Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/07/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe
-
Size
380KB
-
MD5
29aee678b3d57f86e1b1159db1ed51af
-
SHA1
f9c23af90a1b846cf39ceeb2776a042dad56f241
-
SHA256
e9a2460d4e14afd61345adcf91f287a791a8218d3b1e3093b62a815212b62126
-
SHA512
7f9e63fc0863c626d8889f069bb2c53be1f040e77a1212c3a90be5836729fd41df699893c380747ff3cd0be24d59851d6f80450f5b8aceb310345f89d2223324
-
SSDEEP
6144:4F9hZfp08E2mUz2mGzTtP/k04YMCUCMYDClf/2dZz3CHPwoLZp68:47hZR089DDGzTpbHJMYeIdlCHIoLZ48
Malware Config
Extracted
cybergate
v1.07.5
orea
hack789456.no-ip.org:81
P34DLX2HD6F5G0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
WoE has been installed in your OT
-
message_box_title
War Of Emperium
-
password
789456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWTKN566-2T6B-3K1T-76SX-LN6Q6YI4J2NE} 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWTKN566-2T6B-3K1T-76SX-LN6Q6YI4J2NE}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWTKN566-2T6B-3K1T-76SX-LN6Q6YI4J2NE} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{TWTKN566-2T6B-3K1T-76SX-LN6Q6YI4J2NE}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2992 Svchost.exe 1828 Svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1116 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 1116 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2392-28-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/2972-554-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1116-888-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/2972-1086-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1116-1657-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\ 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe Svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2120 set thread context of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2992 set thread context of 1828 2992 Svchost.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1116 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2972 explorer.exe Token: SeRestorePrivilege 2972 explorer.exe Token: SeBackupPrivilege 1116 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Token: SeRestorePrivilege 1116 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Token: SeDebugPrivilege 1116 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe Token: SeDebugPrivilege 1116 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 2992 Svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2120 wrote to memory of 2392 2120 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 30 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21 PID 2392 wrote to memory of 1204 2392 29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\29aee678b3d57f86e1b1159db1ed51af_JaffaCakes118.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\SysWOW64\WinDir\Svchost.exe"6⤵
- Executes dropped EXE
PID:1828
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD510cc45396df4d31284e0c01ed0da6349
SHA171e7772142e1dedd58675400cf6869d1122bef84
SHA2566409095e7ef588eebe521da094b952ec2c1ac6028ece41f4d101b2e695084899
SHA512eb5323a64cf730a0977824ea331ba172376d3caeb090d32ce6987ece5762eab1e13b3194f6441945774ec44ee797d0cc73d89af57f408012f4bf2525d13af226
-
Filesize
8B
MD5f1917931c6b567aa8cf602e3c2ed90c8
SHA143e5454dd7f9739dc50e23e59692ef7703b38f8f
SHA256bb06bfff708618ecc8f0848f73a631df897f7c0ba2794fed638c3417ba10c0d2
SHA512e44cd44a9590f147a511363bb2f4f8d97a083260ca836dbbdc7785045a4016e4312d8e494c42a841393218bd5cdd6e12ffb3f92cb18b6b66c1409e31206c012c
-
Filesize
8B
MD5f918c784c9c6b285b305836d2a85ac51
SHA1a6d941b99a7fc21c3242d9369172ca7404b30902
SHA256d2bf2fe19b3f6aea8c18c6589080457df8101029e2d61de3d543722c76793a17
SHA512bc70c4756b24d5f7dec683d9361a980326c085dbc074d1414272178d8266cf5f3db4e24accadcabd0d4891e06c0633b78dd09d668ebd832693ee67c38903021e
-
Filesize
8B
MD50ed498a5aa30e91983de1beb21d4e1f1
SHA1e8f50e553ee7601f9aed2e26e3284c5592b352cb
SHA256a126ca6a4d9d81a576963dfea30ca45e2c8a4c0b8dcebc86dd1127b03c6d1b3c
SHA512df6a70adf33543d55c92813acbb91ba0e5740e4c668b3698223f2da18766fb0f5f4b1f13067d4289186c1e6b02abe3f298a7b6b1fdc992df074f356bcb78b36a
-
Filesize
8B
MD5dfc1a0d8733f1d35f1e61a1d3baa03c0
SHA1738fbccc0678420a4f120f1d75c228625d77b5ca
SHA25653cfe8af8761f31c4c27504135e4cf3101dcf55c8331bb7241067f6acf2d4201
SHA512991cc2c6b082ec74285737a0ba75ece0c70daea89c7c3d10b9bddc2505619d155ec6002e54c216b25c075f496d04a411fb8e0f2de08a6808aa8f4fd574ef0cc2
-
Filesize
8B
MD51f3ac32171bfb881b7558fa09fa09e87
SHA153a5a37a8d9868a506a2ff19c722ebe9c0043a79
SHA256b04db782bc24347d6679439e026279844ebfff3fcad1dffca9c5db7b11209491
SHA5120dd19db51e5345b1f0bba55689c403bb4b39a861f7f90cd096f6082878afc67ed51cef2f9c29cd84c2c668fb8a100677509753a81bb1d86c3ba99fc666c770e9
-
Filesize
8B
MD5fe8de2a043930a195a4ae01844aa6f1e
SHA1736ecddaa90c58c0c6fe24fcc2f7835c46aa9c85
SHA2560e0ec57c4870a747f7851706d7b0f756d61a4383ddbdf141d0392d76dea7bedb
SHA5124f315dd57b175df7b2d03aae34bb0d53138164b7104380099ff8ba04014df5be11539ebbc8065cbeb8aeb975eab62819149e9e26224a9c173dd32f0b3bb92814
-
Filesize
8B
MD5cfbd964b0d337eb3665ae74389e4cfb1
SHA1128dc859e4bb09d77f67c8e6839de40197ed8181
SHA256c65da69d7caf4d3177b3bbf480507e388379f7bb48267ae3c8f4d65c7201a372
SHA5123ff3a55bdab398581c8c1b8429ffe07e2d3e9a957ab805c7bc4af14feb88922b586e4bbf00648a6673cb6776e22759bf505df40baa2519e06f71b354c92c8023
-
Filesize
8B
MD541981f4454296a68199eb024a7eeda83
SHA1bd31e30da328308ca42c54db262a61bc7ec934a6
SHA256c29b67186ad72eaeb9afac5c01df80cd0ec37db61ee36723d8c00c344b207d7b
SHA512acba6307a22b905276f686ab31eee639ae63f917b2b31e828de3729df22fa855f2deb492032a6faa52f8bb4da34113c31cb4c74f1e109fe8ff2d68e7d30b8e45
-
Filesize
8B
MD542e93ce4ee0d031200a066a65c8170bc
SHA1d32df87596d8a4f381fad8477242e2ef0156441b
SHA2565bbf7b3a33b7c13250dd6763c9ce57b2e0567165211ec353f76bb7eccae6cd90
SHA512e6c1819b1fcb8e82cc7ac1e87b294cb0e4c84e16d754e4543510b170c3984f0a7d05c966487589b46b19c7b579db1e1af08aef33993c75d1243cd1e57a3345d7
-
Filesize
8B
MD5a577284b3f3fd2661b1202399a0341c9
SHA1d3a7621621693b16b6873c52fed74ad5936ffc5c
SHA256e1113d943a16f188d60b4ac768f000c859b2c813bdb5bb7ce936130a71a8a76a
SHA51249d8b6d66472d96ad699b5c79bea0ffc1900379f056cd6e2c7ed090c1403101820e4a1b473e67c27d4917d2f71fbfaffcc933f7faba15e52b26ca7ec3455fd50
-
Filesize
8B
MD50147eb6c66b69be8eaa83421380546c5
SHA1193e7518a598c54af0b6839965ba2424b46968fb
SHA256130cdac644baef2a701ccf09b2c9239b493b24333c2f4aaaf59fa93170c78f0b
SHA51255df736a49849916a569b191b3841eb5b1c7f31f9352cb0261b53310a92340c5c4b7311c88748c8bc011ba91f998088d92f1fdb3f733b8d3551ae641adc1ef6c
-
Filesize
8B
MD5780233acb719f5abd06878b89e1523ff
SHA1171c9830c1a51d72778c19e827fefc51fb9dce2d
SHA256b0b1d61061442171e73dd32725c5cfe6ea7054ae935536766ac53254ef8340d2
SHA5125ac2488ba536510000cd933dbaa8a35adf64ad9ee09b6acbeb5db944dcad9ca2c942763ddcd48f4321531f228b602683630c9752713fe03398ae936e8ed6f960
-
Filesize
8B
MD540f323ac0be9d6b0883604b2de95e24b
SHA195657e057fd95bf9d06b59ad3b5e7e6bd8684691
SHA256e86f3782d3ae4da7df2e7a11ae45f5e4759b4029d4c07cf9049755ad08e532b6
SHA5120d0efabea42de034c261cb0edcb23a9793822a4193085b0d4014d61e1174288bb7b922fd513e914ad6519b13dadcc987bcc405d51e5967db2b55b2dc748718fa
-
Filesize
8B
MD55339eda9d0afe92c7f43a1d7ea5e83e5
SHA16a5c75598fa6b845009f6b0f99ceb072cfedd69d
SHA2562b673c603cd134029e01c1acb74c46a839bf84e189d84732e043b17db1adf592
SHA5123d5fbf2ed59d646551cb69afd6c3b349fa4a560c2e6d92bb690920ef6baa6cd264419d5ee8fa08900f5fa84a0df0806f72f3efadcf486791aea4f1a1c1e92989
-
Filesize
8B
MD5f369dc0366f1372a012e4756d80a4903
SHA1ee9eda9a685f8762dc8f5f1f6793fc17b7a2829d
SHA256563077d36908a789955f9528b40decc4a05e238c1d5a4259c45df11de9e83150
SHA512e2aab35c19ac1c74930072b4767aeddfdfc8412f45866745b6a8ea8a253c530f8d6092e7944c487d1ca0479d7cccb1328f77bd20fb199ea58fab7c759e78c4e4
-
Filesize
8B
MD5a1cc1551871773489cf02774b49cf73f
SHA1c38348bdd6d521b583e0fc9da7677db91e5ef417
SHA256a16e7c518f01865dde7f09116510a85724826e9d2dae9b60a96245c95afc2c28
SHA512926298fa77a87546571df8ec19941d1366307cfd9727e3ea29ab7155c7b5fa89b86b07da4fe6293cb2fe9adb7f7480ead1945c8c918ce1b7d6d97d053875bbe8
-
Filesize
8B
MD549ca30c044ec60f01b2a00a8d391ad3e
SHA14b705459e7b64a10a84acfee0ee8ba751e0e327e
SHA256b491b6b970df60e53e07a90df938315effa8a0e47e12a8b488da20f5e5aacbe3
SHA512c20e2d5606f3c379dbe426cbc8ef7a1d7d50799abfb6b0f978d476b26ce5681e5716f4b6b65c6998a44f3d5a95db8eaabfe90d8de47b7fc86f6404b2740d6a7e
-
Filesize
8B
MD5cdb04e7447be7320509f9de2b243d647
SHA1f6a6787b9641e6f50b29c76a525d9343c05da51e
SHA25618dfc57baa12c85c1634b1a31e31a2ccceeb4b29266c87c799dd5340034ba1f8
SHA512bdf3df5c9835687e913e936281cb1f716f10e04eb5082e13b2107106e10a48a762142cde9c69042d0d54f6e4bc05013b283e34833f183fc441ada6a48a0560c8
-
Filesize
8B
MD52f07a1938202c1d88ff476f34e539881
SHA19d9d358ef8ac2945055ff66ddbbdffc73d0bd53d
SHA2569cbab7e8e3a388c91719c5bb9544b1455ee2c33944b6b06090ff29811db319c8
SHA512482e306e1aa3f933c2c0bf53ced862795cdbbf2ff0504b348991a6771d384844941ee5c6bf6978f7259678c55cc09eb31de96e05eed1dcbc963641c5fe5fa65e
-
Filesize
8B
MD52281d439dba34f8eadf0339294092b3a
SHA1a49e7696ed5798cfbc43aec966da2649cc88b9ed
SHA25600c458408d8b34235f8dadd27d55d37430f6d3447d2f3c87167a22b00d5b3521
SHA5126f560950d459e3a4118af106607d6cd42b8e9013c85080e6469515460f8f12c8a420e9697471dc28541404909f78ec9b84fae9f9e5979b5418878b89359f5a3b
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
380KB
MD529aee678b3d57f86e1b1159db1ed51af
SHA1f9c23af90a1b846cf39ceeb2776a042dad56f241
SHA256e9a2460d4e14afd61345adcf91f287a791a8218d3b1e3093b62a815212b62126
SHA5127f9e63fc0863c626d8889f069bb2c53be1f040e77a1212c3a90be5836729fd41df699893c380747ff3cd0be24d59851d6f80450f5b8aceb310345f89d2223324