff35e4c964f331a771c7b47c63c41bd1cd123be7a68750ceba49b7bce73644553c9fb0eac0e
-
Filesize
110KB
MD5e7d80ee70390c497c325906fb4877251
SHA1ebcd6a868ceb18ec7e220ab54fcfa98f071e218f
SHA256a9b7e49fd465513aee29287ecbc7b2fd03c7df6b0b7e601056b4412da46c141d
SHA512613a2d8f501f76242eb230137add36da87f8ab84a27de7d392489a13733c9c437c3806a0400a2dc289811ab29c2e254587c0e08deb042b327561c6ee06ee67d5
-
Filesize
192KB
MD5f03281cd88d14a8fdd7efbc4d09dd0bd
SHA1468064deefb54d0722da30b06c98c9e6deb12bec
SHA2568848776cce1e52abfecc4e8c558f5a20950d06b4da734983f24e69b795b049b8
SHA51290674e30e30e2df7225c723fcb7173a070ee763e2bb1d47a12f2961852a1602e4a170c59202bce97d25eb7851d173be826658828247819fe5c72eb0a7df1a3bc
-
Filesize
992KB
MD5a5173536e46f1f2a6d80ed532ea6e37c
SHA11e4a28598a93f2686eeb2b17ab8f055071c96c40
SHA25621d3c5b4d227d0fa693fae33aca214baa791fa1a7295161dec5369fdbeb844a8
SHA5129a85eaff06f8badc98c216a75abb388659294c6829e33d4655b774fc0a7831cdda2c57295f2dd9a4d15457a0e3bc6ee7b9efbdabde41b028fd474584ab24f665
-
Filesize
1KB
MD51e894d416c7b7f67a2e352698183285f
SHA13d222daf7fe4a3d090b126a0cd174387bb7939ae
SHA256c38f1f94f2836d80f04d18aea6dd83ef11eb3d91b9f599e61ecd0eb2f17c0207
SHA512529cd884892b26b7f42a5367d8f6ff41cfe4684a7c63d12c889ed5e737bfa78d73ce4f51a9f133efc72f6434c66d681d085c40b3ed500df68d7fe2dd80b60931
-
Filesize
49KB
MD5bff0e8d807f64b9619c64eca42d63664
SHA1c29c8d253c430dbb4821def1fc1356d16660ba18
SHA256c81dfb67e98a121bd87f4e0e56a3bcf50de91e87a67696e9b18bd8c82ea42e50
SHA512a40bca0be5e107c1d30d45d1a5099e2f2cdf8171cca10d1084227056de3edacfee8b54cef46a680b3ff93dc72855c372edaf8b950c4652dcd30fa601816b8768
-
Filesize
65KB
MD5cb37056ca01f12bbc53008af4a2cd49f
SHA104b0621e7335a16944c2bbe6d49c0e7fa23b17e7
SHA25612541faf622670b68dd239bfb52ccb445019c9ddc01fd3f36cd621fdf05f341d
SHA5129cab5de087455e61bf9c885f1f07a06fc3be116c0566fd4eba12b8957e18c7d107734b71297cc5026ebf0d74f7bc504f7841379cb18038c1c90b10c8874fe725
-
Filesize
64KB
MD54c40351e951532d78157cf37c8d0703c
SHA1f32671adc7762af5b34670d6e06c925e139076e9
SHA256aa0e9896e2a63fd2a6f863736516284138110d814d6e2b7e771402a24b1e51ec
SHA512a8a0181d532281c5253ee18567ab0ed025184c30b739bd79f6d25a08015fd67789ed6b613374bd99c3e91ac319f0fac1f10739131b82af259d3be6249003816d
-
Filesize
1.5MB
MD588f85fa0eff908508996ff1f09050ef8
SHA14fa05df9e1ca2ddad58c9bc6c9ed6274b61a0406
SHA2564a513ae74acd364499dcfe451b164ff78d474748a53f4e69e587ccf644271602
SHA512d027cd3c17913723f959bf91fca31c7da34f423c0cedf194fb83d227acc3da5117b98c5dec477d955cbee8f4348b8215432471aef9898bbbb309108315e4376f
-
Filesize
1.2MB
MD5a4c3a800fe2acda8e70ed27180047aae
SHA1321c2b43d0cc170673428c13a33cee4be79f77fc
SHA256f2abefb92df4c3f5bbdb317b8af0be1fea57de00aa8118e0a768c2cf79c37aae
SHA512361ec328aaba1eeed650eef5e508b8147697b6e2ce44d8b5112460803ce92f2336833abde2f6652b0e32d725b9562bdd84398bfc8e2d91009bd6eecba3aaf14d
-
Filesize
557KB
MD53893e69c976ee311fababb2ef0b1d805
SHA1917164cb1659a25c85e1cbfdc5a601b0fd3c5928
SHA25619c2fd84e4f7253091ff122a10e67fee50a50d75c3cf8c954b98ae93c3840635
SHA512ed82be4eeefd42a80921a5bc85ffa0f0c11ca4f21e2c7df92077c8b6d4e33a1a7d057a09e0b0100611285c316de72f343c1d12612fa3f451ea616a7b133e4023
-
Filesize
1.1MB
MD5a3894a7d2c159b1a099cf425d024cbd9
SHA108997981d821d690bddbc16caaea456438e49384
SHA256a9aae4e9a02ca825bb3ec2606f671efcbd8a814bcdd66096a620774f91c2dc71
SHA51293904dc6cb2a4c0f85c9e9a548c1608b5ad6a86a2b3ca8be575295fdb6c9963ec2b4073d1838384eee7543a0783ae05480632529a7cf5acafbccd5a4695315a0
-
Filesize
260KB
MD50c44d5ab63d44a2cd762d7eee374e985
SHA1ccc167127c752923966fd327af19971cbfac06db
SHA256d9f20c95bbc3f36ccace9ca4e351c430cd70fe84ad16e641261c78334c95b539
SHA5125d14fe79dcb18def3649dff7a18a114a376df7a39f41ad51bfb364c58ddeefde722459872875077f6a9e1a8d6d5dda51e0158084f79f92c9dea63b1cc56db607
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
45KB
MD532d03f879d94f7d26032c4963c19fdbb
SHA1202e29f4d48ebcc00c957b75180d2672fd8a1a3e
SHA2565b81f2c1dd0d90d460f443ca39cfa9b1e824ce78feee181cc3c0e3f8879a10d3
SHA5121ef4552eb629f5b2594af156af49085e65eb677ede97f7e06219eb1dd11830e67b1669ac6ee2e46d55e48d6c88bfa90070a7bd6dc2ae0ee14430a24fe70e70f5
-
Filesize
127KB
MD55a2f3d5760f31a099829b3652a7d7b3c
SHA1d0680eb6cf17962c5668c268f543d3a80f887b51
SHA256f65288e8aaf1b34b35f1cc0312899a0ba2dd93647053e856d129ead1824ea8a8
SHA512b85fdadaaaa1e0bb66ae101bce0a95a98c2b391c54b3394ff274bede3c1c17bd41f0936456b7903bd2825037d1a0411a13d8038db31bb9210135b47ae163d588
-
Filesize
235KB
MD55a086862e22191f53fe161de8753d674
SHA1024c7fe146c8b0915500f3fba2e6295461f58f92
SHA2560cd1a18d3ae12bc18ed56e4a49a3c2a4abff2f269c82888d32b80bbfa30822bd
SHA512c58cd660e10a732d23376ee2e1c00e10cab34bd2aab6c2f9d875c4dda26df163fe05b496a5728a4817a592eddb57e19108855cc04c79dd82145f490ef1648604
-
Filesize
223KB
MD5ef3e3256e8bee75ccf51db91b6cabd21
SHA11051d5480d0909db3140ee568094986145b8f8c7
SHA2562f188a8e5e60e6f713fa3583dd573fc386054b169d3d38a41e00091c0033701a
SHA512553fa76ee1bbc8930645cd59d469b9302ebc8308f7632122de581bf8e3ae399bdf9108c932593cf7a2f73a93fcc2ea216ed2a39acc60eb73a608c57477382e82
-
Filesize
36KB
MD596a942e07054917b19be7d5b99c38739
SHA19ab8ffe04ee5239e20a45cc3cee8a0450060aec5
SHA256de16da02c4ead3d494cb0f4234df72e5de9fe2b5a269dc4d29094a48c29b1e90
SHA512871829beb5485902882cda34dec2435d6faba3eb617c1c59843ec44fc76c1df9f37f6586e156601b89890788d0fa01daad411a2bbddc53fa90ac15e718fe755c
-
Filesize
79KB
MD576697d66034327349107a5eb1b1f5aba
SHA1075059ae518a1aa548533bbbb6ab7e6940445d51
SHA256b265de9d4a9cbeeedaa3b2e32e4d1b53a1e9924d5201dd7064ace20efff00d59
SHA51221acb0feb5aab356628d5f280c8c88b71a0855c678ea22d4b939187c3546c2266bc415a72514a7c9dda7a4dd95827a2e0ab12a5328860a0bd7ca6e21661ff8be
-
Filesize
152KB
MD536da29a578873ce745a6bafa756a5467
SHA1bd98dfbf4742e5a7e2227a614bc87b97f9aa496e
SHA256a20ecde522172b3ad1449aa840eabedae7a5e5073ea4cf3d20edc9443e71d213
SHA5122b4a9d985cde68f64ad6c897536fde934973f7f82e950f8cc87f0b6b02b184ac06e98c2b0af657f8d8f5a8da3c7254f0db3a5cf407724c3402af8dd453313a84
-
Filesize
96KB
MD54ce6c611b050475eb1306d7a6791d37e
SHA13d51b892543bfdc229d253c21b8c6e0e3a6b15f5
SHA256d117aba4bd07fa1eeee9ed4a392151e09ea6a139c974602017a1cd7caec486a6
SHA512ad52333617e2aa913398aa8a89bda418080de984e51ce1658d4ce6f9b975ad42f5ec815e547b4d9aea8fc2551ff559780525ce3e2c0b669eb574a32f5783be83
-
Filesize
92KB
MD5773f1f856fd230eb7598f94e83e5351d
SHA1d6960a931fec83685582a4ee564e1525e2b8361b
SHA256c6096dd037cc38a72feb47b8bb5954fea67f32c5856a13eba512cead7a4abab9
SHA5124fccd99997a531cd1ddc9eae9b4ca327f83403ec78494ef69547e81779e4bce4e108b126251773b7f336f1b49aa21a6b0e142a1b116653d58104b9d2b3489f4b
-
Filesize
131KB
MD57a0ed2a6d92a2586f0e8e7137427bc5f
SHA17074e19ec3926ce095982f9919a01e34ac4590ad
SHA25676488a5f1008042bfc2dc1323129acc62c62a4953f935588cf4f8ea422a03227
SHA51259e982287ef78c1167bc2bf7062a3b632e0a8816966ac14d5f25cead740d3bb7ca30b448de1e46790c8da32e37b89b8ded67b7e406e93a6fe5f3254d3a20bc82
-
Filesize
97KB
MD51eae19d1a4781e0d5d35b333727c4f0c
SHA1a41d0412a5fe8e7f681a59772bc8a577d309aca3
SHA256b218ee69f09dc0ab61dccf4638f01b36c549c0127e0b1d3810cf6664046ffec9
SHA512df967e00a4faeb7ad1845141c9aee8a88f3de40eb9cc231edb927754a44964cd7f3f4e901b07fb42dac282e1e14908d6351da97329d0e3d787ffa72f735f6163
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
122KB
MD545bb2161edf07fdf547a951e93f63191
SHA1421e06c743d6c73e2df7fa80c064d5dca71230a5
SHA25632ac379e5b80d1e34f35a1755f12d13490820c3bc03e6e296a8c4c75915caf8b
SHA5126ccd0d9512a738a3384878d242bd5216461b526c20c03d93a74d797398e189ef0bacdb997a92f54bcf50c699f1c497fc2904c940a0025d1661d3ff55a44e05e1
-
Filesize
197KB
MD5df965dcbac5bc0c302f43358e0f627c3
SHA12bfd1e91973e2974bd310fd4b9bfbd50ed3517a0
SHA25648114c921b5ec81c799690384a78d91598b388eaf63a4b4aea50dd39db0d2a18
SHA5126db90f595e18126b27ea0fabe9faa2c383f6ded31407c3226643ee6a8c6b42dfc92fbca358a83e34c8ee1174c664901e650cd9ff8217364a1db053b8e25cbddc
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1KB
MD55255a2dc3d2e396818cf342beb53ab31
SHA132319878594e50a735113ffd0d112c8ddf17a838
SHA2566bed40df9a9d792abf8cd5553bd6178da9e35a746e7b718bf3d4c6171ab723f2
SHA51226b247d205b1728b9bbbd4d63ca0cec82ea30007d173b7c84d627d8037b8c6ab48184589d352e9c1d78a0021136ca2c739db94320f71d94d0528bbd6c57f476a
-
Filesize
555KB
MD568f8d874082ec1839f28fdf622389490
SHA1c20f006a95963b1d9491898e6635130e6eaec44c
SHA2567470859db4d156c8a37af7384a0c165688d0f1b7bf106b9446c6f8d95cd5a051
SHA512412b44dcb133250515f5be597f084e89ce83e2aa42762528f5b2b722547412070319a30c36c54fe890bd7e56238d94e1f8e542a948e053b428ea1d965672aabc
-
Filesize
300KB
MD5b08edcfdb21357f72b251266987b9a5d
SHA184edc37734d9cb8a083a7f4ef8ffddeb95f27802
SHA256356b34db60fce6c9b24d1aaa9c948515acf111f3d2d060ce719f9f4d8f9c36bb
SHA51291d1d41296e0b9ae2770c41ec1e1825e090167acb2962f706bc66c805a15059724ced5b537c99b1e1bf248d5e3e3bcffd40ea67b0c74594057099bf1962e869d
-
Filesize
1.7MB
MD5ed2d2b5c97f1e60ffab04b9424069bdd
SHA18e33dc42bd5003ce3adf35ac784bbafdcb343870
SHA2562a371edcd9325eb0a91330b46481d4c18ada1b3701c57a5bc50746a72826cf65
SHA51241707e506ea606fe312e058c758426973e58704902074a5e93df1be0493dddc3bc8a53ab2145d4f7ff455a21ebc1716f2a8742ae183890213a3a7d33080e8545
-
Filesize
1KB
MD5d173f565df701c7487dab0a1b23e5cad
SHA164e626e400bb52e084a55f43079257cd1a16527d
SHA2564f524833f6cec2e612b092a80747bd3ec05057031b1c49ef555f8bdff400d373
SHA512578adbda849868d4775d80813d35ed976fdcbb7dd7aad60f17d10a4d2e01d22b2fe33068456a504567eb1ae02e09be5f772c8e2766fe5682b90d7552587e042d
-
Filesize
92KB
MD5ab69c4c4f2a4cb1639193eda360e9b02
SHA1f64bf39052207a29696c08187c3f93926f1325e5
SHA256720f92eea10156eff606fb38ca1c77ec386674851e98756a3a2e116b7103c616
SHA512e0f0604ee712f4182d2015a653eaca9964e952f9010abf81b7408536fcba84d4cf5b39c11f76d3a01c73d22084b7d54f201d44b3cb04935f48f0fb2d1ae5bb7d
-
Filesize
229KB
MD5543b3be71232bbfb204364b95c8e0c9e
SHA17ddfcdd0e3b5402074482a74b94322a48534ef86
SHA256c30e581dfb6e55190e11dc49b6713feb3003d9e962696dfe0550fe24b429827c
SHA512113937de07e9ddd147118db084414ea2687185db087fb324944b471dac801f933e09e3fb324f699dab2dca39806d584e3ab84d497655ab6832bafb03d519b27b
-
Filesize
61KB
MD55e1cb8af2d57e4bfd6061011474bbef6
SHA197d0407c1d461b029706bcfa42632d8159ef3317
SHA25614b65ce7d464ca493ca2cb739803bb455c65722f5f5dc5fd32432f49cf02165c
SHA5126973e8024f17fce147128f4f87a4687d421c3e71f87ab97453f258abad5139aa0de8f9fff9a09c0ba14fb20ce96de2a3c1e764197746acd64ff77c4f7b1ff3dd
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
18KB
MD5a7997295dc5d8b7b9cdb313e320c5af2
SHA1dcd6a6de23b6ef690c84745618594fbbf4909995
SHA2566228359792d8ace4cbd9f79488a7540082c0839841737db54058f441c91af764
SHA5120c3e670a6dec89d1a29e83c289339ad3763e687c2e8af06e6dcbbd479130a23039dae0db7ee0f8ac72e6b26e8ad17948984381d345a240c0866a6196c3016ead
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
81KB
MD524c2b9c23f1f311b1687a098dd38c1e6
SHA19e2c029ef847c96d95fd058081b708d09384002f
SHA2560e2cd25aac919990904563e5e6aa225c79608a7f5cc1aad66caf942f03da8513
SHA5129b4b6260468f5ef665be3ec85aa485e1733b5f3d382cfb52d57ec64c3ca71878ee28121fc43a23c0151240d450e9b745c415b96811464021c8d515c3a6e0cc50
-
Filesize
92KB
MD5326d1d5466e7a31056d5c9e281242851
SHA192df6612cd3c6d79c6a18fc1a52a40ca41874ce7
SHA25651e509f6f154fa45c508e3ff114934ce640d800efcc6b817dc8dd1083c1906ce
SHA5121617a257bcc3eefcfa02b4047bdedd12bb20c4de4339d826c4f8996162b9458743b028ff5c6590627143aa107e8aa6294df05481a2d57e673cf376b86a00eb46
-
Filesize
214KB
MD5b88c0dfa99644f9ee4c2ca34b5238cbe
SHA1d9365c285ef764b00bb8efbb466710d5fdaf776a
SHA256d2789780ec99b0d213eb642cce41256b5623106bc2a3d210fa11b9d19f5754ee
SHA512a4ed4b6a99f854659845b64efa6e90d13730e5f53f947a8beecc36ac3652262f69563edc44c04184145ec17cd81ded08d2f4b5c2651fb55996093d59d71429d1
-
Filesize
83KB
MD57ee4aea0e6d84dce8da96eae556eddf0
SHA1909e085c104a2d8d21c2a546d8c9f8dddbf6018f
SHA256b9e724a8dfc9ff485f326c6663bdb0da8d4efe2203f47b39fe0978492027ef26
SHA5126a3bad69e6f044ab414fc3823f83680142c12195cf58bb8474e9590d1c0e3ffaa6212eb3b4826fdecb9953c9daf53add6e5f77fe4b8c86df0eb31cfd4b592c8b
-
Filesize
163KB
MD55c399d34d8dc01741269ff1f1aca7554
SHA1e0ceed500d3cef5558f3f55d33ba9c3a709e8f55
SHA256e11e0f7804bfc485b19103a940be3d382f31c1378caca0c63076e27797d7553f
SHA5128ff9d38b22d73c595cc417427b59f5ca8e1fb7b47a2fa6aef25322bf6e614d6b71339a752d779bd736b4c1057239100ac8cc62629fd5d6556785a69bcdc3d73d
-
Filesize
133KB
MD5b059072d1b83bf3d091078fcef43acc9
SHA1d3238668242b04b0091bc2d18210924dad6d9f6f
SHA2563b6f39fe4c1ddad832b8d7c089fcb19a78939ccb231b5461c3dbe77d50fe49e0
SHA5128a0bdb867d0574e5b506767e16bd1fd5956bf8a6062caddc1cf0bb4ba1ea891b37c96666f3543c350b78fe64479f1d50d21d3029e264287e4e3ab8d6bd83898d
-
Filesize
61KB
MD50689341c9e575f3d85a054d7ede95297
SHA1d330cf472c1e972a93543dcff25319819193d88e
SHA256d7bd30b133ad3869262f96e9d58084a1959923765553b1cb51cae4c615da86ab
SHA512f8f4af5447a270f8430255b3697cce64a24a92ecc907b555532bdcc35e203ce7ab0f3e4f5940db1caea5f1913df956c3c6c24f63337419c1bb923c81bc001420
-
Filesize
197KB
MD5af136a8347b30078ba3f0b67268c1922
SHA17a44435cbad7d94ef277b444598ca5b144f17b89
SHA2568c185afe83d4ebe559b3a516d840ec1dcfa1c0e091f6fb4beb6d7791e1b65e3c
SHA5127fb0f86a353ec005f14dd5806d4a50ed0e66c2115d639807af5e0e1af0391e6662e231dbf2d96fd184ead3886c84b44d6ab4945fb70bdc82266c824408f0aa51
-
Filesize
116KB
MD5cb32dddd5eb1a4bb08eaf8876ef61664
SHA1840ff6d24ebb2124ab2a60d98496d12beeecc4b2
SHA2564987cdde9ee0f74666789cb4bc7501ede5bda59f56fe267326bb42e144fda8ac
SHA512fb5d37190f00387135752dcd0c337b72d2124be5c0ecbf4b288afa595fe3d69a6eb8690f74500fea08096f1cae57f1cc82c319fbbf331b6ebc38f924c68edde2
-
Filesize
92KB
MD51ac1b3b553155a9441f19b0209e5065e
SHA160c0065637215dd937a32625aef903cf9ccbb92a
SHA2568460b9bb933540979e60a604957505b9f161e8121f45fc0b42d4f89db8280def
SHA512d319f64a4693d7265df029e40cf71db47e68d48d39e7bb70331ec1a4110776f8112c0985257ecb291f4df87eb38c7408b313c6853dbbcf9c3e3bd8301465f2a8
-
Filesize
64KB
MD5910160e00d8244ada9b6c3669b27a3c5
SHA13db8d9da512154f9a97fdf0bc61fb85840b414a2
SHA256831341cfb12a30ad59fe39c06fb60cc4edb9091669b2cc5c22b50548912232c1
SHA512ad672f5ce38c7c6dd13337af1f4833daac4adf4a110d2156b8726923c877375406e7fea24c21088f5a82a7ceb01b6030d1a7fec7e59253ce423be8dffa6da439
-
Filesize
38KB
MD56f22b9c49eaa08452cb357e02f38cbee
SHA1318b796ba5e8a95030f278c729814f5d60210ad9
SHA256c47d29376d2a4f431d9c64f53bca9238c887cf7c41f389717ccbc51ce4b25e3e
SHA5120be463c420b3f650b774b9ad4c313a16bac1de2cecdbccedaa03247fb6b9fe43e58e3553657d8fca9670b23e7a07df23ed2f4a34c4f0ddd05cf8e1150a97b3e9
-
Filesize
34KB
MD5e5d884f31dcfed437c4237265c8b96a7
SHA1477e26071159d81dd9357e05422440522f885dfa
SHA2564878e839183dd138a3cf0b2785aa37b6db70b5f483b5ad515364917a00f4816f
SHA512ada135f0808352d881db46990e40f0ca76bdd9a0e9deff5fc394cd7935154ebed619f6553d2679c5434a80833d5d8d60d4c3e6b195156caf83d440d24b779a90
-
Filesize
34KB
MD57bc251a635cdd71564b790ca08a4a325
SHA14957185f10012845e98be32c5dafad9e80bb3567
SHA256c245a181abe00c278271a03c74b411e615da7d994fec573e08e32879507a55a6
SHA512af452a6463527d17cb55d8102a109afa017259ae45ff2203b293af3452ba2dedbeabddde4367f54bb00a06fd002ed2618a4fee270beb1e5e1f4fac089235a06b