Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe
Resource
win7-20240221-en
General
-
Target
8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe
-
Size
10.8MB
-
MD5
dd69cce4a6817cf93960675148c35dfd
-
SHA1
b0bb7338492678de3e96f1c11337591f0d9d392c
-
SHA256
8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b
-
SHA512
be5bd8a923fd4791cff81862ee788067a546cf88d55ccac6c170eee6f1999698e8cf2ec531c3c92f009c0c0f34c332f6c7327a74b3fdf1d74ddbdc47015927e7
-
SSDEEP
196608:8KXbeO7gmK+/eQ0VydJYvvCJc6SLK0zyx2QHPMFLOyomFHKnP:97gaDdJYiEmTHPMF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2584-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2584-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2428-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2428-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2428-48-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x0038000000015ca5-6.dat family_gh0strat behavioral1/memory/2584-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2584-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2428-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2428-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2428-48-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259397464.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
pid Process 2808 R.exe 2584 N.exe 2820 TXPlatfor.exe 2428 TXPlatfor.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 1660 Remote Data.exe -
Loads dropped DLL 9 IoCs
pid Process 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2808 R.exe 1648 svchost.exe 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2820 TXPlatfor.exe 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 1648 svchost.exe 1660 Remote Data.exe -
resource yara_rule behavioral1/memory/2584-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2584-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2584-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2428-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2428-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2428-48-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\259397464.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2428 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2584 N.exe Token: SeLoadDriverPrivilege 2428 TXPlatfor.exe Token: 33 2428 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2428 TXPlatfor.exe Token: 33 2428 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2428 TXPlatfor.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 2424 HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2808 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 28 PID 2124 wrote to memory of 2808 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 28 PID 2124 wrote to memory of 2808 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 28 PID 2124 wrote to memory of 2808 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 28 PID 2124 wrote to memory of 2584 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 31 PID 2124 wrote to memory of 2584 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 31 PID 2124 wrote to memory of 2584 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 31 PID 2124 wrote to memory of 2584 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 31 PID 2124 wrote to memory of 2584 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 31 PID 2124 wrote to memory of 2584 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 31 PID 2124 wrote to memory of 2584 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 31 PID 2820 wrote to memory of 2428 2820 TXPlatfor.exe 34 PID 2820 wrote to memory of 2428 2820 TXPlatfor.exe 34 PID 2820 wrote to memory of 2428 2820 TXPlatfor.exe 34 PID 2820 wrote to memory of 2428 2820 TXPlatfor.exe 34 PID 2820 wrote to memory of 2428 2820 TXPlatfor.exe 34 PID 2820 wrote to memory of 2428 2820 TXPlatfor.exe 34 PID 2820 wrote to memory of 2428 2820 TXPlatfor.exe 34 PID 2584 wrote to memory of 2504 2584 N.exe 33 PID 2584 wrote to memory of 2504 2584 N.exe 33 PID 2584 wrote to memory of 2504 2584 N.exe 33 PID 2584 wrote to memory of 2504 2584 N.exe 33 PID 2124 wrote to memory of 2424 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 36 PID 2124 wrote to memory of 2424 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 36 PID 2124 wrote to memory of 2424 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 36 PID 2124 wrote to memory of 2424 2124 8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe 36 PID 2504 wrote to memory of 2904 2504 cmd.exe 37 PID 2504 wrote to memory of 2904 2504 cmd.exe 37 PID 2504 wrote to memory of 2904 2504 cmd.exe 37 PID 2504 wrote to memory of 2904 2504 cmd.exe 37 PID 1648 wrote to memory of 1660 1648 svchost.exe 39 PID 1648 wrote to memory of 1660 1648 svchost.exe 39 PID 1648 wrote to memory of 1660 1648 svchost.exe 39 PID 1648 wrote to memory of 1660 1648 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe"C:\Users\Admin\AppData\Local\Temp\8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exeC:\Users\Admin\AppData\Local\Temp\HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2424
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:2332
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259397464.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5915748cafcd3e84806cbdc33611cd17d
SHA1b933028e5c844e7e14338ac92a96abda3a7e3d45
SHA256c82085f33554116cfbb9470ae76b1eb98cf6a3bfbaf6702317ce0b70043fdcb7
SHA51202cde5f98224e4eefb204b16f086c57e30beb64afe3586bc2023b839f4897ff57a3ffe28e4ad6478b0ebc1dd4cb14297255c689a5d8fe1e5152840021072fdd4
-
Filesize
10KB
MD5de81b1868885c6215568da56aed41d71
SHA177489958ff7f60280fe78eaa2dae4474a2dced37
SHA256f78bcb7803997cb8d4fcfe034104da012b1f72d0d89fda4584737aad4f99b1b8
SHA512ca3d847cb67923955047189f798f4533c16ed7629e8de84242727af78ea454dd7409e4464b44049de46fdb8ec221b0fd0e9016a4d28154df99ad6a10301bca75
-
Filesize
1KB
MD54fcc4639d6501e8e826a02b525e236c1
SHA19d00d9f72356092a480a2014bee280e8f8e7f7c3
SHA2563545ae8f784e226da5c8b8e0c573db5dd65ed05f550d278b453db63407d5deaf
SHA5124b956e66d51b1e71243cc37397686f0ee81e7cdc9377d61579fade2b792a97292ee2a89b74efda61c8a5a5ef3c5a82846c47668c058dca7b14886f81aeac0782
-
\Users\Admin\AppData\Local\Temp\HD_8d60870dd0748b34cea3fd0b7f6357b9267c5e5d523ce2cc95f091e24374967b.exe
Filesize8.3MB
MD59f4a4411eb827de1050f23d56f5d30e3
SHA1907c58d78025730f35269033b3dba380c37997ad
SHA256754f57935d2ff76e6393ef12b63ec36461ded4d939a80420037227cb0b282530
SHA5125aac63a5915e5fe25fe83ba07741518d13167bb9397c6535ce0819bc98d10b513a1fe244b2a4b3328248d1f94ca021a20c4d80be41475e256e13369e97a75208
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD5fd3e1ad3dd6a4a1d72b87f0f8e856d7e
SHA1d282066f49cd568b67f6a6062cc056c7e0d5ed4e
SHA2567f9a200921be9d682397a469eb57e5fe8dc033044ddab41e4e144260715e93fb
SHA512963500544a4c1ddd59e70cee2d3383d7ead0989c40693a70f2d64254515cc161d3bcb64bb75032b0b08864b8db02e06c254fde7db7977892912e0d8d0406efea
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d