Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 20:45
Behavioral task
behavioral1
Sample
31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe
-
Size
290KB
-
MD5
31e9d87c30d626d0c3428aa7985e576d
-
SHA1
8a61dc9878fdef695c32ae4e47e470504b437e9d
-
SHA256
2df777e0b0bb48d124644f23abe1de3a666461c106120fd98add3415d4aa05e5
-
SHA512
8a70bceee7fef155b91912896c593b7849ee3dab073c9294836d20f9389b39f01ec98b10a3dc6a2f66a2584d7b9f1f2f23957dfe6b847b804e880d5493dc04bf
-
SSDEEP
6144:WOpslFlqyhdBCkWYxuukP1pjSKSNVkq/MVJbv:WwslHTBd47GLRMTbv
Malware Config
Extracted
cybergate
v1.07.5
DJ
cybergatemakiener.no-ip.biz:43594
T07CB35LP4AYNB
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
WinSyst.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\WinSyst.exe" 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\WinSyst.exe" 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{V8657R3P-J5UG-N457-D7I7-0QWX08J01O1U} 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{V8657R3P-J5UG-N457-D7I7-0QWX08J01O1U}\StubPath = "C:\\Windows\\system32\\install\\WinSyst.exe Restart" 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{V8657R3P-J5UG-N457-D7I7-0QWX08J01O1U} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{V8657R3P-J5UG-N457-D7I7-0QWX08J01O1U}\StubPath = "C:\\Windows\\system32\\install\\WinSyst.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3584 WinSyst.exe -
resource yara_rule behavioral2/memory/1928-3-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/1928-6-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1928-63-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2060-68-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2680-138-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/2060-972-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2680-1430-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\WinSyst.exe" 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\WinSyst.exe" 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\WinSyst.exe 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\WinSyst.exe 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\WinSyst.exe 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\ 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2592 3584 WerFault.exe 89 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2060 explorer.exe Token: SeRestorePrivilege 2060 explorer.exe Token: SeBackupPrivilege 2680 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Token: SeRestorePrivilege 2680 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Token: SeDebugPrivilege 2680 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe Token: SeDebugPrivilege 2680 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56 PID 1928 wrote to memory of 3428 1928 31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\31e9d87c30d626d0c3428aa7985e576d_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2680 -
C:\Windows\SysWOW64\install\WinSyst.exe"C:\Windows\system32\install\WinSyst.exe"4⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 5725⤵
- Program crash
PID:2592
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 196 -p 3584 -ip 35841⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD59569eb25bbb3b1831ed4f804af5b9f6b
SHA160e28563be7c64d288a5fbcacbb18aa7055ee53d
SHA256d05e90cce38618a14c1c6e15daea8bb0a12b2aaafc39807743e5ee41e6e21069
SHA51219eb30c6ecb71ed19d87ea5ac75b712c5a915d0f2bc9b5dd80ccaf70c2331c46fb1d96737e42e8e25c1faf09aaecbdcc1e72e5d8f6aea2845e12ef7e2ab45bca
-
Filesize
8B
MD54a0772b193aa7c9dea7ca2e21ed701e4
SHA1319b42e2dae0f0ff5ce38e4b3985cba9bf8a2a7f
SHA256c338c69e32b2f68a625fe8d1ca29b7282ed8d4717be8936d0794743a8d6179a8
SHA5125aa624238546cf4833f6d5a35b24a689ec673b28d5e1c3b2463d53043eae17e29d1f3aa696fb572ee3f6246708f75d6139bdca4778039ba4be3388e11bdbb977
-
Filesize
8B
MD535c8949e387b8bd381e43b1ef3b61ac5
SHA17929c59f332d5c95c69814089cc295adb6266895
SHA256de044b6ff4082f9ac24c26855f71093c87b530c5ec18d31f2d8ec189592815c7
SHA51281f3a6e297bebf19b0c3d6113632538e09c28eac50a0eff8560118183cbf9648bd9675382320c382d3c906032bc7618689fdf84add951b51eeabe4cec7f2d979
-
Filesize
8B
MD557a3b4e71d68536fad32a81b7dabe3ab
SHA16d4edab189fdd7445f922d652c4e49237b8a2d54
SHA256dc6d213b2b307b13b53ac5ffef41fac6da16e9861974edaf6689f0968ae15722
SHA51274b1f846dba59660041764031bd6b73c18f0a9b98523f83958674b2917395316f97424498ee75853efb869036467741ccd7142543e374bb069867d9a9ba93388
-
Filesize
8B
MD5a72bdaab697f3eb81cfde95c6ae9efcf
SHA18385e938d4bec655824611b8b35d8a1ee163244e
SHA2563ef8b9afc577bb58a23a6d50fa4003153f8541181a2abb828058cd6c0183198a
SHA5123b4b717f9cdee84c031e3e7106387533f0e8875d592354f0e061cd3c3ed76169ec5cd106c8443085bd60c6de72358503d8db9f16f0049f6bcb02bcbd27493caf
-
Filesize
8B
MD58255aed5f09e33a79990415fd2100775
SHA143cc3d9eef702f07ec699c4d9d7c7051a041dde6
SHA256443909d17a7af9a32079a8dce27b1581392266d50ee2c76af145e3817aece6a1
SHA512e9be790a63f62a736e9eb5e8c8537719b9da4e09d3af1b14e83144f90f6575c1aa7ef5b7c1f2768cd58e3ea1ba62c603d2616c0b37a85c587223105a4f2725d4
-
Filesize
8B
MD56ff61c755eb9d0421aa7c08cfd5c3b9f
SHA13c72a642f7e94e24149ff0e974b77cb43b97a8a7
SHA256718a885b9f786bf22a3110e68bda50353b729885123cf69638d09576994b2fea
SHA5124b46db1a2b6c24592f249eb675fd77c7cd63fdf2bb3c5c7de3f82755ed04fa7678ff1e67a249b0f5f16fc1aa55058a1a9592e72f4e5dd5b4b0af1295f4370996
-
Filesize
8B
MD5abdac3d9db106e963e9bce82145c47e6
SHA1a6f844f37c3d265ed38538b3066c4826e1633c7a
SHA256062e26d04f9c84ec58962eccaf53a063d1b3f07136e88dc9b93f92eabc453a26
SHA5122d306d63eda8e9ba908e0e97744eded2e2227ca0b74db81f02fdde370cbeccf326087c878230136b72276ce5a0c2eeff59205a263fc709d9e32847dda829246c
-
Filesize
8B
MD5702a846a3130949be6ccca880585351a
SHA1dfc6a27641d05a243a112f7dd6a68cacf34d2136
SHA256363dc3a12117818db0f28a925cc9da72330ecaec60d548ee463568bdf8729ea3
SHA512615d64749c8eecf917062d3ade50f1d9249ff3f2fbb109a692a6a7b969c31e24fc78300a1d3cf6c4f867368b2d80e7c8a0ea620d3cb14c8c6c656d40d397d7a6
-
Filesize
8B
MD59e519379aba5ea05921e66c981006e84
SHA103cbdd631e80cd122638b5cf1603bbb4c57448a9
SHA25638e1a0fa0bdad66e2f8174db445904cf4ff2536f05a855b6d0d403e34b774e4b
SHA512e21848ea4f7b2db77acff41f40e42ce32c614520d709bc43b37c8d31aa0eb5df6554b0bbe61d787273ff9e77a1c6119f873675e3432224270acf9722096dded1
-
Filesize
8B
MD59fb7657cc274dae687b03b29209f4608
SHA1b1481070422e2903d4bd9d12aa18bf7eab04ebca
SHA256e197fd1f67579e079a2010647210bd910e8a1679f43f291473164ceb1f927cf3
SHA512c4738996479e24ea00943200190f2ec406ee270ccb45ede3d4f8b6339a57f1a6754cb5aa8d880ec4eaf097915b0a0623aaf1f7251807d6f54b2c59b66e320f5a
-
Filesize
8B
MD5dc9afd0c0bb67d73cb3c74f968533d83
SHA1a13e33cee4a619c30f339225326f4b475da459af
SHA25696b53e547963d36898257de6ddb80091dd72dbf860be5fde8b8693e0d6de3080
SHA51202a7f75a3bdffc82b3967154c489990b661be795dfd48597a8bcc26a51d2a119297e18f2d0d3d980f9d9a402c9c57bfa8462c9c18bdd145eaa636d53b94d29b8
-
Filesize
8B
MD579174a16434f6db72c25c5098e07721a
SHA17353e09d34b7ae8ae864f7a38cb3a56d5f2ee3ff
SHA256df1f3caff99138e016c95385c3a23776edb913c8a856a0c1dced861baa228b98
SHA5123b90517a1651e84cad086be0edb10b384426f3ade8338e731a34b8bf6efa26f46a021a5a3ff26cd8be1a45ac607415594bd04813f4a7c574fc62cad81ffccf5c
-
Filesize
8B
MD5b173cbd3fdf2ec59221966d800b736cb
SHA15fe5ed1321c76ddf94d1a39c870a1f8193d6ab90
SHA25639d56f54a30656386663748102889699a1a6f48b7a3e1f1a375aa664e34c2e00
SHA512610cb1f4ef4b9c4b42d1c0cac8bd034554df468e47c5efdfbbe538a33a3c5b86fca9ee2eea7140b34197bee8ac92b0f4b727c99b2e087a8d4f2bb90c2060953b
-
Filesize
8B
MD5c6acbf4dd13ce6b713a5a8c05addec78
SHA1d72fad3a560f309af3ab6962a8512ae3ad3442f1
SHA256e324c797eb791ac767504a3a95164ab35a7f21d5eeb42f1143525f84589f62fd
SHA512928a26d780f9ff93339fb49d8af6a5ea639186aff58b03eee6643d31c920afaa2acaba4981aedce5dbeb09278af5962afd035c8facefe5b4c97e3dcbf076ae91
-
Filesize
8B
MD557260888c009057134c2b734f2f22250
SHA1c940bb921090a2156d40ea7b197c7af18c0d04e5
SHA2560a4a0f7bf9649afffc622049a5579802d7b2d621eace64c56771c85757281f30
SHA512655e6ecbcb3dff6f2e4a5a2b5db5b421378c82994a496de623e1f4464f4b67b06cfce257aad315f42fb50e4e628f1c120203eb92e0b497fa35d0853b935874b8
-
Filesize
8B
MD5b35fe0068a00e1ff4baf7b96b41fb15b
SHA1df41dffbe37ba6eb13d07523f395a08c058f6fea
SHA2565be2c7fd811f8e7ae1f1e967218565328bcab4b35fc95f770b1d68c1b767d1ea
SHA5128f04dc4b7d7d51353d5e9c0c368ccab2539b9b04ed9a6b13d4cfca6bc640e02840da98b2694cfc5f7772b76bb1b86013eb913faa2f8c0c3ddb8a8a3dd0f50630
-
Filesize
8B
MD5f4693c23881c568a5ae3f544d3895d36
SHA1154bf7419b0e9dda732050fee6ac2e1e6bf55002
SHA256b0b4686d21599b63e017cb7d439633f6feae6373f113c4915d2816216cb43197
SHA5129f97618422439fdf35c646721188918661867bf610c53e90dbc575680dedacd10d8acd6f2ffe003c82db7e677226e9268e4edc5e4e4a32b6968a20da9a14480d
-
Filesize
8B
MD58b7d913a3791d7a9386b6cb3e4a31c0e
SHA1fccf158fe5527fa0819ff224abfbbdbc499d4ee0
SHA2569019690583692ed6f597c9e402f5580be8ad15eca91186fb8f88be73cfaaa3ae
SHA512d6a79d95411b0632a6c249f9c093b0a5fd4d4533fb56d5434bf395b1700d3ba3629077f6517a91018178309396d1eea266a6d407fa7a3737b606cecb81409d9f
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
290KB
MD531e9d87c30d626d0c3428aa7985e576d
SHA18a61dc9878fdef695c32ae4e47e470504b437e9d
SHA2562df777e0b0bb48d124644f23abe1de3a666461c106120fd98add3415d4aa05e5
SHA5128a70bceee7fef155b91912896c593b7849ee3dab073c9294836d20f9389b39f01ec98b10a3dc6a2f66a2584d7b9f1f2f23957dfe6b847b804e880d5493dc04bf