Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 13:17
Behavioral task
behavioral1
Sample
0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe
-
Size
296KB
-
MD5
0656636bc8e31de48665ae6ae8598d4a
-
SHA1
4afcc2c0d94d9d3c3672ee8f53e1feb3df19e2fa
-
SHA256
56f21c70f75e7123314f3e0a873fab218e9c03c7a09bf905e60fc5e3bf191742
-
SHA512
7c9971fb8868ea4fe20819289722796132fbe0eb0dd32e7f5343b940ae8f32ceda6a94633fd1ece983da748a60330e50797e4f2777ae878836e36fcad849d747
-
SSDEEP
6144:POpslFlq9hdBCkWYxuukP1pjSKSNVkq/MVJb6:PwslGTBd47GLRMTb6
Malware Config
Extracted
cybergate
v1.07.5
ameen
mameen.no-ip.org:8080
44577RJ4FK3748
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
tagtag
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6NVWJWCJ-PO21-5JTU-2YGM-0SIS16D2HNB8} 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6NVWJWCJ-PO21-5JTU-2YGM-0SIS16D2HNB8}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6NVWJWCJ-PO21-5JTU-2YGM-0SIS16D2HNB8} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6NVWJWCJ-PO21-5JTU-2YGM-0SIS16D2HNB8}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 1620 Svchost.exe 2268 Svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 476 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 476 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2176-2-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/2292-530-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/476-860-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/2292-1570-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/476-1728-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\ 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 476 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2292 explorer.exe Token: SeRestorePrivilege 2292 explorer.exe Token: SeBackupPrivilege 476 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Token: SeRestorePrivilege 476 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Token: SeDebugPrivilege 476 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe Token: SeDebugPrivilege 476 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21 PID 2176 wrote to memory of 1208 2176 0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0656636bc8e31de48665ae6ae8598d4a_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:476 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"4⤵
- Executes dropped EXE
PID:2268
-
-
-
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"3⤵
- Executes dropped EXE
PID:1620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD57a2368042074aaa645a82fb2d8748b9a
SHA15134ca341d70558b76d88ae5141ef6dea5ad684b
SHA256946365bffd1ca860d9ed9dfaba14bc8956f51050bfaa3c7f910577c3bd086665
SHA5120987e078595f7368b1716fa0cd9beecf7ec0d8f121fefa172cac29c26e3fa8bce5d2ab4ba8291742f1e54ac8e08f88e000881f3e4f255c40314cdcf2071832d4
-
Filesize
8B
MD58267f35e9ce5102f93bff3c9e5a1ad76
SHA187efb63ce4b3762fc7465983cfd7bb2b54dceb2d
SHA256dab2b15bfe95c8361b086ab6c9298147ae5dca3f4b95b05b869bc40788ac7e3e
SHA512dd5e19e2b09074a8e60067cf0230248ef9eae0c6138f6e389baa32254aefcb107491df64262ed2e96e3ce1143677aaee09daa68d7e9ee98e1c2453771999793e
-
Filesize
8B
MD51c25990f54a4f6e78b2f4adfc28ce6b2
SHA11443cef4f28d1a6c8e0d8d3d5f9134b59e0480ae
SHA25623fe10e9ae1c82efb4639c7e28efd4c14e360846a250ddaafb67c0b198f14251
SHA5126dd28d4e2f8529a69b443d73102538e34e2a93e7637aadffbb841af2d65f925092a4ebd0d8f9cdc8ed0677e08fc5d3ca6cb9ddb467a6a06ce2e8c2024faa0ea9
-
Filesize
8B
MD5de1387a01ba850fa7a5c2e7d28219c90
SHA1bbf23abd600aa259df674fd1f3bcfa3f8209cf91
SHA256988fbee24dffabc4c03bb06805070b565d0a6ed4c54e2ea9903080dc4fcb9c39
SHA5124d3efea6cec23172ca102e76734904b810599220462e8c35a370207bc6a229a25f2ed78623a1299d9c9666b3962574c2580c62bba057f85b2692bbed0233136a
-
Filesize
8B
MD5bccec7449c2108ce9393ba2bfe851462
SHA1aee0ffb257e09e2674b63c084c2aec8706ca1a4b
SHA2567fd9e518df9b355f1ad6dc9dac0c6716dbe1498883f3e4a50cbf83a9ef2b797b
SHA512042a77c95ffcca674b8fdaf9603bf86fd19b5d8f6b30e5d3ceb8907701d9aaa031cf488b6a57df24ac9378cff7899019d451245619b2dc86bfc5e7a3ba529ed7
-
Filesize
8B
MD54131e028586b25992f0ef2da75587004
SHA18fac4bd01412df7fdc40e4bee7ae609fd67f1ffc
SHA2565b59ecf7837bf404821a9ff890a2a9847e3a79e291c47066fff7d01a0951a981
SHA5128c7bd842ce1d46c70aaf43ff54df9b7f8ba6d1513482b07e599477a56a484a580b76638f0297b3f86d671a298b6173718a2abdd4f641dfc17c6667dcda230d74
-
Filesize
8B
MD526e37cf1c9867e631a1866afc32f76d3
SHA11468eb9571af5bbcc56ba2ac0b9f1d506f571690
SHA2565dffbf32a7dea98d03f558b15e8bbe89b65ae1ba6857ef6a312e582205a9a10e
SHA512fd280178b282d26e9693037370684972bee06cdc8c1950c7324da4df54300b4fabc46631ad824bed69771ccaddc510c777f1fda9c308ce96c5618b039e7615cd
-
Filesize
8B
MD52d11469dddc14a07e0fa0ab884e7b176
SHA1a11bc4a1b21a252ed849c39da401debac6e59eba
SHA256307e054a254b8ba5fc106916e9989ca7ac39397825981899b26db1175b550213
SHA512ca6cf720c4092cf29b966730de644a8971a38bef27983ea19961d650bf774e7f8279b5482dec4d65a8ba5e132c147bc3379aa8a37057adea7a9ac8be26f42a6e
-
Filesize
8B
MD589a63b0251ec5854cd351c7018e065e9
SHA1f1bd6ea673b6ecbbfc4414c5cabd8f339f0aa967
SHA256273f0fc188827d17f744c00b06a3a220d40289de4629776a5207ec05c9db6c87
SHA512bb793e92cd78da4880a9ae4b88c63fee5e73780e06fd79c89419d627d64ae2a5045394e26614e7e77f74463e9c9c4bc94304936440be42588b365f23c422d1d0
-
Filesize
8B
MD5ec43d54a2ec9227b47fdfc8ff7a882ff
SHA119b83de78cd72715bba4e368c329a63f17a1e545
SHA25694677bbbddc234ca2fa5f156c4a826757e7db52610c0f0dbc8d86d0321157036
SHA5125bd88dd7f0dce36ce79e02edb54cd4fc3230f321166c0e72356fb87247023e4ecd140ac4a02dba073724029881ea538b28e2dda5749fe7767d1edda75fc7d4cd
-
Filesize
8B
MD5c3b63c00ccffadabb969e0c4b06c5a0f
SHA181d3495c5854bbadd3aba1ce98e6441fffe59ecf
SHA25685a37a9b434699e87369b5d7d265899c53cae1817909e8cc0ad45221aef342d4
SHA5121f73226b28ce4860dbfe148d9e58a0d37c1416575dba6f8dce2f32fffbecdb9894c4829c4f91726f6e37052e58298e0afeff909505c30042b05e1275267f3e61
-
Filesize
8B
MD5fc7356cd85c864b1b6707e363f781370
SHA11488ff270fcf0bb2c82f957479d44769a734f29b
SHA256cb3d717a310f9afd8236f6b6c370ff2ad9606d55850f8786817c2571787f16d8
SHA5124b8c35dd03ed2e79bc531d22ee353957dfe0c6064ee0bdaefe12830a15a5c603955232d827dc9f3799adf469c0281f41eb2e8d00d4fb0a903572c55aefb8e09d
-
Filesize
8B
MD51fd693aaa559736a7721235e26ccc9e4
SHA12bd21fc811a4ac27989d8c780d613373716923f0
SHA2568c13526924e1a1e6603c6383f4c1c728622949fc1f4f15c77fe2a41407fb4948
SHA5121c68de2c2ef6079cb889da8c9f11cbcf72205a90727d4f16cf216349509cea13073ce733444a6b21f5fd1d354c5b26997fd804899dd77aa51fb3127d4769bcec
-
Filesize
8B
MD561f94e3f4b6579adc774cd300faf4a4d
SHA1bf127a36359336fb19c91f5f3911c1d3b993f329
SHA25637929b177d196ada86426210fff7955ebc5da209adc0e30b7c690b30497775dd
SHA512e603d1aec0c9588d091532f755c363095bb4e0cef89d926244528e3a2ed0c65974654b36f8956f1c5d6cf1bb1685cc89908e277c7167f849e371ab165cc4816e
-
Filesize
8B
MD5b41a35f8b80b239cac5644637f598a39
SHA1160672fa19b862c2f4a155bf367d394da2625c51
SHA2561131d1f708b0edd6618a8ca953cc110bd2fbe0ffcdbd5d53d978b75b7adb817e
SHA51290812f5e717d13a61e78b5adee3e4bb819d6a68ca3c729c1ec0628a256af7a0667d12dc2721e712cc730a3a6d63cf3f035774fe68fb21a73c204151ef30859db
-
Filesize
8B
MD55750d705fe8afa49d917529e96dfd17b
SHA1f383bc4f785146b10bc799adaaa37ff169b85774
SHA25668e6fe8d063dab18f30318666e773312694da0bfa58749a85a53f61e8ff7e84e
SHA512cf9e326d480fb764b7d03c6828f17a4fd7e045b431d430c35e91049cbbf5d7d8a1474c141c99482129953295ba495b4cb988fd408b91ad581de0234b500afc61
-
Filesize
8B
MD5a5f5847685fbc380717e616ea0c3958c
SHA15ca89d787a33f253f2992436c2d6f6246d44ae78
SHA256de999597213e1a3946e121eef7d82e21b1a6df725b7f6d6fbb1409e9faf27942
SHA512ca196e9be839323e6d87a61a4cc1f36886782fecfbf76aabfb4fb51d584e8ca9abd0f970112561be81144c6fae602ae8eec0700ee80540d1cf5ba2fc2d71edab
-
Filesize
8B
MD5476e25be2024951451cb70ecb71f6f6c
SHA1cc12436d654b2485ac229ad2eddb1d16168890fb
SHA256484f5c0a6f327f138466f3e0a1346657eae93e13f0c7d87316d671077647817f
SHA5125d6d2e2fb521c2a6b11fb51a1697b52bfe51d305d0b83c887580331fc3ce37582ba89d63142dfe5b26b6f7d38512119e7a4f6358fa9a71667d3a5563345f4675
-
Filesize
8B
MD550491734d48a5c3179c1e9415308c15b
SHA1299fdf177940ab48003715a386ba191c1ed2c74d
SHA2568e1187c5ca7bb1495d4d3e211d6cfa6225adbfb6ce5aad13ef0d03d83dec9cb3
SHA512ae87c7888a241b3113bb3e2ff7c9901c5665f98adf657b16a468348ef0672c8aab889fea04d55582b7be974f2883058cf86e479b551f94f9e4e9051d56db49f2
-
Filesize
8B
MD53830e1cf4d89be01420f274d485c5de8
SHA1d224112522be7ac8deb71eff14e5d7e7a6f9a05e
SHA2566a3a606c5c1c5add6a3b83ddc5b71c8a50676b9fad1860b413838d7154cffeed
SHA512e2e5f904b9d47d256a6849619fe60908dfbb86e5623cd23efcbff3fdafb3d176c87d236eb90eef167c67cba4aa473ab659757ffb9f63bdfd4009cab6160a0a51
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
296KB
MD50656636bc8e31de48665ae6ae8598d4a
SHA14afcc2c0d94d9d3c3672ee8f53e1feb3df19e2fa
SHA25656f21c70f75e7123314f3e0a873fab218e9c03c7a09bf905e60fc5e3bf191742
SHA5127c9971fb8868ea4fe20819289722796132fbe0eb0dd32e7f5343b940ae8f32ceda6a94633fd1ece983da748a60330e50797e4f2777ae878836e36fcad849d747