Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe
-
Size
228KB
-
MD5
4dd70453aa7a3d53d0b0188fb4c798fb
-
SHA1
e92ba1890868b76f0afcdd35c43ece3475f728ad
-
SHA256
d7c6608fb7db4ccfb0aaa49322534e412147c41a14ce1e3c32285982952cc9aa
-
SHA512
47023aad87a0ae65a7bded7d95a78ec92e658a87363515c99efb5293de5993689fc261f14c8147e3564529720443619aedba3ffcb4c4e67827d7ebf86cdb9ed4
-
SSDEEP
6144:qoEdkmu85Dq+3qM3W7tfQN5/inEaMadDKNa1aILk71:gkmDN6M3atfQunka1KNaTgJ
Malware Config
Signatures
-
Modifies security service 2 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 1640 cPaner.com 1140 cPaner.com 2664 cPaner.com 892 cPaner.com 1340 cPaner.com 2216 cPaner.com 1724 cPaner.com 3048 cPaner.com 1276 cPaner.com 2392 cPaner.com -
Loads dropped DLL 20 IoCs
pid Process 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 1640 cPaner.com 1640 cPaner.com 1140 cPaner.com 1140 cPaner.com 2664 cPaner.com 2664 cPaner.com 892 cPaner.com 892 cPaner.com 1340 cPaner.com 1340 cPaner.com 2216 cPaner.com 2216 cPaner.com 1724 cPaner.com 1724 cPaner.com 3048 cPaner.com 3048 cPaner.com 1276 cPaner.com 1276 cPaner.com -
Writes to the Master Boot Record (MBR) 1 TTPs 11 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com File opened for modification \??\PhysicalDrive0 cPaner.com -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com -
Runs .reg file with regedit 10 IoCs
pid Process 1604 regedit.exe 1952 regedit.exe 2900 regedit.exe 1224 regedit.exe 2964 regedit.exe 2228 regedit.exe 2192 regedit.exe 1912 regedit.exe 1528 regedit.exe 2632 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2840 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2840 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2840 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2840 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 30 PID 2840 wrote to memory of 1912 2840 cmd.exe 31 PID 2840 wrote to memory of 1912 2840 cmd.exe 31 PID 2840 wrote to memory of 1912 2840 cmd.exe 31 PID 2840 wrote to memory of 1912 2840 cmd.exe 31 PID 2244 wrote to memory of 1640 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 32 PID 2244 wrote to memory of 1640 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 32 PID 2244 wrote to memory of 1640 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 32 PID 2244 wrote to memory of 1640 2244 4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe 32 PID 1640 wrote to memory of 2568 1640 cPaner.com 33 PID 1640 wrote to memory of 2568 1640 cPaner.com 33 PID 1640 wrote to memory of 2568 1640 cPaner.com 33 PID 1640 wrote to memory of 2568 1640 cPaner.com 33 PID 1640 wrote to memory of 1140 1640 cPaner.com 34 PID 1640 wrote to memory of 1140 1640 cPaner.com 34 PID 1640 wrote to memory of 1140 1640 cPaner.com 34 PID 1640 wrote to memory of 1140 1640 cPaner.com 34 PID 1140 wrote to memory of 988 1140 cPaner.com 35 PID 1140 wrote to memory of 988 1140 cPaner.com 35 PID 1140 wrote to memory of 988 1140 cPaner.com 35 PID 1140 wrote to memory of 988 1140 cPaner.com 35 PID 988 wrote to memory of 1604 988 cmd.exe 36 PID 988 wrote to memory of 1604 988 cmd.exe 36 PID 988 wrote to memory of 1604 988 cmd.exe 36 PID 988 wrote to memory of 1604 988 cmd.exe 36 PID 1140 wrote to memory of 2664 1140 cPaner.com 38 PID 1140 wrote to memory of 2664 1140 cPaner.com 38 PID 1140 wrote to memory of 2664 1140 cPaner.com 38 PID 1140 wrote to memory of 2664 1140 cPaner.com 38 PID 2664 wrote to memory of 2524 2664 cPaner.com 39 PID 2664 wrote to memory of 2524 2664 cPaner.com 39 PID 2664 wrote to memory of 2524 2664 cPaner.com 39 PID 2664 wrote to memory of 2524 2664 cPaner.com 39 PID 2524 wrote to memory of 1952 2524 cmd.exe 40 PID 2524 wrote to memory of 1952 2524 cmd.exe 40 PID 2524 wrote to memory of 1952 2524 cmd.exe 40 PID 2524 wrote to memory of 1952 2524 cmd.exe 40 PID 2664 wrote to memory of 892 2664 cPaner.com 41 PID 2664 wrote to memory of 892 2664 cPaner.com 41 PID 2664 wrote to memory of 892 2664 cPaner.com 41 PID 2664 wrote to memory of 892 2664 cPaner.com 41 PID 892 wrote to memory of 772 892 cPaner.com 42 PID 892 wrote to memory of 772 892 cPaner.com 42 PID 892 wrote to memory of 772 892 cPaner.com 42 PID 892 wrote to memory of 772 892 cPaner.com 42 PID 772 wrote to memory of 1528 772 cmd.exe 43 PID 772 wrote to memory of 1528 772 cmd.exe 43 PID 772 wrote to memory of 1528 772 cmd.exe 43 PID 772 wrote to memory of 1528 772 cmd.exe 43 PID 892 wrote to memory of 1340 892 cPaner.com 44 PID 892 wrote to memory of 1340 892 cPaner.com 44 PID 892 wrote to memory of 1340 892 cPaner.com 44 PID 892 wrote to memory of 1340 892 cPaner.com 44 PID 1340 wrote to memory of 1572 1340 cPaner.com 45 PID 1340 wrote to memory of 1572 1340 cPaner.com 45 PID 1340 wrote to memory of 1572 1340 cPaner.com 45 PID 1340 wrote to memory of 1572 1340 cPaner.com 45 PID 1572 wrote to memory of 2900 1572 cmd.exe 46 PID 1572 wrote to memory of 2900 1572 cmd.exe 46 PID 1572 wrote to memory of 2900 1572 cmd.exe 46 PID 1572 wrote to memory of 2900 1572 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- Runs .reg file with regedit
PID:1912
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 560 "C:\Users\Admin\AppData\Local\Temp\4dd70453aa7a3d53d0b0188fb4c798fb_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat3⤵PID:2568
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 552 "C:\Windows\SysWOW64\cPaner.com"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat4⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- Runs .reg file with regedit
PID:1604
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 556 "C:\Windows\SysWOW64\cPaner.com"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat5⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- Runs .reg file with regedit
PID:1952
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 568 "C:\Windows\SysWOW64\cPaner.com"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat6⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- Runs .reg file with regedit
PID:1528
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 564 "C:\Windows\SysWOW64\cPaner.com"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat7⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- Runs .reg file with regedit
PID:2900
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 572 "C:\Windows\SysWOW64\cPaner.com"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat8⤵PID:2004
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- Runs .reg file with regedit
PID:1224
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 580 "C:\Windows\SysWOW64\cPaner.com"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat9⤵PID:832
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- Runs .reg file with regedit
PID:2632
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 584 "C:\Windows\SysWOW64\cPaner.com"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat10⤵PID:1800
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- Runs .reg file with regedit
PID:2964
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 576 "C:\Windows\SysWOW64\cPaner.com"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat11⤵PID:2288
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- Runs .reg file with regedit
PID:2228
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 588 "C:\Windows\SysWOW64\cPaner.com"11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd /c c:\acx.bat12⤵PID:2468
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- Runs .reg file with regedit
PID:2192
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f8a9a1aa9bab7821d25ae628e6d04f68
SHA1c3e7a9ccc9805ae94aabfd16e2cb461fde3fae5a
SHA25676ee7c489d11427af94d0334368ef2ed44df4a74984ffd4022c9ea9fae9c41fb
SHA5120fb3a29367fa3c3eb36c6a7e9ff217ccdd7cce18309964aa7068a00f500ea4ea49588344ebbc52ae77d83e5042c3fdb84f56fa1dae07b8bb774aed6fffd18c0a
-
Filesize
298B
MD54117e5a9c995bab9cd3bce3fc2b99a46
SHA180144ccbad81c2efb1df64e13d3d5f59ca4486da
SHA25637b58c2d66ab2f896316ee0cdba30dcc9aac15a51995b8ba6c143c8ba34bf292
SHA512bdb721bd3dea641a9b1f26b46311c05199de01c6b0d7ea2b973aa71a4f796b292a6964ddef32ba9dfc4a545768943d105f110c5d60716e0ff6f82914affb507c
-
Filesize
476B
MD5a5d4cddfecf34e5391a7a3df62312327
SHA104a3c708bab0c15b6746cf9dbf41a71c917a98b9
SHA2568961a4310b2413753851ba8afe2feb4c522c20e856c6a98537d8ab440f48853a
SHA51248024549d0fcb88e3bd46f7fb42715181142cae764a3daeb64cad07f10cf3bf14153731aeafba9a191557e29ddf1c5b62a460588823df215e2246eddaeff6643
-
Filesize
384B
MD5c93c561465db53bf9a99759de9d25f07
SHA15386934828e2c2589bfe394ac1f03ffbfba93bfa
SHA25632eae568e5a03070b122719c66798a0574658b85dc61bcf3c48eae29f4d77851
SHA512bb0163e1a26f6b7cfd4ce214ae33a56e446fa74efca7682352ab52aa4b4d5b5b92a141e3e2a12b76f33827b1cd423f3d862cc973079d5da291832ce6a9fb9b18
-
Filesize
1KB
MD5a437192517c26d96c8cee8d5a27dd560
SHA1f665a3e5e5c141e4527509dffd30b0320aa8df6f
SHA256d0ec3ddd0503ee6ddae52c33b6c0b8780c73b8f27ca3aadc073f7fa512702e23
SHA512f9538163b6c41ff5419cb12a9c103c0da5afbfe6237317985d45ff243c4f15ee89a86eab2b4d02cbda1a14596d2f24d3d1cdf05bb3e5fd931fbe9be4b869aa41
-
Filesize
576B
MD58a0897226da780b90c11da0756b361f1
SHA167f813e8733ad75a2147c59cca102a60274daeab
SHA256115ff7b8bbe33e1325a2b03fb279281b79b2b9c4c0d6147c049c99da39867bee
SHA51255e0e0791fb8e76fb67511ef2bfe1bdb934c857a5a555f9c72dd063250c18b17c57ff9f220c0d3cdd219828d87f5c08bfe5e198476c9d38119c4cfb099b99642
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
942B
MD54cee92ad10b11dbf325a40c64ff7d745
SHA1b395313d0e979fede2261f8cc558fcebfefcae33
SHA256eaeac48f16abac608c9bb5b8d0d363b2ca27708b262c1de41ab0f163c39a2fb1
SHA5123f11992b0c8f7c6f0180f984392f86ea8eb1859be236e2bbfbc863226d3cac67b06700561f27fb673e2955c6ebc5b168dd28ca704de57c4f6c07bdbf14f75ec9
-
Filesize
1KB
MD5b99b0dc7cab4e69d365783a5c4273a83
SHA15fcc44aa2631c923e9961266a2e0dbeaaabe84da
SHA2561fc967a5c8f7859ba0c410978d165085f241195fe4a31d61a127e38c30d435e4
SHA512495474416f5eccd40829d42f050464903273d564cb862b1bd0657262485e634b5d466363cac085406c6d830f42a2f7b5648818b2efe6db1a90833a4b90a6a14d
-
Filesize
1KB
MD5614dc91c25423b19711b270e1e5a49ad
SHA1f66496dcf9047ae934bdc4a65f697be55980b169
SHA256cd2b70a70c7da79d5136e4268d6c685e81d925b9387b9ed9e1b3189118e2de5e
SHA51227a8649bb02ab6a67a1f2482662a6c690aefca551eec3575ea9aeee645d318b23d0dc6d5d2db239583ddb5f04ba13d94e5180a184566416291b7180fab0029e7
-
Filesize
1KB
MD5c1e5f93e2bee9ca33872764d8889de23
SHA1167f65adfc34a0e47cb7de92cc5958ee8905796a
SHA2568f5276e847b1c6beb572b1eeae20f98784aae11ea2d8f8860adcdb78fd9dca3a
SHA512482741b0df7bf6e94ba9667892fe12125df30812e21de40fd60dee540922da70ffb6db4a0c0e17346e714d4bb6e49e2d4eca53c0d5194cd888903071c82b8859
-
Filesize
2KB
MD563ff40a70037650fd0acfd68314ffc94
SHA11ab29adec6714edf286485ac5889fddb1d092e93
SHA2561e607f10a90fdbaffe26e81c9a5f320fb9c954391d2adcc55fdfdfca1601714b
SHA5122b41ce69cd1541897fbae5497f06779ac8182ff84fbf29ac29b7c2b234753fe44e7dfc6e4c257af222d466536fa4e50e247dcb68a9e1ad7766245dedfcfb6fdc
-
Filesize
2KB
MD5b9dc88ed785d13aaeae9626d7a26a6a0
SHA1ab67e1c5ca09589b93c06ad0edc4b5a18109ec1e
SHA2569f1cba2944ed1a547847aa72ba5c759c55da7466796389f9a0f4fad69926e6fc
SHA512df6380a3e5565ff2bc66d7589af7bc3dcfa2598212c95765d070765341bba446a5a5d6206b50d860f6375c437622deb95a066440145a1b7917aee6dcef207b91
-
Filesize
3KB
MD55aa228bc61037ddaf7a22dab4a04e9a1
SHA1b50fcd8f643ea748f989a06e38c778884b3c19f2
SHA25665c7c12f00303ec69556e7e108d2fb3881b761b5e68d12e8ae94d80ab1fd7d8b
SHA5122ac1a9465083463a116b33039b4c4014433bda78a61e6312dde0e8f74f0a6a6881017041985871badee442a693d66385fe87cbfc60f1309f7a3c9fb59ec6f2aa
-
Filesize
574B
MD55020988c301a6bf0c54a293ddf64837c
SHA15b65e689a2988b9a739d53565b2a847f20d70f09
SHA256a123ebc1fac86713cdd7c4a511e022783a581ea02ba65ea18360555706ae5f2d
SHA512921a07597f8c82c65c675f5b09a2552c7e2e8c65c8df59eebbe9aff0bfe439ad93f5efc97ba521be31299323051d61ead6a3f0be27302dc0f728b7a844fb2fcf
-
Filesize
1KB
MD5f31b2aa720a1c523c1e36a40ef21ee0d
SHA19c8089896c55e6e6a9cca99b1b98c544723d314e
SHA256cea90761ea6ef6fb8ac98484b5720392534a9774e884c3e343ae29559aa0a716
SHA512a679ce1192e15cd9b8dd4a3d7ecf85707ec23fa944c020b226172497c0b5600460558cfa9304ddf2c582a95e0fcd7f1b26004c8fba0ed9afcddc6ded770c85bb
-
Filesize
3KB
MD5117efa689c5631c1a1ee316f123182bd
SHA1f477bf1e9f4db8452bd9fe314cd18715f7045689
SHA25679ed2f9f9de900b4f0a4869fc5dd40f1dcfb11a3f50bd7a5f362b30fe51b52e7
SHA512abe34afa94cca236205e9ea954b95a78c986612cebd847f5146f792c00a5c58ca1fdc55be2befd974b5be77b1b117e28d8c4996f34b41c78b653725f21da4671
-
Filesize
3KB
MD5872656500ddac1ddd91d10aba3a8df96
SHA1ddf655aea7e8eae37b0a2dd4c8cabaf21cf681fc
SHA256d6f58d2fbf733d278281af0b9e7732a591cdd752e18a430f76cb7afa806c75f8
SHA512e7fab32f6f38bde67c8ce7af483216c9965ab62a70aee5c9a9e17aa693c33c67953f817406c1687406977b234d89e62d7feb44757527de5db34e5a61462a0be9
-
Filesize
701B
MD5e427a32326a6a806e7b7b4fdbbe0ed4c
SHA1b10626953332aeb7c524f2a29f47ca8b0bee38b1
SHA256b5cfd1100679c495202229aede417b8a385405cb9d467d2d89b936fc99245839
SHA5126bd679341bec6b224962f3d0d229cff2d400e568e10b7764eb4e0903c66819a8fa99927249ab9b4c447b2d09ea0d98eb9823fb2c5f7462112036049795a5d8bd
-
Filesize
849B
MD5558ce6da965ba1758d112b22e15aa5a2
SHA1a365542609e4d1dc46be62928b08612fcabe2ede
SHA256c11beaac10a5e00391ef4b41be8c240f59c5a2dc930aead6d7db237fcd2641fb
SHA51237f7f10c3d201b11cc5224ae69c5990eb33b4430c601d3c21f6bec9323621120442e0cfa49e1f4eda459ea4ac750277e446dca78b9e44c1445bd891e4e460b5c
-
Filesize
1KB
MD547985593a44ee38c64665b04cbd4b84c
SHA184900c2b2e116a7b744730733f63f2a38b4eb76e
SHA2564a62e43cadba3b8fa2ebead61f9509107d8453a6d66917aad5efab391a8f8e70
SHA512abdd7f2f701a5572fd6b8b73ff4a013c1f9b157b20f4e193f9d1ed2b3ac4911fa36ffc84ca62d2ceea752a65af34ec77e3766e97e396a8470031990faff1a269
-
Filesize
1KB
MD55bf31d7ea99b678c867ccdec344298aa
SHA12e548f54bf50d13993105c4f59bbeaeb87b17a68
SHA25652be521b5509b444c0369ea7e69fc06b2d0b770cf600386c9a0178225ccdd281
SHA5121bc82b65efe8c2be419748c8534210e7ad8cc8332ef87fb5df828eaebfdf630066ab3ad8d3ceeb82dee5ec4e680daff2748fcd4beaad8c71f1477b2ec7fe3564
-
Filesize
3KB
MD5558e454bc2d99d7949719cf24f540dd2
SHA1e9c772bcee4ae780cdc28b0b4876385639e59b39
SHA256677ec2cfe2ae99352aa12ac658d01a7bb0b51cf3cd2c568e94a78754326ca43a
SHA5125bb10dcf81ccab0b7e2274d3ccdbda5a38014576096fef71725cfa6e16a4bfd29f481f3bc5ad15426fb9918eeca67fff11291a88caf10974433214674c1c1b64
-
Filesize
3KB
MD5c8441ec8a2edf9b2f4f631fe930ea4d9
SHA12855ee21116b427d280fcaa2471c9bd3d2957f6f
SHA256dd2fa55643d4e02b39ef5a619f2ca63e49d6cc1e6513d953c2d9400d46b88184
SHA512b0b03828275f895adf93ef6b9d40d31e10f166d40c1ee0f5697aadcee1b6d5e8b81637ccfcf66ba9dfd92295f106cfac0eca2320b71a15ad96fdbe06f6764ef7
-
Filesize
2KB
MD5fa83299c5a0d8714939977af6bdafa92
SHA146a4abab9b803a7361ab89d0ca000a367550e23c
SHA256f3bb35f7fc756da2c2297a100fa29506cb12371edb793061add90ee16318bf03
SHA51285e46b9f1089054e60c433459eea52bec26330f8b91879df3b48db1533a307443dd82006ac3bb86245bbd207c1d8c75c29949f755cc0dc262ede888a1d531599
-
Filesize
206B
MD52d9f1ff716273d19e3f0d10a3cd8736f
SHA1b4ca02834dd3f3489c5088d2157279d2be90f5ff
SHA2569acf0b6f653d189bcf02fa9941a2a1a6b6f60c6fa1f62ad38f314014ec188623
SHA5121d08e079d12a58115ced67c002d383a4ff5aca81fde9ac81bb14d8c5dcdfe07839c7b895130b746d4691cd38dc74fbfc0bdc8605b520ac85bc137fd5fa922025
-
Filesize
851B
MD5a13ff758fc4326eaa44582bc9700aead
SHA1a4927b4a3b84526c5c42a077ade4652ab308f83f
SHA256c0915178e63bf84c54e9c942b5cc80327c24d84125042767d7e1e2ef3e004588
SHA51286c336086a1d0ca689e133df8e3c3ec83eeef86649dbf8b9d367c3e543358ad54f69d1a20d56c56200e294f22b2741186db0f359051159b4e670d3e9b5861842
-
Filesize
1KB
MD55f6aefafda312b288b7d555c1fc36dc9
SHA1f25e2fdea9dd714d0fae68af71cace7bb49302ce
SHA25660f6d3cbf831857bf18e46a43ff403a03e2035d9430a72d768ea9cec1947917a
SHA51297f0250ba79b008d7632a2f32a7b851d9ca87f116b2854d5343c120511cfd55551a1f3eb3e0959602656b39b3f86003a0f9d04243ceb8b73d28eb9bb9449a6de
-
Filesize
1KB
MD5e2d37af73d5fe4a504db3f8c0d560e3d
SHA188c6bf5b485dd9c79283ccb5d2546ffbb95e563d
SHA256e615959931f345e611ac44be7534d697c1495c641d13e50ae919a7807c8ff008
SHA5128cb17131326361071a3ae2997cdfaa316ce10c481f48af23fa526380daffa39b2538251cbaa4cf3bd9a9c0014a9184be5a13a44cf45fb93591ba3180670ddb89
-
Filesize
1KB
MD53bd23392c6fcc866c4561388c1dc72ac
SHA1c4b1462473f1d97fed434014532ea344b8fc05c1
SHA256696a382790ee24d6256b3618b1431eaf14c510a12ff2585edfeae430024c7a43
SHA51215b3a33bb5d5d6e6b149773ff47ade4f22271264f058ad8439403df71d6ecfaa2729ef48487f43d68b517b15efed587b368bc6c5df549983de410ec23b55adb1
-
Filesize
1KB
MD52299014e9ce921b7045e958d39d83e74
SHA126ed64f84417eb05d1d9d48441342ca1363084da
SHA256ee2b1a70a028c6d66757d68a847b4631fc722c1e9bfc2ce714b5202f43ec6b57
SHA5120a1922752065a6ab7614ca8a12d5d235dfb088d3759b831de51124894adae79637713d7dee2eb87668fa85e37f3ba00d85a727a7ba3a6301fbf1d47f80c6a08f
-
Filesize
1KB
MD5c2d6056624c1d37b1baf4445d8705378
SHA190c0b48eca9016a7d07248ecdb7b93bf3e2f1a83
SHA2563c20257f9e5c689af57f1dbfb8106351bf4cdfbbb922cf0beff34a2ca14f5a96
SHA512d199ce15627b85d75c9c3ec5c91fa15b2f799975034e0bd0526c096f41afea4ff6d191a106f626044fbfae264e2b0f3776fde326fc0c2d0dc8d83de66adc7c29
-
Filesize
360B
MD53a1a83c2ffad464e87a2f9a502b7b9f1
SHA14ffa65ecdd0455499c8cd6d05947605340cbf426
SHA25673ed949fba75a20288ac2d1e367180d4c8837fd31c66143707768d5b0e3bd8b6
SHA5128232967faaf29b8b93b5042ba2bb1fcb6d0f0f2fa0e19573b1fe49f526ba434c5e76e932829e3c71beb0903e42c293ed202b619fee8aba93efe4a99e8aec55e2
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
228KB
MD54dd70453aa7a3d53d0b0188fb4c798fb
SHA1e92ba1890868b76f0afcdd35c43ece3475f728ad
SHA256d7c6608fb7db4ccfb0aaa49322534e412147c41a14ce1e3c32285982952cc9aa
SHA51247023aad87a0ae65a7bded7d95a78ec92e658a87363515c99efb5293de5993689fc261f14c8147e3564529720443619aedba3ffcb4c4e67827d7ebf86cdb9ed4