Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
3cvnwzmammv.exe
windows7-x64
6cvnwzmammv.exe
windows10-1703-x64
6cvnwzmammv.exe
windows10-2004-x64
cvnwzmammv.exe
windows11-21h2-x64
cvnwzmammv.exe
macos-10.15-amd64
4cvnwzmammv...ss.exe
windows7-x64
6cvnwzmammv...ss.exe
windows10-1703-x64
1cvnwzmammv...ss.exe
windows10-2004-x64
1cvnwzmammv...ss.exe
windows11-21h2-x64
1cvnwzmammv...ss.exe
macos-10.15-amd64
1Analysis
-
max time kernel
1563s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 00:42
Static task
static1
Behavioral task
behavioral1
Sample
cvnwzmammv.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cvnwzmammv.exe
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
cvnwzmammv.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
cvnwzmammv.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
cvnwzmammv.exe
Resource
macos-20240214-en
Behavioral task
behavioral6
Sample
cvnwzmammv.harmless.exe
Resource
win7-20240220-en
Behavioral task
behavioral7
Sample
cvnwzmammv.harmless.exe
Resource
win10-20240221-en
Behavioral task
behavioral8
Sample
cvnwzmammv.harmless.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral9
Sample
cvnwzmammv.harmless.exe
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
cvnwzmammv.harmless.exe
Resource
macos-20240214-en
General
-
Target
cvnwzmammv.harmless.exe
-
Size
307KB
-
MD5
8b537468ed4eafd01ae1f6d5f11bc052
-
SHA1
601f8e1aa9d178f7b1ed87606edb19450ab714c1
-
SHA256
db6487202d548f3e8f5a28f38095d48dfcf7ede13b31d49b827262d314d57f9c
-
SHA512
ebd2f83dedea6cdeaa71afb068544dfdad75a146c8d542643a105d3f2de2cef9954727c1be4486be522c314c8a1057de8699318530ce493542e545f873c699fb
-
SSDEEP
3072:xfo9A6UsqCFiv2mvVZKjzepmECVflsC6m7Yl22wruUiLrf923F8GDsrXkd+nAz4Z:69GzmzeAPN0n
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WinSATRestorePower = "powercfg -setactive 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c" WinSat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WinSATRestorePower = "powercfg -setactive 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c" WinSat.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\WinSATRestorePower = "powercfg -setactive 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c" WinSat.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: WinSat.exe File opened (read-only) \??\F: WinSat.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\Performance\WinSAT\winsat.log WinSat.exe File opened for modification C:\Windows\INF\setupapi.app.log WinSat.exe File opened for modification C:\Windows\setuperr.log WinSat.exe File opened for modification C:\Windows\Performance\WinSAT\winsat.log WinSat.exe File opened for modification C:\Windows\setupact.log WinSat.exe File opened for modification C:\Windows\Performance\WinSAT\winsat.log WinSat.exe File opened for modification C:\Windows\setupact.log WinSat.exe File opened for modification C:\Windows\setupact.log WinSat.exe File opened for modification C:\Windows\INF\setupapi.app.log WinSat.exe File opened for modification C:\Windows\setuperr.log WinSat.exe File opened for modification C:\Windows\INF\setupapi.app.log WinSat.exe File opened for modification C:\Windows\setuperr.log WinSat.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WinSat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WinSat.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 WinSat.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WinSat.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Appearance\CustomColors = ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\Appearance\Schemes rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 616 WinSat.exe 2732 WinSat.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: 33 3020 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3020 AUDIODG.EXE Token: 33 3020 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3020 AUDIODG.EXE Token: SeRestorePrivilege 452 WinSat.exe Token: SeRestorePrivilege 452 WinSat.exe Token: SeRestorePrivilege 452 WinSat.exe Token: SeRestorePrivilege 452 WinSat.exe Token: SeRestorePrivilege 452 WinSat.exe Token: SeRestorePrivilege 452 WinSat.exe Token: SeRestorePrivilege 452 WinSat.exe Token: SeRestorePrivilege 616 WinSat.exe Token: SeRestorePrivilege 616 WinSat.exe Token: SeRestorePrivilege 616 WinSat.exe Token: SeRestorePrivilege 616 WinSat.exe Token: SeRestorePrivilege 616 WinSat.exe Token: SeRestorePrivilege 616 WinSat.exe Token: SeRestorePrivilege 616 WinSat.exe Token: SeRestorePrivilege 2732 WinSat.exe Token: SeRestorePrivilege 2732 WinSat.exe Token: SeRestorePrivilege 2732 WinSat.exe Token: SeRestorePrivilege 2732 WinSat.exe Token: SeRestorePrivilege 2732 WinSat.exe Token: SeRestorePrivilege 2732 WinSat.exe Token: SeRestorePrivilege 2732 WinSat.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 msdt.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2704 wrote to memory of 1352 2704 sdiagnhost.exe 41 PID 2704 wrote to memory of 1352 2704 sdiagnhost.exe 41 PID 2704 wrote to memory of 1352 2704 sdiagnhost.exe 41 PID 1352 wrote to memory of 2096 1352 csc.exe 42 PID 1352 wrote to memory of 2096 1352 csc.exe 42 PID 1352 wrote to memory of 2096 1352 csc.exe 42 PID 2704 wrote to memory of 2212 2704 sdiagnhost.exe 43 PID 2704 wrote to memory of 2212 2704 sdiagnhost.exe 43 PID 2704 wrote to memory of 2212 2704 sdiagnhost.exe 43 PID 2212 wrote to memory of 1760 2212 csc.exe 44 PID 2212 wrote to memory of 1760 2212 csc.exe 44 PID 2212 wrote to memory of 1760 2212 csc.exe 44 PID 2704 wrote to memory of 920 2704 sdiagnhost.exe 45 PID 2704 wrote to memory of 920 2704 sdiagnhost.exe 45 PID 2704 wrote to memory of 920 2704 sdiagnhost.exe 45 PID 920 wrote to memory of 2012 920 csc.exe 46 PID 920 wrote to memory of 2012 920 csc.exe 46 PID 920 wrote to memory of 2012 920 csc.exe 46 PID 2704 wrote to memory of 452 2704 sdiagnhost.exe 47 PID 2704 wrote to memory of 452 2704 sdiagnhost.exe 47 PID 2704 wrote to memory of 452 2704 sdiagnhost.exe 47 PID 2704 wrote to memory of 616 2704 sdiagnhost.exe 48 PID 2704 wrote to memory of 616 2704 sdiagnhost.exe 48 PID 2704 wrote to memory of 616 2704 sdiagnhost.exe 48 PID 2648 wrote to memory of 2752 2648 sdiagnhost.exe 51 PID 2648 wrote to memory of 2752 2648 sdiagnhost.exe 51 PID 2648 wrote to memory of 2752 2648 sdiagnhost.exe 51 PID 2752 wrote to memory of 2196 2752 csc.exe 52 PID 2752 wrote to memory of 2196 2752 csc.exe 52 PID 2752 wrote to memory of 2196 2752 csc.exe 52 PID 2648 wrote to memory of 356 2648 sdiagnhost.exe 53 PID 2648 wrote to memory of 356 2648 sdiagnhost.exe 53 PID 2648 wrote to memory of 356 2648 sdiagnhost.exe 53 PID 356 wrote to memory of 2312 356 csc.exe 54 PID 356 wrote to memory of 2312 356 csc.exe 54 PID 356 wrote to memory of 2312 356 csc.exe 54 PID 2648 wrote to memory of 2400 2648 sdiagnhost.exe 55 PID 2648 wrote to memory of 2400 2648 sdiagnhost.exe 55 PID 2648 wrote to memory of 2400 2648 sdiagnhost.exe 55 PID 2400 wrote to memory of 924 2400 csc.exe 56 PID 2400 wrote to memory of 924 2400 csc.exe 56 PID 2400 wrote to memory of 924 2400 csc.exe 56 PID 2648 wrote to memory of 2732 2648 sdiagnhost.exe 57 PID 2648 wrote to memory of 2732 2648 sdiagnhost.exe 57 PID 2648 wrote to memory of 2732 2648 sdiagnhost.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\cvnwzmammv.harmless.exe"C:\Users\Admin\AppData\Local\Temp\cvnwzmammv.harmless.exe"1⤵PID:2860
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2748
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" shell32.dll,Control_RunDLL desk.cpl,Advanced,@Advanced1⤵
- Modifies Control Panel
PID:2492
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" shell32.dll,Control_RunDLL desk.cpl,Advanced,@Advanced1⤵PID:2616
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" shell32.dll,Control_RunDLL desk.cpl,Advanced,@Advanced1⤵PID:2620
-
C:\Windows\system32\msdt.exe"C:\Windows\system32\msdt.exe" -id AeroDiagnostic1⤵
- Suspicious use of FindShellTrayWindow
PID:2552
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\llx1t6v1.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9C60.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9C5F.tmp"3⤵PID:2096
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d2qiolsu.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9CAE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9CAD.tmp"3⤵PID:1760
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x7ebdgos.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9D4A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9D49.tmp"3⤵PID:2012
-
-
-
C:\Windows\system32\WinSat.exe"C:\Windows\system32\WinSat.exe" features -xml features.xml2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
C:\Windows\system32\WinSat.exe"C:\Windows\system32\WinSat.exe" features -xml features.xml2⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\8sl5a1ya.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB933.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB932.tmp"3⤵PID:2196
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\t0unuc9o.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB9AF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB9AE.tmp"3⤵PID:2312
-
-
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b4oc4_rv.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB9EE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB9ED.tmp"3⤵PID:924
-
-
-
C:\Windows\system32\WinSat.exe"C:\Windows\system32\WinSat.exe" features -xml features.xml2⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\560187709\2024032700.000\AeroDiagnostic.0.debugreport.xml
Filesize15KB
MD5f3bb37807e327999b4721590e31f4972
SHA168fa301bba473a744afa73db6a8d55d30e0bf360
SHA2568b4166682d53fcd93644733b78de80d8dfb48daa4c0efb8e8415abf8e876a95a
SHA5121d2b7dfe000d1b8de7477ff60cd8e475dc65ad2d1ecf77a717531933239805e0a162c6c4c94ea812c081690bb91a490adc60638b7aebbda2f2e31f079f341b9f
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\560187709\2024032700.000\AeroDiagnostic.1.debugreport.xml
Filesize14KB
MD59a400dd3cd173efa3fbbefb59eb08579
SHA1a73dac6f0f71ba7b41b5edaf824f548822fc12d0
SHA256ff51a82899096155d78f0e55a2fb03416dba7585cc2b59804ac61527cdb50969
SHA5129b6941f921ea715b55261cab600816139ed7e32850b9a4f4e3250566aa6c9c85edefbc70cb9f6f049c9fa98cfd9633a1b1e9ac09e396e9c4be724dd546b9ff75
-
Filesize
10KB
MD5850c7009456a31fad65014d179875ad6
SHA1c7a4ee7071566fef9a263aada61dc528fc476c5c
SHA256f3b79e33947c316fda87dea13a59e31a6ae40e9560bd96e02df02288f222154d
SHA5121b4d6f31d657cca797a7ba101176d87bb19684c7ae4644febdab973b7a8414aa82aef653634a2e278b44f0dc572096a8af468a0da5c03a2fbbc6dbbb25b6a289
-
Filesize
257B
MD54e05a8fc693136d440e79cc7a1fd4cf4
SHA1246ccc386e9ed6b9e8655443c42f4844ccd47f64
SHA256aa1a1eb53ca4349adcebef23f54e19f0864530709fba4698db87a2f5641d7692
SHA512fc5c37a18e2c14cc19d9204a5256e0098f921fe6eef524740d93a870d6400cf9e17c4a173f14b655cdeaa4673a3ffd1f785366e881e9f13b03ef16d53789b1e8
-
Filesize
3KB
MD58d4c289d6fb51d48acc8c648c227b947
SHA1bd9eed6f6d2bbc8a4bb4ca23a5635a239225235e
SHA2569aceb5b408d1026c7711d023844bb7cb02d75ad9430e62ae1ac860b2b338a7f7
SHA512c57e36d2ce81dfa8d0b99da8bba85c1a2aedffa3f4da69148159adda6f5c8cfc1b2f8608a5cf6a0ec6f3e00992a29a2cdde7ff783602d373526c72492599b296
-
Filesize
11KB
MD57e2c2034394235860bc5c2e846b2df01
SHA1808e6fe886dd79a545fedef1b9151dc4e20f7327
SHA2566af8d0a4214613033feaaf1e6b3923de87ac32a75a847ecde449270b1e2c2d76
SHA5120211a59701969ac610bdc381a4580f1b754abf3ac81e46d59783cafe4ed04b31db6ab7477f34f6071825c5764f2d2a8ef29e077f3683a8f0aaf8d9225677dafe
-
Filesize
1KB
MD5a986660bc7846d5422f0c35f2ebb43f9
SHA1be9aa3150fc3f9906c024d4b64de1fb0e03a629d
SHA25635d0b3009c9bf0064202b194b5fd9d4d235103386b24536b6f5ba63dae3c67ed
SHA5126293ad81a12ab28ab832812a38646129f1a6fdc86c74e6fbb837c84c747474a8ca9681a3f006329ec3e38a0ba0b915a23fa9c23bae90719f086c61d1a4b042ce
-
Filesize
1KB
MD54d75c962ffb651bdd59c0010bf76b170
SHA1492774c9028e901362d3f6ab078ca6e589b3eb98
SHA256a37c38993acad0f0d59cc333bda6aad3475d7c58b09b1ca0478598f72de51c64
SHA512bc9f48954d3a7ed058533f41566ef7c2b83c6c8c4be779f4d27c42b02f11f86d786cee5cb2b3176de7ef218805933bb301f11b1b43f8557e84273df64ec4066b
-
Filesize
1KB
MD54f8e2f238adb0aa289fa49880ec46df7
SHA196d3bf8cafd485425ca7c62d743b86751f1f48f4
SHA256534bc57411511a2719b256d82756725e0c6fb81d53d2693dc7f77c87f0dacec8
SHA51263965d8e9b0d48c39e1a4fb1b304eaff3296e4fe39a61ba7e251068df511a5e2be85c681a1bddea33762053d989ca91874aabbcd070b9536103327fe5b5726d0
-
Filesize
1KB
MD596e8e311818a18901a7d5ab859c30635
SHA1616dae1e643161aa634d8600cb16dc8aa7187a3f
SHA256324bac31f01a13ab1eadc5c82cb343ac4590145a2d5d0b8f997775f75949a0e0
SHA512ca83b5e1e85ae067b7354de9a1c603759888edd48f938338ed5e907daf67d0d78e1414bb1a87c5c6e1001fde6849ffc1c9e46efa62bbe61788f55a5f746aa9ac
-
Filesize
1KB
MD553a96bb61f28196dba09c692ec2002b0
SHA1622366907215baab75e187dd2533f364936869e7
SHA25698bd2649516f6f2a78b2baee487468cdaa507b9c18a444c0939a5950df2af3f7
SHA512ad2021fdeb952c68539831ebee01d4d175577eab90148e878499eee959eeea28778f342c040a5f006a90a7d24e82c648f851a361c970c49992f2a701ad3ac6b7
-
Filesize
1KB
MD50605f917f70a3b1a09ad11db86386ee8
SHA160e791c3f192420a004c8b30b2e82b10b47ce851
SHA25667fc6ee17a40fa029f0a10ee27b230ab8201d9268c140dcbc7e917a9edf182a4
SHA512b7fe353b9ebfe87cb584c5e2172801799676802cdb9b8986ab017aec1180648fc5cdd089c20248f634cc22eaf989516c29b21144c85ff067fe7afa37c0d524e0
-
Filesize
4KB
MD5dc692b965bd45a4552ac3f52fe10b873
SHA1b572e747fd797911eb484b1f1706649c8c9ea445
SHA2569355d3a180102ad7f8c1aad7612689f1b5657445f7bb082454d8e0e4fa2b3fa9
SHA5122fbdeeed7bbc1b3fc460b3ddc24560886ea9d8e6debeec8a055bccc7ace4b8b12e48753ce27719272d2d417c0c403262033c5d634bb409301f6cd17a78a7432a
-
Filesize
11KB
MD52ec79612b8a35027a735ac9304ce1ce4
SHA198bbf2e57ea9412ce1754f82e883ad7f11976673
SHA25616583d3bc4b768776fb03e511753210b0655e2adcf19036bcd466aa506a532d9
SHA51296a61d1fdb151ec8ccb3ffdf4c3d9056c6794f1becdc6ad1ba97da43de700da3fa5ef941252d9171847d33f28be98f71372ceba79e9d24faa0a3821a9923ac6a
-
Filesize
3KB
MD51564064d49f060da2fb2d176c473de28
SHA193d7e7f557014147822a0394beafb923cf5bb327
SHA2561344700ff70a85a39556c0a892886b86a66dd4dbf572d7b098548442421a322f
SHA5127067ee2080dd5cf696579e3c48ba70309e8dd46bf8ec5626d0b5099f58420fc6b1c33eb1f0d04d43f0b12b1fcbcfc46ffb8195f7238861b531b0082e25753a94
-
Filesize
11KB
MD540951caf2c4f0be7b5df5f74c77708ea
SHA158a55040e7d0ed3f135de1d03cffdd67b37835ad
SHA256a3e2d8c579676323d4682f8dfeaf493bad2b36eefa149ec2c313240b8a27265c
SHA5124ed9c00e20792595530fac5593d8b546014e5d3a52a38e6ca8c985a28d954684c9a65366d4f2034e9da5f602b993ee8a170bbc041cbc19df6a5abd79b763cf2f
-
Filesize
3KB
MD564cc3d8f55a31fdb4e8f96fb9fd659ce
SHA11b5dfa9f3d4384e27bea6a81a3a0c17df271c09d
SHA256de3050914370d10fd98dcaebab0fd35747dc2e151436fc9ab4100f79593091c2
SHA5120b0828112eca49a9ea89cf7b534f6e5334d0a82f004958fdc8f2f1b96e97d6a27d8cebeb5a514b93a808f2ba18477bb97a4350e859668351215939fcd5a1d553
-
Filesize
11KB
MD5fef29d05de9f6392d914a04b276bc698
SHA1c0a87c92747b6f2150eaa3cdda23cba710e5ed50
SHA2565c69a3f5f229d519421369f3fcaf7455fd877e28b5a4f7c0401999b7708cb8c1
SHA51240b97082842c440c74270b2df8675dbebebf6be33d19c02913ef24717f1638e8b9452ef2bdfa7c491181d9590c0ac0fcbb942dcd58bb64537a675d07696f2fe7
-
Filesize
3KB
MD5cd51d7029cda16b6d0af2b4519843912
SHA1e9bae5a168f5a50534c2532f0497e52068e80bc9
SHA256bd03594403158ef06fdfdbb0280ba741c2d708d819d083c8a59d9ccce0bcf64e
SHA5123f6bd201084ca35c6d7df33f963ed3c4483eafdaaffc9351be6cc4fe7ccf03bd7f4832fd7e7a3a9bd8b7ab4dd3a860f69d3f2ade3fec0735c97f9a69ef202545
-
Filesize
11KB
MD544aa5d9bdf7af1669bfd4f1ba364032b
SHA151994ea0ddc2aa781c044548d565b8ab88a606b1
SHA256fd9c4aeb1df84517c67289ca0529f2b8589fa3152d2b062435fd215f5d2690a3
SHA5125c05e33809004d74c6bfc4aa204de12ce4903f648797df1ffa2fa7eba89f563ea8b106b2e3b0dde30de9cddf5e4ba3fa110e365d9efd15ea213268f1bcec0a5d
-
Filesize
4KB
MD572dea9a8bb223961426eb9d1bd1f6fa6
SHA18b58f08719a907c000b605a638afcb08a9bf237a
SHA2560483a631fc5ea9886ade602781dd13eb4c4ded8be8b836cb37258925f1b64534
SHA51276c4ca77580539d6ea987cccf4dbd03b8107c6e174e6ba6b738dfd59dd3140479971efe604687d521fba2d9b6ffd66aaa445b96d08ea9ffd6584cf760fbdffd2
-
Filesize
11KB
MD52237994a8093860daafd9c463c8f72da
SHA1af75d6cc2ffa452d54a7f9f60ceb816fad5e465a
SHA25688d2b1d399c840f3b600aaaa1899199573b764738a430b522996fcf1b7c92235
SHA51290660c3e20cf00711d9f898a07907278b188f6b90d1c24988e098f1cd96df321b9f3c58c74dfd4417e30d3809080bf21c253a0e0dc7f2152a6c5c479ffc35107
-
Filesize
11KB
MD57f6ed23800cb9730d5249006802faeb9
SHA162334d298e5f374f91414fd3c27749373eff3b43
SHA2561c2b702e659567fe0200303adffbaab1059f397d063630547ab6869d65ac63c3
SHA512915816d2956df02b9af854d088f7e7d054ad5546e634ce911570f4f1f714bd18e3be79a612d13d93d843460245f67b3e23d044f4f437bd4f3df4cb3bb03a87a4
-
Filesize
13KB
MD51d12a6df7e02be28c8b60f85ff6b8abe
SHA158eee8037a0b2f59a6d37cbc2c091542649887aa
SHA2562e194966d888b7efdccfcd89c7a07c398b282086644066f3cf433e718cce9592
SHA512804a93803271e45d923e875805813f6c56eef1f2aea655523d8d6ff069da05d9f73c14b4be5895405b0a62fcbc80d7dbbac2fe2d59a6935befcf165d957c076b
-
Filesize
11KB
MD572609638f76cf35a50db9a2a66e79180
SHA17f82b9c8de35920bfb3225a8bc3b0001bda2e7ac
SHA25626e9a6dda3cd399fc2143b5accb7f23c54091df6ae1f353cb8a21c5ca5f02329
SHA512bbcf1fb82ad4bf770b97f9a5abe4e63ae7c9fa34fdf8ee93c2984e22059de41355c03d35cdda2cb8b338ce143624a6e0e23094dc958b67c754cf406f120e8277
-
Filesize
1KB
MD51f9f25c944b02d50c94cdab70975f380
SHA12bec7ea4882acd45779323e7c46ab0511de5c9ee
SHA2564bf07370b2368177a4350f037627c7c45b06428be36a34b04c3cbca74224fd77
SHA512b6a1189bc579aa211af9144b0dbe0c880638d2b3e2f6d21c554cfc3335264cd1344e0802e42a6185cd01b0136ccc01527a0c1f6f031702b3e97d7ce90232de73
-
Filesize
422B
MD5d664a4f6a5e3e46eb91c4abc2344445a
SHA1711c0f260dea6d5ddc99590ffcc95c5774ba65f3
SHA256dbb2ab2748b78c8417b426fcd0a61264bb634ed374488d5dff012faf8fb5acf1
SHA5121fd6f6fe7fc8d4d01e1e2f2f6e3849f396e4806ac0bf75d6055eecb46c99ecd6ab60fc4ad7195cbc13ab927bfded11e57e219e0361a165c4bbc9072c4dbb913f
-
Filesize
11KB
MD52131f25cc7983b6f5585e492a6b7652c
SHA1ea1fb3f0c85e4a483063b0bf082bded59f609b72
SHA2569c9ee4a5b247a3c9297eff7bbe90f891c9980d1ee21c1df99219413952cd67d2
SHA5125677fcace32fa65b5f04af70bc92b559bdae808c7ec692423d29972df5ce4b551622dbfa6ffb27ba48029bf974fa1b72016fe98255ad32535e23f770e3486510
-
Filesize
2KB
MD5ce41df40c8670f62b0fac65adcb5f090
SHA1f432c26089400cdc404b0d2a2b9bce3dc80ee2d0
SHA256cf39e1674af3d00cf6eba42c00bcc78a4b0e67785439b5246320def3cc44c2a7
SHA512a7babc8ca6adbf76525c0d3610d79458ddb01c4333d50620e48403534ccfd22b3de5782e55ea5fa739c715b0f9954de6aed87bc5ea3320e7ecc78da2838c0483
-
Filesize
1KB
MD5475c94cf2eff13cad9d92ce93cd36005
SHA12ff6abc5886db352fbd18925704ac407bc557244
SHA256f026ec61d8634f0fa3f841e4aed8b6ffa672d221932b1b4353fc42da9876dd60
SHA512fafab6cd507ed68376ceac3047ce607627ce765aadd90100542bfc19572643c949a6539a3708f7bedb3e5ff9993a3e3fb8f73b822b04be7c631825138ad20137
-
Filesize
2KB
MD5d43a7a015c0c9a10eb72b1644ffc368e
SHA1e2d839100391cd31028601b73742f25700780313
SHA2560fa0616c0fbe8721304a3418e14223d9045a92af72f693d0774f42c1fc4fa4c3
SHA5126643ab02b958767cc82d4aeff97f970b667542fe97182576877f8df0da76a00bbfa38469fe837dbf747a1a57b37c154845bb7954e8b54545d6dc779156c58c5a
-
Filesize
1KB
MD592159f7644293d98f8e30785565eb16a
SHA13e720674536ff4ead961a52882b6a98166368d45
SHA2561c8ced564dbc58afbce52c7b536bb1f02a4b2d22e5d1e60a0a222dff965c2291
SHA512e330930e6bbcf7fb83daa0dc8c117f5717ee10fa5c2f716796d75b356632333471ba633f37a72201fdb06d98858f53f3f829fab39c9831ab780f6f9449096a77
-
Filesize
682B
MD522bae87291471ca7694b3626a84a07ba
SHA1a4e4656b8ccaa6de8bcbbd34df8d5bc83f89507f
SHA2561032055a41f8eb29f66aef4add3e85a1d778df063cd8e84854793868065384fe
SHA512a90192304aebca86a4f0296b91b3f4a6a84c36371da80eba8d2f06f968df9e4f52e278127610584c42fe71d42c1040c8aa81865885eca9622e427af8e4e3f267
-
Filesize
468B
MD5f85550996a88ab2216574e1e16719f12
SHA1eb3ed9fe49a978835fca890f2b02668e9fc37fba
SHA25636ce931fe27959e8512dc97860fd77f512bd485ecb35094c6982ccc06201f17d
SHA512a95e8fd22492fcd65bca3982cb6bc162e2bb2d6eaeadbfbaca38e1f49d82f300fae384fbe2b0996cb7c196f9fa6d828926e4b999f9f5010df8e5b4faffa2a68f
-
Filesize
4KB
MD5e3ade7d0dbef81572eaad37e3da7c001
SHA131eec9e74201b42698ab89419f20f6764f9651ee
SHA2567037293ed8c531de399b1549ecb0824e432eed8fe292ff095fe262a7f7b90978
SHA5123f050cac3d59ed01f8d6b1590ec321c747f30515166c5df9b70539b9eb236b135a0bf1ba138cc30c8b35ee566714fc0b80669b1343fecaa66b157a8445830643
-
Filesize
11KB
MD5f17e98078203b7b4cd87031a6dc75e08
SHA100cda9f7f7ccafc94d2d93fcadd4307e8c7028d7
SHA256a8ba0d8b0d2bdccacc0f6b8afd2c58f657dc138b24be036b0232bd4bdefccac4
SHA5129e7c374f48f988787697d0d64d6641bad6358480cdc66101a14d8283f723bbbb817860fd941c69710462aa47d9c4dd5dfca34933f2437d4d8421cc5ec19be308
-
Filesize
11KB
MD5f9f57186e9aaa7e4f55b3c3a5ffaa028
SHA1bbfee487775c415056c487ee938e4b398517a621
SHA256ff2de8d96f7b7b0d4138a570c3e4f1bcb8b865f9285c4b0219d544b9877ad9b6
SHA512da192a75916a1570ace686e56fff5b19495380249ad2c2d8c5cdc8bffe087856551b5a29145d413008546e09ccf23c2223cb14df2c788a25b41cc61f469df5bb
-
Filesize
17KB
MD5c0fca3cb6514ec30611aa64b100823f9
SHA13d879b9d24dc5d5d32c58a08b2d408c41d3817c8
SHA2560b89bc1428a7269c9c1c9c6a21197bfa6e3babc15cac6f5affe0058c153c5357
SHA5124b0482574d8cd168cceda0fcbae38e1309ca2b74d434c70d56387b21358a5c683c3b3dbb20a4735e430a895d8362923dd18235cae2ac0eb1674b844e6f461fe1
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
Filesize
78KB
MD5e7abb3254c2e312e8ab2573c958bb0d8
SHA1814d8ef7005c47da2db4f4860943432ed095bf03
SHA2561e2ea958babe187b96abd6f239e05c1b5f4b084b7fc5957d39a29a7a4dea0dba
SHA512048616a53ec8da6a62c38dfdd2ff444b9b4db8b8b04d663ac8009ea744d336dd8ba1348ce33cd5dd903162d8a41066eba0cddf344da41e8761382ad9b94f9b1b
-
Filesize
12KB
MD5b983391d75b096efd5c961eaebff965b
SHA15280d0994305687678aa93196e4e69213b268492
SHA2566de6c7f84a02e5338786fa3dfe2873f978c9421cfacb7c76b1a0a25dbf204a92
SHA512ff5fc225785fc79db299db8b6696bcc9bd4c54e406474f6168f851a290b9c50aa0b13d77f9d666dbe058066b2127c3bc0b6375a49e934cc50f1fed842defd2e1
-
Filesize
309B
MD5c816cd682d7cac66238272489b5d71ad
SHA1826a556f452fc43b3a963a69e52bcb8df9c0e477
SHA256e760d6c396ba56cfa8a4c6cea13aa0ca1bdfca44cd28e631a81b87c15312a748
SHA5122b8cc96c2e66f2780a27ebaed0c866c6aace092c0f101f973022485741a1b5f6de061bd09bfa57fa48a9012b7d09bc519bde6b89af90c7c8a7ba5c0a3a28ef78
-
Filesize
652B
MD5334e7fa0595fbe3ecc2f12142c4ad922
SHA1713328c7caf5802866c2b6ef49234ff3be5183d3
SHA2562bed4bdc5d6b62a5d4fe7d443892ab7aeadaa7695e6f703a1511811b2ddef272
SHA51235b9e63ddc876340153390334cd8d23520b56d26fd9c17a78f78c232d6b20f73d1132ee7ffac1a4d7f5cb72eab138f2a9fe817ade0c3650705eb5a2a634b613a
-
Filesize
652B
MD552c4b130b0d769994b18ebc386b0cbcd
SHA114dd042a620c25b412bfe4b0cb529ee66975c4c6
SHA2566fca172c3038a9a2c8579133d8913d3cc87c8e33237c4c220ef595f43bf2fd4d
SHA5124bca499316e1aa273533de1084b2a5c59e7a563e8383608ff7020ca1bc7ee5224db15a59507d037c2f9c9b587b40f5dc982ff65ae9e1c86e319ad7bd107f79c6
-
Filesize
652B
MD58fb0fcaff99d88bef682aa9409a94d7e
SHA19f1e6fa21b610eadf6fa8c289df4fd7439e1eca7
SHA25604423db3c80d8abda75261d9028636770569f5a6238898f7d352cf4b0022809b
SHA5124fb5eb471cc6889f1cf9e23bcd2cde3a2456851ab9f4bf1e74131db4efb83cc75ed7f49f2e8b6759ebb8d961fe9a3ab7ae7b954385bf277f9b47e415c5e3de33
-
Filesize
652B
MD51d23047784e49f93571f2508362e64a2
SHA1c4f081bf08ee84c1a1e61c7cef5c56b69b0a72fa
SHA25673f56cc78c090ce9cb7eb45e0baf15eb2f8c48b655dc25e76f981a66d6fce231
SHA512095b8be13ed33cda1de849544e1d91cea9df244e0d27fed588491af45000885bb70c89e2c9ad3a431bbd212fac27f14c7e752ad829deaa9215102e08b161d50e
-
Filesize
652B
MD54071009ba3039dd22b9de5569dd2b746
SHA15eb9db15c84ccdcce18c94f6a877b0397e299276
SHA2563f8cc7631bb85bd265ab3672810d013e52aea76acfa4511ebe097463db837e46
SHA51235c733e6bc46b9c3375286d3992ff9fdf0ac55e4b0ffae447dcd936b6c3db94b2b16a007bb80fd232bada580237259b5b8478092fe935aa76bcac24c8d57cb4d
-
Filesize
652B
MD53688f721b297fa12db0f345775acd0b2
SHA17fb43eaef304cad0075c37c5b1c28834d85621c5
SHA256cdbf51a574f2fb6ac9a497d2ec877bc5a2cae32908d191796125a185dbddf036
SHA512b38a6c71e2565392c737d79f7ece565ee7bc10cb00b7624c282369b2be8f3c4d53be27145743f81f390a6b54e8e7dcc650d21555bd2f7f5ebc4e23fc33300e03
-
Filesize
309B
MD5dbe50cc430fb6eb98dd800c09e2385bf
SHA19e045152f3b070ac16abc3ace2bd3dfc90b9cd7f
SHA256db50c8fb05993d68d84cb2b1be960307c4d9f0f4c573a05b4a99bd1cab860e47
SHA51224a2f4231cd98cd3a979eb42d883c239a00a4e8aff3c826e21c132cb7c76deebdc34924c84ca953339909a0fba26ae713d3447300e5a17b50ff4601df74a852d
-
Filesize
733B
MD5477147031e00fd60b8dddfabe19d47e1
SHA14403a296c04386fec66873b2055e531ebfe77755
SHA256872766571c4cdc2cbb6dffeca6f288b76229eff30d3baa2e069999d07b2354ff
SHA5120522d3d7eb453e3d9d75e8b166d84b67f35255efd08646287350305b1a87fb3f05d1d13a7e9be67c532f1a0e00847d9ec2b5ce88076d45be8bcad7d7a21431e9
-
Filesize
309B
MD5e6064b57bc7ff4f36ada1b6f80e0988d
SHA1c0de94eeebe78f4e2de3d01789b04e27f77eb01a
SHA2562d813c08af94271371e5cc819753c843e2a62ad227ba1c2754d5a54e0602a836
SHA5120f6691d5374d4d58d29c9335b45876cc0f0199d4b212263d2cce64b0ed17262678adeaa7b732c88f178dd9b2c3352e2612650d61dbbdeddda3132b8f04a463a3
-
Filesize
446B
MD5ec5c8c8f2004593e7919d93f25cf8715
SHA1f8d1931138d4513354946a62ff835514c3322b8e
SHA256bc27d56ccd20de336c1dde38d689b88bfd7f5b95309be5ed3800a4d8ecba63ee
SHA512e0b908d385303f6e5f796f0610615f1a72c72be8228c0e9d0a996b3a99622184e7eabf1e7c37bcbccee56816ba58ba84390ad431c612da27dbef93828f5d6415
-
Filesize
309B
MD5b6d2c38d60185cbc4de4450dcec576cc
SHA11264b85b41d64c7b8a74e8904809d3d6799d26bd
SHA25689589eef1bfa18e299428a4e2cb4d36f90da8356a5b0a6ff51a28addc28528d6
SHA5123473a6185afd959ad8725568448e77f86624bcb8380531798fd0a24e7d595bcaf777512df8a37a9f49467317b561860079fccb070bc3d140a63070ef73bd96da
-
Filesize
309B
MD56372871724a106666331812995bf6237
SHA1913ee920a95177718d55c9ce08fd6998c489040e
SHA2562e24ab78e85edf9ff4494f1cb9379a0b23ad4d00cc0bc11331ab433d3753bde9
SHA512e148b6d4d95eb1cdf4a43187342345bd9ca7c04f0b30935bd070f2d26d8bab198b35050c03def8586c2fe7b321a4ce52eea1e508995181de83ef7670c3672c66
-
Filesize
1KB
MD59d2c1586220e16ca5d56de7586f2aa53
SHA1c102d3c308bb76c9f99609d7d3537bbdc0899193
SHA256d844a93d63bef89f5010f23588f3bee643a6374447e47138f5c58bc8176a85b7
SHA51255b4e126d6030e5cf9f9439ae71f137637b9a36e4fe12e46454224540c573878e42a35337b30cd2e7b7caa1978b547019c670a43edf6ef023970375c598326ff
-
Filesize
309B
MD5d0d0f8239b6f9bc54c9ba02dae1e3502
SHA181d295805aba17715f0db8127f6a0430c39fcac2
SHA2566a1b061c6a3dad7bf83b3b339018dc1503ea2ca36c88524664757dc011f83716
SHA5120097d03790d1c4c25de00d6ecd6770ca13d74ac0d23a8af20e2699bac110f454887cf8f94311e10ca4abff96eb2540079c3d44e84feb3665005a09f61d6bc545