Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/12/2024, 03:17
Behavioral task
behavioral1
Sample
f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe
-
Size
290KB
-
MD5
f2098215b1e87f7619fe7187a2f88259
-
SHA1
01ca19de1cd3dcf13c4fe4cd177bfbe353b44bee
-
SHA256
478404477da02623774edaaf0be15c547d7c175a638a239d2674329e30bfdfc2
-
SHA512
50b7dee02fb00483551b553f8b7443b62d4e801471e280aef9a9c59a831cb40b1092470192896ba52ce3785ddfc6cd1a6d8b13b96b80016eb4e8324202f7a93e
-
SSDEEP
6144:2OpslFlqZhdBCkWYxuukP1pjSKSNVkq/MVJbA:2wsl8TBd47GLRMTbA
Malware Config
Extracted
cybergate
v1.07.5
test1
poiree554.no-ip.biz:100
T064M0DXN1884T
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Did you lanch the file from C/Programe Files ?
-
message_box_title
Hack by Zero's team
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\svchost.exe" f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{U3E183QI-U3OQ-1K5R-K65E-52162FGX6D7A}\StubPath = "C:\\Windows\\system32\\install\\svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{U3E183QI-U3OQ-1K5R-K65E-52162FGX6D7A} f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{U3E183QI-U3OQ-1K5R-K65E-52162FGX6D7A}\StubPath = "C:\\Windows\\system32\\install\\svchost.exe Restart" f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{U3E183QI-U3OQ-1K5R-K65E-52162FGX6D7A} explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1436 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2196 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 2196 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\svchost.exe" f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\svchost.exe" f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\svchost.exe f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\svchost.exe f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\ f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1992-530-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2196-861-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1992-884-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2196-886-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2196 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1992 explorer.exe Token: SeRestorePrivilege 1992 explorer.exe Token: SeBackupPrivilege 2196 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Token: SeRestorePrivilege 2196 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Token: SeDebugPrivilege 2196 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe Token: SeDebugPrivilege 2196 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21 PID 2108 wrote to memory of 1388 2108 f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2098215b1e87f7619fe7187a2f88259_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\install\svchost.exe"C:\Windows\system32\install\svchost.exe"4⤵
- Executes dropped EXE
PID:1436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5ab0af1f3e5397bf1de09aea194b642a7
SHA1386d0f0d15ca6107d553ffa7d992abbbaa63aeb5
SHA256341a308f5e7f775b2b72743ae9f1140d863f048ffb7ae5869eec094fb0516a1f
SHA5120d7d2db0ff63e5cdacbdde3fed0ef7b2ffdc0e4d3e3c2b4b9f5ae71541dd71a812dd9de968055e44c838f58116008f1a1d71b9b5b8281dfcc2aa9fd273ca5e69
-
Filesize
8B
MD5bb466819cf6197e6da6bd04bd7c84de6
SHA176a3249bc3518573effe3306c3d6185c34e0746d
SHA256de01a99b74880b6c21e8bc3ad650f98b935c36135be8fe6e8d16ec0ae56bbf42
SHA512ef6f52d2ed6f3562699e32141b74bb7d9448a076c32af2acd2a0447012244c36a159592a45cef36edbd25a7718b840c6dcf0e2d04ca46dbd929cef830db8481f
-
Filesize
8B
MD5cd4440ba0f30cd83d588a0022453ced3
SHA1115ee41641493f37ea16aea6cb4dc0949c9e904d
SHA256fb83dc7d05045bed50c96c8e7f2d0c859c5171b23a98573b4eb97190eb5889b8
SHA512d8ead44aa59b6afe7953ff258c360404e3557feac30123d54e5ca57d8659b8844185d22084461503c1459317d0f0823472047cfc3f989978c2b65196383d000d
-
Filesize
8B
MD5aed3fe59bfc7a6d4ee5464b7755b7edd
SHA104a3a17d9d0e60a74e8bd395bfdf7ec8d81a09fe
SHA256417d541e69b481baa38747904e4b3a86ff88c113816785591b51c9b4b7db9d29
SHA512666fad76dd30503d7cba3b0989710e10567b7eb2d3c290923cf3fcde649dec939ed9d9ee3c6e0364f871e5fd17d5d601ff36a84ebe04fc0fa480a0b3fcd1e8f6
-
Filesize
8B
MD5871aaf7641e66eea6c63a0c99b80765b
SHA1320f81a95f06d63d383d39e448b525564901109f
SHA25644f1bb2ca5c32ad8389a8cb9e1b9ae320cc821422eb2e460949f939cea8f4c4a
SHA51210eeb28c3973b873e28dc772df1da6b502bfa03631899dea90077df10b01fa1c840ed47e6e7e2272bd2a5fe80d1d9a199293d3cb9214c84bbee5bd1c1b2b8338
-
Filesize
8B
MD54db7f5ea9b969c3d94a01fa3a366d603
SHA1fcff85746dc7bde831583a6af09ca057ab127cac
SHA256cee7053c261285e75e637316dc8c6663e5d9d43ec368ded746c7a52ad22273f2
SHA512b0361ac501e932b776169db63e38a21db725bc0e5a635c57e0300fd31ae4a6ab6d59d5a6c9fb5eb92fb20957f03efc62a75c59ad31ce94f6f66a99604cc4fcf0
-
Filesize
8B
MD518d0c147cc9ce30741089847a12908e2
SHA103c5b07921808b435df9795f17c28546c9bfd20a
SHA256eb3ba0afa3df962721f46e42acb8870b7477e866e544f19c58773ebdca90b1d3
SHA5122f3d0e5c35ab02b5456e640bd76dcabf8d8bba83bff3b0aafbbd384c2c71d1d1cb9afec7541de2bde348b8316363592228d043f00c103b75ac67b163cbae5e57
-
Filesize
8B
MD5de1a9fa44ef86cd647b4788b48ce8cec
SHA181579618a05638ba558863c5e74a96d39109dcbb
SHA25672f603bb6fe0f03ed5eaebf3831b3f1f7cec7cb5e26548a4031691a221250a61
SHA51255e9804e3fd095f056c8fc3632327347666b1c7d6ecf18b828d0de537c0e504bda261c99b0565a0afa61ebf3c1881dad09821b82c0f07fb557b5738b806f7a37
-
Filesize
8B
MD5e226aa348c8b7d978dc6f71273ac4371
SHA17970493001a17d4d1098db7a31bff0f3900cb496
SHA2564eda66a81e05f7f8a8c4e9a490c2682131b3529d5b878114a3bc01b59cd6d32d
SHA51226e5e399dd206040d245eec847a5fae431764b74e1b7f62363aba4492a2b54294c13c71a5decf845be5c3acabd04037251c30c3a8436f57177f5f474653f6da9
-
Filesize
8B
MD523a24cf4403a446ed4084b1fcf624d14
SHA1e942af56623d7741e68a74952d7477c6330c1732
SHA25604b1852829a11e848241b8d47906e4087c7b4d7edb0ac90574a8331ea40f5c1c
SHA5123da1fd9acc754b77093d359cbddae48a90f64ab4168f3c5ddf622f07067e3b42fe67e62975cfdafde9ccefdcfebe9687083ceee10ef569a13ab0a1116fca01b2
-
Filesize
8B
MD557db81206289be781b9ec8ead5553ba3
SHA17e4664567c6feba3979325d2ff2f4d8da72a8637
SHA2560a87e47318f4aae614eab1f32190956c173ef9499e70885386a53fa01ce9aa67
SHA512f12eb42cef877388c94e397c1da4b0b3dc73f5ced82ce670a031296c1e37f9e9ea52a8a27844f1612d34a3848c4d426eb885e74acaa18d8ba4c1b6782330f23c
-
Filesize
8B
MD585f4e7307084a79b70847dac39caca7a
SHA1b880847fb976e0c4d90a678f20892933bd3e507e
SHA2566061450e4318a39597b35a82ac3a4a851b03780dd35efccb8b30be6f88acfa85
SHA5129ee2cf15ddf136afcc3fa2ec094d56b7faff2f5a389e1203e182e2adf1f1ee211dcb01db640bac0f518f99b0185eaa42c805c91f222bcb45faec3ed26f3081d2
-
Filesize
8B
MD5ab020350330ead6a16a326f3b084be7a
SHA10a4d37ac8d0887c0f86881b1e4035ab2d6e37d1e
SHA25648a98c0edf3bef2b2f98ca962425da6ebec1e5527cf1c194f6fb9e9254cc80a4
SHA512c4b334e0ad67511d71e42c831221939cd46cd8b6956ab1c062b43141f69d0dbabd33fca64cdffcf8878477f53aea80cba0994abac39e712085d4d21bd87236c2
-
Filesize
8B
MD5f8884ba6f1f7926b9594018656350d21
SHA1b77e1c4dce87a441cf5179fb748d285893958796
SHA2560ea24957ee0c13205a3d57946c3e3e5b4141111b57deabd18ee381b471477ce0
SHA512294dc8279a8d6bf88a4c9fa6a4d928a1c7d5ca6f5f1c0159afe2a2bbad7986951db5e65bd7de249756abee7c3c952772358f619981a10997ee3327808a1456c0
-
Filesize
8B
MD5587e17bcf8ec0275429f80601622cdcc
SHA182d73ac6f5dd4758e3807d97915f162c37e454a3
SHA2566e7f5bc4754a5158222507127c9832b107864188ff5ee19f2373be2d230ee70d
SHA5122c48c9e3fd4d90539e14d544cfd2919ae27427929a15e926e7af04c4939beef845457cfaee732f2f8f5a4fd0b3a929c9de9dde917be189927f0d9a75debfd6cd
-
Filesize
8B
MD5586a497ee57b8c1ca0604200c7f699dd
SHA139e51b1675e89d5f00f5a5ca6bf696295ad871c3
SHA25615fdba1106b612c3ebcce19d60b370acef2127cb341b69f691f9bd1bbabefddf
SHA51298fbf25330c6919f782c869272fafe6a2c19db4a11d8adb075e2f5b73aee39308b4f94f85332fb3b715a9ed88a1145729b3794d1a6fa1c27baeb2ca0ba405ba6
-
Filesize
8B
MD56612383e3f3d531c11c4c93df376b55d
SHA1998570b9bd4df6f3c449ecdc29bbbd14600c7504
SHA25629a767c4e308f43caef8cf55f4eb05d865047cd7a0ddcad3bb94f36f17d0b41d
SHA512221cf83f92846842c51e1edffb1edc0cfc777057b9e5edcbc3deb8c46897d4bcee87436aba95fbf9df03b9369030014f49645d20621b62b09afe94dbe2744c74
-
Filesize
8B
MD5a37b10a7a97ecece20c32d567df457ca
SHA16c403063356f970477c2a2ad94dd0eb5c924a1a3
SHA256fab1e28633982977b7258255db9ffd00b6856fe5e0214fe3117913a4f9f3b4fd
SHA512b57c10f7930108c4e2d62e8910ce7132a2998898c608ff8c0397d29e44faf39e5fab7591ce1118f048b6b1105f727f97d166b4427504acc17af7d95955bb7eb3
-
Filesize
8B
MD5a2c5b4febeeb57ba4bc7f8ed5b0105ee
SHA174498523dd591ca4a9e41171f3edbd68f998b01a
SHA2563309cc79edded3037ed1b7c3d851abdbdb768c4dde103c15f0f72c780c294951
SHA5128d4b2160fa0645d3cc41907da392d47f6edf36acf2224bf5fb8e19c2cf716740d52c0abebcede7845ee99bfff8f2efce39e2e9f1b5bbcc6ac17521c115f572f8
-
Filesize
8B
MD5d0fbd79bfa46fc85267f2676c1f56633
SHA184d307cf6a3bc24903e1b2e4a11e3180f4d6ade0
SHA256c64d9c02de6de694507a11dbe99db1dbcd04473eebdbcf81e4dd22fa12401caa
SHA5122185d6560bba3cc2ea41b3e2dde4e0e241c3bcd65be9b9608a6ce6a3625cc63824fb4e1202895c89cb2d3c12076c525fcca85a4970ee997a5da4832678c29b58
-
Filesize
8B
MD52ab8c1cf51463d9758970e24dca125cd
SHA1bf3f31304c4ed52836dfc6f3642e5b4e656012d5
SHA2564eeacb7b5a90c6734f757940d7ea17986d23ce599df688e6e2d1f890780b68e3
SHA512f46203fc9c14f86e492de0fb699b820fb7752ea51fb449de5859ae87845acb6c42e7ae88fa1d560b837e619b35403647ed6d40611c2452d16af650d93c015f36
-
Filesize
8B
MD5c39dad48f06e0b99f2c68d95bbe67ae6
SHA1ed0a347d7bfbc23e02ae1848cd2ee663b859cd36
SHA2561df34611b58e8e21ad566a58c799088454e661efcc8edc37af48530aba33d10c
SHA512995583f495e7ece2dc40df4baed872afe84369b345349cb55d5f129a64930753afb69433d968c310e2187fc83ed4309239587287a50a93d938bc92545554fc41
-
Filesize
8B
MD5b9bffb75dfe9df919b3193a8d0c8bf0d
SHA121bf724ca38cf67cae21d7e8b42d34baae78f00b
SHA2564d6e7f61e606485399329c77ffddce2968dea820883b758f8c7b439ddba5c71a
SHA5122f31fb4b37aa4f1e5d57109b1d1efc59af79eec314664620fd3fb0db9b11167a9ff6eb0d251cb598d4895b42044c67be564ef1692aa7d115fdef1199c92a06cc
-
Filesize
8B
MD584b12e5f40971124bdfada314a923f60
SHA11b16c09dd6f59426e4238b1c914501820a9f9fa6
SHA2565c541457e4156853c44618887528a2df25bcab4a2d8cbf8294cfca8e5379d025
SHA51222a93243d37b464352d87361223585b5827e3ecc88cdd0abffa2ba7e8e9830001ca1c5cdb3a4053601d124a86873d1e12d509cfb89ca07ab1ec9465cf1902e20
-
Filesize
8B
MD5959b8d0ea426a5de6302ded6623ea8f7
SHA1c6e2c11722c9391a75be9d902cc4828989409ac7
SHA2560d69944021fedd464eb7ca50ba10c9420ab0f1859668a32087c139e4d4040bbb
SHA512e8d48d6016276cd449d4ad9282c749ee81f0e352b2884c47eb905ccaefe68ee3ba6201bdd5bb03942bd291d27a1c66eb6111f4088a305979e623ecdc1421927e
-
Filesize
8B
MD558d0d6fcd87d16acce15cb2f3585133f
SHA1c7c7c699f5d84ec0fab385de6f8b1b579d2e2cea
SHA2569ab7c12a3a5fca2bf790c23e7ac444693dfaac1e1461136ccea3c704a8dccc18
SHA5124ee8ba36dc1a1e7abd42e137c701a1894bca9a59b5bfaf67f6d00fc9e0c82210a5a0be82e5a285db6ad60d539e4a35b6cea4f0a0b10838c168eea1c58c30c744
-
Filesize
8B
MD559b1b53df93e9629381215ddf8610ad6
SHA14af23b85251e8c7c31d6ad7cc791f0b6f78f0f35
SHA256b83ae6d04b3c9241a554295471b6881ff891d6ace8aef80c5924b06a14c57f24
SHA512fc64c9df553723d5e7e10d3f56755316645deeaca2ae9290acc92d0682f03d936dc4ffb5d4fe577db75a504bb41887e3559af60d0005c502e8e0519ad2f57890
-
Filesize
8B
MD58ccf3042bab4d4e12985edcb78dd7250
SHA16037da6ef267d7d0b911c004b710c5917b14328b
SHA2561f0a2b74ba9e307b467b873e2334962aa2476a1c62affcb914c19d50e3338cdd
SHA51267629b1e4b6bcc6019853b1ce89d83e4b22fc3ba1052920946cf3d7c9432a577f4f9b34a2016c242c4a07736ab566edd347a4d9e0ff6d9abf19218e9f7250ed5
-
Filesize
8B
MD5644047a5c2b8274b0de721ec0157b39a
SHA13aab9ded6d86ff71b996bc3bc96a2eab7d5a17f0
SHA256e3c7b7b91f431c1fff6411f8b5c128f0ee643bffa3fd236442a7990b8a2a0c41
SHA51227aed668045b7f8c74f218118c35be329cace8326f3d39cc00c8e4b2fd38a4cd65e2d648e51d0b0222377907790abb4392f1e8f9de911d47288e8f110f3565a7
-
Filesize
8B
MD52fba4a608b81572bc8babb93efcb5315
SHA144fdd03eef6432fe92915e6a66792b4ae6653925
SHA25621a190480347fdc381f43f456c597e795d18f7cf56d4df87d97d140534476026
SHA5121911cf857b0f972fc2f37022038d2e78e3006570d9d0a82e95b9a9aebfc4c24276cebff1632c8ca6242257128b4b16a1474db97ea8656daf73b356220e7bbedb
-
Filesize
8B
MD556e9b9d0171bc3a653632d2b5a5df2de
SHA1127acef01a492c4a368816da352be283c1a45445
SHA256560d985157e5c789a3f65754729ef67ab9f1093b1eb882f7805864db12019387
SHA5127eff35c22aed86544d2e9cd5ff14c2dc29d311a01a834dff07dd88e3a2f1ed17966676e3794ab86bf4f8607279c70bcef01de61c5b7a58a6d6f7601611d90886
-
Filesize
8B
MD50a84ce417a0059013ab0261dc8e2fe6f
SHA15533b92f408b79b706efac9c0f66decd25915c0e
SHA256f8df0a05a6b05e65d51f1771442e5abd9bde905abd9a16e1f75c9ebcc719dc3a
SHA512c7f031faeab60196dd5c801cf5121ddaf8198b4f3af6bd691eeb6cfd5386622df5258e0df064962155980f095b706a3f18773879988dcf9e6e37bf42c23466f1
-
Filesize
8B
MD528fd7160a5951fb64f92a3222bae4773
SHA10e79ee332bd777eac7b7b887d02a14a2fa50b229
SHA2567da32d66665f8659dec82ebfebb7d294cd6687759aa5c981f0b72dfed3ed0990
SHA512aed216990f1e7fdb43acb222b8ce2e8cdada888b96d1ac21830b7b011b02af61c62c705df22e38568e0ece3e8db57cba150c85053b8dcf4db003925e846e0989
-
Filesize
8B
MD59fd59584385c09e94310f08d3a05ae3b
SHA110d9a4474d0db9737a48d75f4bd52bbb10ccd889
SHA256a797b51a3769088e158bb076060abbd92f3b6d59700dba97d78580bf5d130c5e
SHA512e56b90a78950239cd3e9d0b3f451e40de97ec32aa9309994c5406bc6a2e6632aafe332e58cd9010fdd6d00b4eb888a75d99d120cc46b478435fe67840b5fb3c5
-
Filesize
8B
MD577beb824fdefc1ceed121b69a986e515
SHA11f40b41c59610c69a4b673432c11233dab32ef85
SHA2568ed54f3defc92487a8555ecd16d70bf2a207cff3b17301deb9d11584ca220949
SHA512db19dd619146168f3ff18315c925d56a1f379dce7fd7bbad8fb699025decd6c491111805fc605519616c53ec7580eb2975ac7735a64dd7f012412796e84521c3
-
Filesize
8B
MD543666e4523b9dcc3464795257d374c59
SHA1129c47621200e5335480231dc3414ad2ccba8d66
SHA25648913ee44cc3cb356001a598fc66b0bcf6f5b04f1d6543f40766c75bfe1728f1
SHA512ea43fc9a37fd239d15fba521948e64b54d64e4d7d1d2e8483f78433b826fcc04aac116ea6af43b3de91f8086e38bc24bc5b41ed3913b3bfba2b086e663b605ef
-
Filesize
8B
MD5f01620abfe575579c156a6f35c797381
SHA12e53a4533ce5d05bee1d5f8c9b3f4fa21a1306a2
SHA2562dd0bc6b1acd8607b030c9be01a4beb2b3edb45dac4e10a37347aeafccafed44
SHA512e09e44b1243702515dd9e7758dc864e671ca74d44d2accc07bede3fdbaab9f053245e2fac530dbcb3d75afad5855e0b8d807f91d471b3a22fd9b2f67a057c6e0
-
Filesize
8B
MD599f21135749e93bb0eabf179cd5a6d13
SHA1459e2e271a0ffc419f71bac1b3c90ca19cf14a3b
SHA256d35efafe1db65b395292ea839dee1c5892aecd07f85d151a0e46b48965ae6987
SHA512b4ea5e51f40540d14d1948bd96e3590a5fd245ee4990ca4c58fd79c02674bb3067f545e3ec68b050f26f21a838f7c16b397b45b1d05507dbdef7c5a73adce4f2
-
Filesize
8B
MD5ba31bcd427d0272b1b62618361c64a01
SHA1951fd36072dc5caa660f00bfa6969151b447db95
SHA25604ae27d369761adf6c8207c23474c24d91d6ca6ee6c1aa0dd8a658731f04e88b
SHA51202746c3d99efdf18c77e306ce16f20357a4dbd8db09469bc5938628bd89d3a0845dcca7ae4150f812f7ac513252f8d42efe55e435fa72d65e82581e5c18df820
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
290KB
MD5f2098215b1e87f7619fe7187a2f88259
SHA101ca19de1cd3dcf13c4fe4cd177bfbe353b44bee
SHA256478404477da02623774edaaf0be15c547d7c175a638a239d2674329e30bfdfc2
SHA51250b7dee02fb00483551b553f8b7443b62d4e801471e280aef9a9c59a831cb40b1092470192896ba52ce3785ddfc6cd1a6d8b13b96b80016eb4e8324202f7a93e