Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 21:44
Behavioral task
behavioral1
Sample
CompatibilityCheck.exe
Resource
win10v2004-20240419-en
General
-
Target
CompatibilityCheck.exe
-
Size
37KB
-
MD5
0c84829a79c06e88510607526990391e
-
SHA1
63970a42f5b779c1f0f8d95d493317917b0bd46d
-
SHA256
6f9b61794c9169a8860fb74e2cc0253b0bc283327b6485f799265f702a67c921
-
SHA512
85638191fee2b456e601487aff23bc5dccbfd24e74970e5f1d8fbdad633a3d31208887f682debf1fd2abcec6e36c50e74b6da30c660dfa0bc0471e7ef8c98f40
-
SSDEEP
384:p6hCpb2iKrL4y4Oo49qylTKbWstSXHasW4TkrAF+rMRTyN/0L+EcoinblneHQM3Y:oCdi/s89ZlTKtSK94YrM+rMRa8NuS2t
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4072 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation CompatibilityCheck.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e14109296e01cf24bb9b7f72f64c4cb3.exe COM Surrogate.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e14109296e01cf24bb9b7f72f64c4cb3.exe COM Surrogate.exe -
Executes dropped EXE 6 IoCs
pid Process 4996 COM Surrogate.exe 5016 COM Surrogate.exe 4728 COM Surrogate.exe 5752 COM Surrogate.exe 5836 COM Surrogate.exe 5872 COM Surrogate.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e14109296e01cf24bb9b7f72f64c4cb3 = "\"C:\\ProgramData\\COM Surrogate.exe\" .." COM Surrogate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\e14109296e01cf24bb9b7f72f64c4cb3 = "\"C:\\ProgramData\\COM Surrogate.exe\" .." COM Surrogate.exe -
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf COM Surrogate.exe File created C:\autorun.inf COM Surrogate.exe File opened for modification C:\autorun.inf COM Surrogate.exe File created D:\autorun.inf COM Surrogate.exe File created F:\autorun.inf COM Surrogate.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\SRU\SRU.chk svchost.exe File opened for modification C:\Windows\system32\SRU\SRU.log svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.dat svchost.exe File opened for modification C:\Windows\system32\SRU\SRUDB.jfm svchost.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF svchost.exe File created C:\Windows\system32\NDF\{894C82FC-3C60-4CBB-81E2-3259F6D6CB6F}-temp-04282024-2146.etl svchost.exe File opened for modification C:\Windows\system32\NDF\{894C82FC-3C60-4CBB-81E2-3259F6D6CB6F}-temp-04282024-2146.etl svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Network\Connections\Pbk\_hiddenPbk\rasphone.pbk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 5184 ipconfig.exe -
Kills process with taskkill 1 IoCs
pid Process 4080 taskkill.exe -
Modifies data under HKEY_USERS 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\RAS AutoDial svchost.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\RAS AutoDial\Default svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe 4996 COM Surrogate.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 4996 COM Surrogate.exe 4228 taskmgr.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 4996 COM Surrogate.exe Token: SeDebugPrivilege 4080 taskkill.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: SeDebugPrivilege 4228 taskmgr.exe Token: SeSystemProfilePrivilege 4228 taskmgr.exe Token: SeCreateGlobalPrivilege 4228 taskmgr.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: SeDebugPrivilege 5940 sdiagnhost.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe Token: 33 4996 COM Surrogate.exe Token: SeIncBasePriorityPrivilege 4996 COM Surrogate.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 876 msdt.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe 4228 taskmgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4996 1004 CompatibilityCheck.exe 86 PID 1004 wrote to memory of 4996 1004 CompatibilityCheck.exe 86 PID 1004 wrote to memory of 4996 1004 CompatibilityCheck.exe 86 PID 4996 wrote to memory of 4072 4996 COM Surrogate.exe 87 PID 4996 wrote to memory of 4072 4996 COM Surrogate.exe 87 PID 4996 wrote to memory of 4072 4996 COM Surrogate.exe 87 PID 4996 wrote to memory of 4080 4996 COM Surrogate.exe 89 PID 4996 wrote to memory of 4080 4996 COM Surrogate.exe 89 PID 4996 wrote to memory of 4080 4996 COM Surrogate.exe 89 PID 5940 wrote to memory of 6132 5940 sdiagnhost.exe 125 PID 5940 wrote to memory of 6132 5940 sdiagnhost.exe 125 PID 5940 wrote to memory of 1544 5940 sdiagnhost.exe 129 PID 5940 wrote to memory of 1544 5940 sdiagnhost.exe 129 PID 5940 wrote to memory of 5184 5940 sdiagnhost.exe 132 PID 5940 wrote to memory of 5184 5940 sdiagnhost.exe 132 PID 5940 wrote to memory of 5220 5940 sdiagnhost.exe 133 PID 5940 wrote to memory of 5220 5940 sdiagnhost.exe 133 PID 5940 wrote to memory of 5252 5940 sdiagnhost.exe 134 PID 5940 wrote to memory of 5252 5940 sdiagnhost.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe"C:\Users\Admin\AppData\Local\Temp\CompatibilityCheck.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\ProgramData\COM Surrogate.exe"C:\ProgramData\COM Surrogate.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\ProgramData\COM Surrogate.exe" "COM Surrogate.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:4072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM SecHealthUI.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4228
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5052
-
C:\ProgramData\COM Surrogate.exe"C:\ProgramData\COM Surrogate.exe"1⤵
- Executes dropped EXE
PID:5016
-
C:\ProgramData\COM Surrogate.exe"C:\ProgramData\COM Surrogate.exe"1⤵
- Executes dropped EXE
PID:4728
-
C:\Windows\System32\msdt.exe"C:\Windows\System32\msdt.exe" -skip TRUE -id NetworkDiagnosticsNetworkAdapter -ep NetworkDiagnosticsPNI1⤵
- Suspicious use of FindShellTrayWindow
PID:876
-
C:\Windows\System32\sdiagnhost.exeC:\Windows\System32\sdiagnhost.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={492807CF-4C1C-4B46-B759-3B07CD93BC18}2⤵PID:6132
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={492807CF-4C1C-4B46-B759-3B07CD93BC18}2⤵PID:1544
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all2⤵
- Gathers network information
PID:5184
-
-
C:\Windows\system32\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print2⤵PID:5220
-
-
C:\Windows\system32\makecab.exe"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf2⤵PID:5252
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS1⤵
- Drops file in System32 directory
- Checks processor information in registry
PID:3776
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3564
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost1⤵PID:4372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2292
-
C:\ProgramData\COM Surrogate.exe"C:\ProgramData\COM Surrogate.exe"1⤵
- Executes dropped EXE
PID:5752
-
C:\ProgramData\COM Surrogate.exe"C:\ProgramData\COM Surrogate.exe"1⤵
- Executes dropped EXE
PID:5836
-
C:\ProgramData\COM Surrogate.exe"C:\ProgramData\COM Surrogate.exe"1⤵
- Executes dropped EXE
PID:5872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD50c84829a79c06e88510607526990391e
SHA163970a42f5b779c1f0f8d95d493317917b0bd46d
SHA2566f9b61794c9169a8860fb74e2cc0253b0bc283327b6485f799265f702a67c921
SHA51285638191fee2b456e601487aff23bc5dccbfd24e74970e5f1d8fbdad633a3d31208887f682debf1fd2abcec6e36c50e74b6da30c660dfa0bc0471e7ef8c98f40
-
C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1612347604\2024042821.000\NetworkDiagnostics.debugreport.xml
Filesize205KB
MD507dc521514357d3bb72c4f0e506913e0
SHA1f1fb3b0f4266386cfcb9876cffa61acbb26ec2b1
SHA2564a9b16b6e962544ab435c55a37c81b910976fb15d372997acb8594419e22c8ef
SHA512e21df883683add8b6ad811923fb6c53023da98e733f71d9ec0771c7a0816ba8076861e5093ed7014d2c721e4f84abaced27ab7f5067eada1711ec494b77ca0c2
-
Filesize
47KB
MD5310e1da2344ba6ca96666fb639840ea9
SHA1e8694edf9ee68782aa1de05470b884cc1a0e1ded
SHA25667401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
SHA51262ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244
-
Filesize
319B
MD5da4fafeffe21b7cb3a8c170ca7911976
SHA150ef77e2451ab60f93f4db88325b897d215be5ad
SHA2567341a4a13e81cbb5b7f39ec47bb45f84836b08b8d8e3ea231d2c7dad982094f7
SHA5120bc24b69460f31a0ebc0628b99908d818ee85feb7e4b663271d9375b30cced0cd55a0bbf8edff1281a4c886ddf4476ffc989c283069cdcb1235ffcb265580fc6
-
Filesize
192KB
MD540b9af2b06be8c5d09014724d1731840
SHA13b92f8523cf8785899a7572a2a3e8de049161d12
SHA256ae977dca9352710f690206b576f7db5e0a50606f81da162050df4bcd1ca44931
SHA512d2dfc665f211e10f5076cde91176a06cdb6cc24651dde449f7cb2651389d8a2e57d90e699c65e6dd2488def7a8853f1a77abfc4f331e73e0370c91f88dcecd56
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5d856aef2bf338d81efd990d1e5bb592d
SHA1185745cf605d0ee7ff62af8e183bef093f375c7c
SHA2566e5a68e5e1cc500d16153b5389865f69ed7f7ff82599aa6d5d37b6b0930054ac
SHA512607d9015f60c3dc1b1807046e7e2456a1843cc18287336c749421721e18e4f03e1bc7ca8ef06d65918b7ab8d6aeb04611c2f0c25cedab07518f88dbcecb7f8fc
-
Filesize
231B
MD500848049d4218c485d9e9d7a54aa3b5f
SHA1d1d5f388221417985c365e8acaec127b971c40d0
SHA256ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e
SHA5123a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9
-
Filesize
1KB
MD5e8854e671204751608ed66bd5e0d5da5
SHA18ca9d5851d60c8fc7fae9e2f75b419de74c5993e
SHA256e89ff7b50aaa91700c7d5496309e8ca2efe8e0ce82235f7fc56ad6de02da17a6
SHA51279c5e415a341c350b7ad8c4fb701667f004ab17d307574ae512aea48507e3c3bc091fe97979c97f6144411a3a75b8704309bb2f4cf06e9d93d9ff12695fb58cb
-
Filesize
4KB
MD5d28ad02413c40387ea3651c129ec3498
SHA1cb6c7224a125dc06a1b6ee6dcdb05db83935d8ec
SHA25672dac253d8ff513154c735511c97f213411ffbf3bf8db5f59d22e493f551ff78
SHA512dcf1d076f640beb2a391ef79fb6ec15d473d0c859d79d1120c6a66acce08938993810e9dec5231efcd6f0e5ff8be7f24aa362ff99e60d00352e17ca531e0b4e2
-
Filesize
978B
MD578fb2abcc7034ae36debb48d724dfb02
SHA1848eeaf76435b7349b794ef66d3e2d5040c6286d
SHA2566a525835a04aeb5088d88b1637e15b680445328d84d38b6efe050b79bf30b7df
SHA5125ff625f23c53c70337408279bc7245fd1f12c362725e009d396e1654689d2509c31375fddda6bedc30cda68694f6ea605f58a44b4bd3dbbfa5d343d995b1d164
-
Filesize
283B
MD5f4aec6c7039635ab7aab94a991c13c57
SHA12d18c57400f14ddf014c1c2c3d1d6ce8c4e700d5
SHA2568f0d389937307c5ac58d93374494c8cbea70ee32a89b980a525d2310a0f2a860
SHA51218eafb888964a255d33b922703cb47cc29d773ec5a3842edd55036201c33d59e2bc8486edbf9cbe07aee398c4b557e300bbcaf610e92f08201c8dac5adfeec7b
-
Filesize
11KB
MD5d213491a2d74b38a9535d616b9161217
SHA1bde94742d1e769638e2de84dfb099f797adcc217
SHA2564662c3c94e0340a243c2a39ca8a88fd9f65c74fb197644a11d4ffcae6b191211
SHA5125fd8b91b27935711495934e5d7ca14f9dd72bc40a38072595879ef334a47f99e0608087ddc62668c6f783938d9f22a3688c5cdef3a9ad6c3575f3cfa5a3b0104
-
Filesize
25KB
MD5d0cfc204ca3968b891f7ce0dccfb2eda
SHA156dad1716554d8dc573d0ea391f808e7857b2206
SHA256e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a
SHA5124d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c
-
Filesize
10KB
MD59b222d8ec4b20860f10ebf303035b984
SHA1b30eea35c2516afcab2c49ef6531af94efaf7e1a
SHA256a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc
SHA5128331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67
-
Filesize
567B
MD5a660422059d953c6d681b53a6977100e
SHA10c95dd05514d062354c0eecc9ae8d437123305bb
SHA256d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
SHA51226f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523
-
Filesize
53KB
MD5c912faa190464ce7dec867464c35a8dc
SHA1d1c6482dad37720db6bdc594c4757914d1b1dd70
SHA2563891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201
SHA5125c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a
-
Filesize
2KB
MD50c75ae5e75c3e181d13768909c8240ba
SHA1288403fc4bedaacebccf4f74d3073f082ef70eb9
SHA256de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
SHA5128fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b
-
Filesize
5KB
MD5380768979618b7097b0476179ec494ed
SHA1af2a03a17c546e4eeb896b230e4f2a52720545ab
SHA2560637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2
SHA512b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302
-
Filesize
478KB
MD5580dc3658fa3fe42c41c99c52a9ce6b0
SHA13c4be12c6e3679a6c2267f88363bbd0e6e00cac5
SHA2565b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2
SHA51268c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2
-
Filesize
17KB
MD544c4385447d4fa46b407fc47c8a467d0
SHA141e4e0e83b74943f5c41648f263b832419c05256
SHA2568be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4
SHA512191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005