Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/04/2024, 21:02
240419-zvpyxagc41 719/04/2024, 20:57
240419-zrrckafd46 719/04/2024, 20:56
240419-zrfaasgb5x 719/04/2024, 20:56
240419-zq62mafd29 719/04/2024, 20:51
240419-znmj7sfc45 719/04/2024, 20:47
240419-zk4djsfh81 719/04/2024, 20:43
240419-zhnkbafa84 719/04/2024, 20:39
240419-zfd8vseh95 7Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 20:43
Behavioral task
behavioral1
Sample
promo-link-gen-midquality/promo-generator.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
promo-link-gen-midquality/promo-generator.exe
Resource
win10v2004-20240412-en
General
-
Target
promo-link-gen-midquality/promo-generator.exe
-
Size
6.7MB
-
MD5
3fb118c482b086b4fbc35fa36401fe69
-
SHA1
f29ed82b70920b3d078a81e39c2a607ec4c468ae
-
SHA256
d1c9d977172049ccebf014477581e9ae879a4a925869bdaf3c68169ddac0968d
-
SHA512
939c63894d8abcd1c883c43375548b500a3ae34c798e97207878b01afbeaa9bccc53a63f53d108a6b8459593e122cda18864962d1f6838b95c425a8356eab4de
-
SSDEEP
196608:+n9v8Zk3DdQmR8dA6ly8Qnf2ODjMnGydS8lwSYkZ:mqkzdQJl6F3MnG38lwSYS
Malware Config
Signatures
-
Loads dropped DLL 12 IoCs
pid Process 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe 2908 promo-generator.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133580331311612043" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe Token: SeShutdownPrivilege 3896 chrome.exe Token: SeCreatePagefilePrivilege 3896 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe 3896 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4196 Calculator.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2908 2860 promo-generator.exe 85 PID 2860 wrote to memory of 2908 2860 promo-generator.exe 85 PID 2908 wrote to memory of 2904 2908 promo-generator.exe 87 PID 2908 wrote to memory of 2904 2908 promo-generator.exe 87 PID 3896 wrote to memory of 4776 3896 chrome.exe 111 PID 3896 wrote to memory of 4776 3896 chrome.exe 111 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4388 3896 chrome.exe 112 PID 3896 wrote to memory of 4608 3896 chrome.exe 113 PID 3896 wrote to memory of 4608 3896 chrome.exe 113 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114 PID 3896 wrote to memory of 2084 3896 chrome.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\promo-link-gen-midquality\promo-generator.exe"C:\Users\Admin\AppData\Local\Temp\promo-link-gen-midquality\promo-generator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\promo-link-gen-midquality\promo-generator.exe"C:\Users\Admin\AppData\Local\Temp\promo-link-gen-midquality\promo-generator.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2904
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd68bab58,0x7fffd68bab68,0x7fffd68bab782⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:22⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2236 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:12⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3120 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4344 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:12⤵PID:5312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4456 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4664 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4844 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4572 --field-trial-handle=1924,i,9612542007483822947,3944676904495118692,131072 /prefetch:82⤵PID:5628
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1780
-
C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe"C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe" -ServerName:App.AppXsm3pg4n7er43kdh1qp4e79f1j7am68r8.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56c02f4884971dee9e94fb6f4b82f0c28
SHA19cfae7c3d039ba9f2ef366f6f0c39f364f57908f
SHA256b663170a7cabb398b36db0a9ea67172bb96bb4ea0212e6b0f7fce3381985ffb8
SHA51225a2fc1bdad9a6b18b3313a61c7cc861bd8793f497dcc7d201954129b7425288ab26eb809d89858577c23a6eb3fce535b8a031ba82978a049d3d44af5ebb5551
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5a9debe5e66956bda6ed5d9fdd2391a07
SHA113832a76d137e342dd6ac010175ec8972c346245
SHA256b641ae963fa436576b5d1cec3cf9895b4fc937bb7cabb93f520abdf8723e39c5
SHA5120d25fae4b98825206be2731b367bb029cd59778aae9c6877a2d79963ae1ee0bec86096f2447688e86d4508966f439cd2b610aefc289b7816b7d677e98cb1404a
-
Filesize
6KB
MD56583089c242fb806f33880895760359b
SHA1f779ac9f5f50391c3d05b843a6d0a255936b76e5
SHA256d14a44460495e53f1ef038bfe419d90839f041ef1a0eb9df132463e9e1c28fb6
SHA5128c6c3468bba3211b8c2caaa66092dfc73a2c28fd18a7668c9ff3b0d676e955a734ad4eeb85111ea1ec6a4ac6ca548e3b796c924c09351b77d7f3f79e1d331d29
-
Filesize
16KB
MD570f1591f31bcc1bc793a5f784a69ece6
SHA13e303a0f41aad1392b7db1979fc270b5c4f956d6
SHA2564cbb358ce3358a2fd67b2740aea1da9420489de670b41cc0f9d95e2d4de3c9e7
SHA512d9bfdebb3adce4b37334b6af4e01ac294377a78ba2e299bdd1be724799ca93eac9154774ec4575e704f2953d48d1ffa954b4854084042ca73cfa780e17ada611
-
Filesize
274KB
MD5549f2a53f16c02de35e9e7e28e861ce4
SHA19d25c045060c110edd78165b0c2dd0737def1ef0
SHA256547c5f6bd95f37539fa4af488342233f6d7e6ee59be05b636c4d0b87786fbaac
SHA5124df14e71541e9d443d02e0844bcf2fe521a53f8e3a84891b14a454cdff663a0c6093820f9045388ff38e627cffcc0c5ef232fe4b2d72495554a892877cdb76c0
-
Filesize
254KB
MD5cc5a4f10493a2f5a97f4c37bff693898
SHA1ccff586ae69c0912167ab420161515b12a563911
SHA2567fba29155099257d2d25a113448466668e29903f8b189e37ded7d889032a12c6
SHA5121ea61adb428959c13767f5524bbbc9182e0b825f1078999bc19e9a9669f33a30d20ae65dfe20befbd6ef7a83330d96e5a3773a94d8bc3e164398325bb2683f04
-
Filesize
252KB
MD5bcb231c86e8f34bd039bbf42e0307b76
SHA1b22989b90db3371a78d3b88ce15757171c9ea7d2
SHA2560665488ee11a1e3199bf79fc69b1078e90fc2ae79f157c81fe825be4dd593551
SHA512a6cb909a406ae8bd3abb28fc90124bdf58a42ce78e2d03c1b9aaeb3d3fa8930d012bd2a10ff85246d01f2eb4150a0beee665d72a29c7922e6de5924b8309cc76
-
Filesize
254KB
MD580ad2b2b6efd4431f0306677fd31a013
SHA1e57552cc5ee9d72ce01108adaf6dbaa7a98a8620
SHA2561798f533c5a0b08c865296f1ebbeb32ba8bd76bb65bc124371b021b5a31576ed
SHA512b88700f18ed608b3d38d0dab2b0c4a677a870e25aaced2adb9f497aa2753c2bb53b3ae272a59100bf54f24176dc7169bbfae65ece82cab8e9ec7515b6ae34abc
-
Filesize
92KB
MD556f89fe069bf3d2ecad0d776e72c7f3c
SHA127db1a004a0daf024a57836cd8af36165769d5c4
SHA2566478561dfaa03ce06767615284cb6e7c276f20259df290299e7d5ae3b21d6b71
SHA51296c811c2a6f422b623e32965471ddb76a67b7c50c38bf011fe41c37413f82fe9a485798dee3e1ffac3adc5509144b8a3a457e8e4a2e073ea89d85b752708a97e
-
Filesize
89KB
MD564433f0c9cac5c75c1d71e236c711378
SHA1903679b43b1e0cb9ce013bed598d6aff43152164
SHA25606d8e30f90a52cf853484587dbf3970a8fa089f500cb83adb27c9b50187d4914
SHA5120f7a9b4d5aff28cd405af23b0043a66d8e8133d183910148afc3ce8e5f640237ac7e72222c42f8d984a2c677cf827b6e414da961f449535f1b975a691842a0ce
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
81KB
MD54101128e19134a4733028cfaafc2f3bb
SHA166c18b0406201c3cfbba6e239ab9ee3dbb3be07d
SHA2565843872d5e2b08f138a71fe9ba94813afee59c8b48166d4a8eb0f606107a7e80
SHA5124f2fc415026d7fd71c5018bc2ffdf37a5b835a417b9e5017261849e36d65375715bae148ce8f9649f9d807a63ac09d0fb270e4abae83dfa371d129953a5422ca
-
Filesize
120KB
MD56a9ca97c039d9bbb7abf40b53c851198
SHA101bcbd134a76ccd4f3badb5f4056abedcff60734
SHA256e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535
SHA512dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d
-
Filesize
245KB
MD5d47e6acf09ead5774d5b471ab3ab96ff
SHA164ce9b5d5f07395935df95d4a0f06760319224a2
SHA256d0df57988a74acd50b2d261e8b5f2c25da7b940ec2aafbee444c277552421e6e
SHA51252e132ce94f21fa253fed4cf1f67e8d4423d8c30224f961296ee9f64e2c9f4f7064d4c8405cd3bb67d3cf880fe4c21ab202fa8cf677e3b4dad1be6929dbda4e2
-
Filesize
62KB
MD5de4d104ea13b70c093b07219d2eff6cb
SHA183daf591c049f977879e5114c5fea9bbbfa0ad7b
SHA25639bc615842a176db72d4e0558f3cdcae23ab0623ad132f815d21dcfbfd4b110e
SHA512567f703c2e45f13c6107d767597dba762dc5caa86024c87e7b28df2d6c77cd06d3f1f97eed45e6ef127d5346679fea89ac4dc2c453ce366b6233c0fa68d82692
-
Filesize
154KB
MD5337b0e65a856568778e25660f77bc80a
SHA14d9e921feaee5fa70181eba99054ffa7b6c9bb3f
SHA256613de58e4a9a80eff8f8bc45c350a6eaebf89f85ffd2d7e3b0b266bf0888a60a
SHA51219e6da02d9d25ccef06c843b9f429e6b598667270631febe99a0d12fc12d5da4fb242973a8351d3bf169f60d2e17fe821ad692038c793ce69dfb66a42211398e
-
Filesize
76KB
MD58140bdc5803a4893509f0e39b67158ce
SHA1653cc1c82ba6240b0186623724aec3287e9bc232
SHA25639715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769
SHA512d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826
-
Filesize
155KB
MD5069bccc9f31f57616e88c92650589bdd
SHA1050fc5ccd92af4fbb3047be40202d062f9958e57
SHA256cb42e8598e3fa53eeebf63f2af1730b9ec64614bda276ab2cd1f1c196b3d7e32
SHA5120e5513fbe42987c658dba13da737c547ff0b8006aecf538c2f5cf731c54de83e26889be62e5c8a10d2c91d5ada4d64015b640dab13130039a5a8a5ab33a723dc
-
Filesize
1.4MB
MD5d0ad2b400f15d1bbaf48c8908bee5b0f
SHA1c3f25ea44c69180bc7dff7f2615a4010badc9b4e
SHA256b178b21bd1653a95b626840f565806b8e121962db6b3ae332632d5948323263e
SHA512516183b61b5b65031b07876f4f35f6436cc6cd5b0c395ba18f96d42082e700b88d95bf48e029300674001bba9a8a9820e7e96134f3c55b9d457aba479dff955c
-
Filesize
3.3MB
MD56f4b8eb45a965372156086201207c81f
SHA18278f9539463f0a45009287f0516098cb7a15406
SHA256976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541
SHA5122c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f
-
Filesize
34KB
MD532d36d2b0719db2b739af803c5e1c2f5
SHA1023c4f1159a2a05420f68daf939b9ac2b04ab082
SHA256128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c
SHA512a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1
-
Filesize
686KB
MD58769adafca3a6fc6ef26f01fd31afa84
SHA138baef74bdd2e941ccd321f91bfd49dacc6a3cb6
SHA2562aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071
SHA512fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
28KB
MD597ee623f1217a7b4b7de5769b7b665d6
SHA195b918f3f4c057fb9c878c8cc5e502c0bd9e54c0
SHA2560046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790
SHA51220edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f
-
Filesize
1.1MB
MD5bc58eb17a9c2e48e97a12174818d969d
SHA111949ebc05d24ab39d86193b6b6fcff3e4733cfd
SHA256ecf7836aa0d36b5880eb6f799ec402b1f2e999f78bfff6fb9a942d1d8d0b9baa
SHA5124aa2b2ce3eb47503b48f6a888162a527834a6c04d3b49c562983b4d5aad9b7363d57aef2e17fe6412b89a9a3b37fb62a4ade4afc90016e2759638a17b1deae6c