Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/12/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe
-
Size
308KB
-
MD5
f229b019f5269652769ffeb4617fda45
-
SHA1
40bae77fe6c9484f16ac89dcfb39042b799f3477
-
SHA256
b40563d05576ab1f1f750ecdad99546dfc0f735c56ff72cad4154173426ea305
-
SHA512
4c0a10ebd155d094ac2bb43c1170f6ac2e925edec7a34aa49d15d43cebe3f2f2482c970d07382ee75c477afdcb72bbe5bd1d2f6d9ff802089be7c2fd30d37fbc
-
SSDEEP
6144:vEesJwu/9HNrvNp8t4BjI6Afv9yb2KLoYPz:vPV+HZNitW5BH
Malware Config
Extracted
cybergate
v1.07.5
Slave
kaneizbad.no-ip.biz:100
UP3707H7I458TT
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
pics.scr
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
482_4001b
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\pics.scr" f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\pics.scr" f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{R1DBLO43-X24G-NPEA-F82W-SRD86A86146F} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{R1DBLO43-X24G-NPEA-F82W-SRD86A86146F}\StubPath = "C:\\Windows\\system32\\install\\pics.scr" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{R1DBLO43-X24G-NPEA-F82W-SRD86A86146F} f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{R1DBLO43-X24G-NPEA-F82W-SRD86A86146F}\StubPath = "C:\\Windows\\system32\\install\\pics.scr Restart" f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 2852 pics.scr 2760 pics.scr -
Loads dropped DLL 6 IoCs
pid Process 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\pics.scr f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\pics.scr f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\pics.scr f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\ f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 -
resource yara_rule behavioral1/memory/2820-39-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2820-40-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2820-38-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2820-37-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2820-33-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2820-29-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2820-27-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2820-45-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/2320-597-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2820-948-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral1/memory/2320-955-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Token: SeBackupPrivilege 2320 explorer.exe Token: SeRestorePrivilege 2320 explorer.exe Token: SeBackupPrivilege 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Token: SeRestorePrivilege 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Token: SeDebugPrivilege 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe Token: SeDebugPrivilege 1540 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2676 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 31 PID 2796 wrote to memory of 2676 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 31 PID 2796 wrote to memory of 2676 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 31 PID 2796 wrote to memory of 2676 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 31 PID 2676 wrote to memory of 3028 2676 csc.exe 33 PID 2676 wrote to memory of 3028 2676 csc.exe 33 PID 2676 wrote to memory of 3028 2676 csc.exe 33 PID 2676 wrote to memory of 3028 2676 csc.exe 33 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2796 wrote to memory of 2820 2796 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 34 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21 PID 2820 wrote to memory of 1220 2820 f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jauw4vo3.cmdline"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFAE3.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFAE2.tmp"4⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Users\Admin\AppData\Roaming\f229b019f5269652769ffeb4617fda45_JaffaCakes118.exeC:\Users\Admin\AppData\Roaming\f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1168
-
-
C:\Users\Admin\AppData\Roaming\f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe"C:\Users\Admin\AppData\Roaming\f229b019f5269652769ffeb4617fda45_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\install\pics.scr"C:\Windows\system32\install\pics.scr" /S5⤵
- Executes dropped EXE
PID:2760
-
-
-
C:\Windows\SysWOW64\install\pics.scr"C:\Windows\system32\install\pics.scr" /S4⤵
- Executes dropped EXE
PID:2852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD51d171c6bb7bdeaece71a5ac4cb428fea
SHA1270b2e7a93e36c0e388ea2ed1436697adac7d424
SHA256585eec3834663366f50e5162ded0d6c1edd3eb081501ce099dc5888d6e6935d4
SHA51268971b8f0a9c6bf886aba3227c0e7cd98308fa4aa3ce8620462fde12133876169fa247d2d156561f49925a8cbd497afd3fdcd282df4a980d4adda968080400e1
-
Filesize
8B
MD5ba2d424a6123959ed6cc9ca58bb40f65
SHA150c274088d767a321bb932b4a0470938d869c2e8
SHA256c18b6076cc08302afb9e2969ca8140275b2b064197b5f515193f61ecb0a76906
SHA5128e3558cf055880851b3830fa55a17ba2c721f34ae3afa2883b95f9861b1ad2ab00dfbf6615ce47090cb3e98aaeeaa40d4a15e6d904ef799b7492b6698171a9ec
-
Filesize
8B
MD53d06c63997d25166a3efc0b5cf1ded10
SHA140364dadc3b7a5e12d21bd31483942edaada00f3
SHA256ef97263e34b698519f98a1ca278f8c3f5ac1f92fa4f799f6ecae3ea0dffd8614
SHA5129245a6838daf4b31c50de9803d7698434f90a369be3a0ba29a69e7e63c8aa7947f0ed16d5a918e361ba6353bc7a34aefe3156b0b3e9127679c0dd262da5990f1
-
Filesize
8B
MD5dda43c8ad086c430aef54f6f2d0539e6
SHA1e0c7e274a1f03d7b39a6a754d4fd495ce69651b9
SHA2565e68a82676243e8c399a9ab7671cd1f50905f053060ca017dbc65fbb5e718e02
SHA51211265339e01754340034d7ac8650f954618c34c14dceec100a9482ca944d4f8f4933d302adafd8333f1b174984e71c186a66c01fa556bf0d5f3e6100daa70684
-
Filesize
8B
MD50a50dd1d1dfb266c470b924d533e546b
SHA12da74b64182401fed31a55db8b033eee2f2e8a3a
SHA256e9f96f2a151614699a85e4b3bf50a9ccd4ba33614218f2b87f98c1608d1d50de
SHA5123e1e16134cfa6d4850ef8f1e9355edc4ba25d33ea8f82385579ea04d3120fcb90078fbfa767f8db4a2125e6f82d67dcf3544b4877edcabbd4b11ea1bdcd6c3e5
-
Filesize
8B
MD537748080cfcccbfbe6727912906f274e
SHA1dba3d9b46158835f90ba66b472931f6d90e42d15
SHA2567710e1f693fcb79ed1758ab89ec102c3a6d0c30ed1428414a50c373c8f4dad96
SHA5123f41db221c953b0605f64bfef9238ab07b83fc1d04187e67c141ec65c0833450d8d8068b1d0ea167dabdf111e1cf60789c379d8b235c98d0b99d8dae7f985642
-
Filesize
8B
MD5b548e1a96ab35f45c3ddcb7f7e4c77ab
SHA1ec790f6b0dc521365855deea2002dd177e17d7c0
SHA256021c160a018c5c80bed564807e8e2cc3f7f6f5002e54aaf0014931adfb2be1f6
SHA51275b2bcee077889e83ed7501c32abe341ca7ef80bb2ab39526a31bfe022b782895231403af6a81ae1f6e4875f114a306139e8b5d265102c480c7229af696b749b
-
Filesize
8B
MD52f381157fc893df17cfe96f6bf31d1f9
SHA1b57582a91449f96406bf4e4457da976454d807e0
SHA25698fbe8e6b33b8bbea8b0d6509ae8a108b3c2eda006512d037be4e037226c3cc8
SHA5128fb3d6a891882db2f68005a0dc06c02cc2b67e6cff54906d2240f7c5f6534ef816b71d3b645413b50d30bd8b0dc514f85b321b39cffe47873c7be7fd629b0ae9
-
Filesize
8B
MD5aeb470dd9b75373e261788ad6432295f
SHA1e0d8733c1a8dd30f6712bc03ef456a4c8b9894cb
SHA256aa30048b24615512a12bd902ae7a516d4af579944ed132651dc9bbf7aa6aaf0b
SHA512b6808962bacfb47aea2de828fc80f383d6d2d3e591081f5caeffd367dbb9003d39a96824c12ca2929fac032ca4bc91edf30d4384981bb659f36ab4f1eb418f68
-
Filesize
8B
MD5829e2314b71d6df5bf907b12e49287b8
SHA167c69dad4f19116a6eb835fef38c81c6edab6ae1
SHA256a537b7d52b7b84713298f7439594d006a8299501edc3d4833979407f6f8ab473
SHA5121c07f916b5040d3bfec5b21b263ab79cafa368c591b92ba54fb0d8c416aad31ea54cfd26e15356a551bf2b11e85f7bbb0c6c440c2623d9ff8432e4fa890de463
-
Filesize
8B
MD5a7c0815fe346f0a1eb0d71c0abf6b4e2
SHA165c589a6f499675f0cb267bb3cc62d9d202e8e44
SHA256038fc4bd4f2f7b58d7444a81736b40377406140c9b3a9d6fc65d81830cb9902e
SHA512a7e67cc007b16979209dea6401fc547156e39a5a3e4816f145cb7e2e8c8103b6771a9b334f73b837bf9bc2df1f0134928515460885795cdb77802b55b5b94614
-
Filesize
8B
MD563afe4268360a0a64131055e0f92f954
SHA1be525aa1de5f958f4913e0488b8daed4da5e1702
SHA2564f3665c9740169765971cc18e5f0e5c8316bd2008aff2ca7317944e668909416
SHA512054a411be3cea4dfd77c5545f724744e1cc0364bcd457fb43d3d566a395c22d6c6cc57bd42ee235f9a193a33afe89999ea5caef9a14f88a1bac3846f72a07bc9
-
Filesize
8B
MD5588c6f1f783d8edc173b5f1f14eec6aa
SHA118ebc23d3cbaa34e39ead0443fea368bedbc2b3f
SHA2567b56f67037e161fe80f70178c1528c7580198f96ee7f3e635d676cf289d4cc9c
SHA512bd5992cc0c1641deb175b119e111ea04f1c068c4e95cc85183767a914473f68a7dc3e3f035de9110dcae2586edcca79b44e90af2e3acfe41c7179dbfab48dfb6
-
Filesize
8B
MD56fab9c40c2e151e51528cd314f688fa8
SHA1296a82b120117566275539f571cdeb426aa411e0
SHA2561383bf17f9a32848d36bf1c29772217c39424a94109e2afcc53a8fc0c486fe44
SHA512f3003d7e5b07724b0c39ac504e9ec1b860e434a4e72c6ab37b727a5fe5b196719359a9093fdcb3e45c76f816eb0577032615a967adff5042cb0f10baab6addbb
-
Filesize
8B
MD5fb4035e254c703dbd502efa56ef6a2f6
SHA164db6baadbeacdea83d4190dfaed10115f233198
SHA256f9d5939781373258f69da7e9f254d34c2c4ce80bf25d19e565ea00fae112e054
SHA512688975a3f4c7354878ad063921e1f85caec0369a23388b8fc69fc851769e237ee5656764eba174be3bb88aece6aa685db0118e0b7ed544047372cdd6069c3949
-
Filesize
8B
MD51d74a897eb4ffb7601de671a7970847b
SHA1a96c7ee64b54f40b68e47e9bc2dd30f56298c6b5
SHA256c3b363eb50eb8ea1a04bc6a6ca5e29a0c209c71c5928c548e7a23e24d3e53d67
SHA512a04ae193a359610fde9472ab0606d8a25951baa20418edc7182df35bb746dc512af8a13a45cb375289eb34aa1699a41e36fdc9475513ae88f71f030bbb3acfe9
-
Filesize
8B
MD5f852188bb03a932b3977f57c1a828660
SHA10c130e8d0e35a065469d2f5d9f4d7d6d5320f2cc
SHA25640c62a079b2f33ef70a03e704d47609fb2f7af2e220e8a5412fecba1fc3dea5c
SHA51239fb4f02b707860268acf7dd9a69c9e7812b924d52e9e226608dcb53de9d56888fdf357be2979712086fff66328e56928fd787ac3dfb11e149b7b429ca69d7bd
-
Filesize
8B
MD504ec637d039f8b74e3aa08493963cf50
SHA15d2b2c0e72870e35f1f6ae17b1a9717f7b5e37cc
SHA25603a95606f9308965a647f033404761e46b54e77f96b72f26576879a981b9f380
SHA512150d036ebddf6450e422050309b360b28c0c459a964b34d7814faacedcc7bb7d5de58f1f2e649cd1295a618f9a02d727a8bb0ba00d83f458e520d3d86f09aa33
-
Filesize
8B
MD5f9e20e215bec9ebdf0962271ecc6dcc8
SHA1a1b9a1b1846fd194527ffa31ade728619094f5ba
SHA2561f73644cedf7ceaf03c3ba2b827a28ada5597080527a9b3ac1cfbe6a8a3f9afb
SHA5125121d6f18eef32e34c5a608f99bf7eafd503d9e094eec38c77c243ab1b60d9e33e8d64f1c19796dbc301c7c73920a7dfa86137d9a172ab0b0363991adffc7911
-
Filesize
8B
MD570bc3daa2ea23e5252a75b41f885f75c
SHA14b0109f98799128194dbe33dc8b2696542425d62
SHA256999d110ecd8335081eade08c339d93ac4b1f20924effd5ef58686120c3e48d15
SHA512a36830d5ececfd690b45a187fc0a05985446913f3e136aee503244577b91c4543e6e1f9b0c19effdc36f9ba406618913c3ccead4f4a095da5e4722aaafd00346
-
Filesize
8B
MD5f12528545476a851cc0bcbd3c976516e
SHA19e98d57eb59a8b343112be76198385bb3689bcdc
SHA256fcf6bc2bfd306e0c81035d9f2186f005fc32cc867d107819fe150718772b1824
SHA512ca91bb19937ae065ff8953186578af17449e5968d33408f4f0e2947637ca6724657cfe6d4813f2e93f62242c38b232d0bb63d8fc35898bb1f9112d239f6e9bd5
-
Filesize
8B
MD5ab4e7cb832519b45cb87f5ba2e3277a5
SHA1ed23ee09a4b89574eaf9853dafebf6fb8d59a355
SHA256b621946d5e61b7a81675444a22e171cd66546c8125cf9a176b948ef24221a5b8
SHA5121bc6bec892bc113168bd5d8a6b8d778796605eedff7736e00b306f797b9a38fb6b0eefd6926c2fd1416f734e1ab261bd21f8ce751cf0e6108f3980a00a6a9825
-
Filesize
8B
MD5e647d22fc9f1f62411764a6afe4ced9d
SHA1394345262a657d207bfb4b39bea2ac77c1222b41
SHA256e5f0f8945003c77e51290e70fb8ed2f8c68e60454c9b4858a9c967f26ba5e778
SHA51233565d53784fe7abeee3dedacf63d75e2244a28a7e4354f3c906aca713523be22c92ddbc848e32c95330a9b09d725c8f1367f4a1633d0bd23dbfe095a36a0d71
-
Filesize
8B
MD56a2b1612d9c4574ff47d333fa5656235
SHA1e6d665e1aea2cd628404de1959d263751fac143d
SHA256cf9e01d9d4f3aff9007965316c4f747f8b7e8f1c140df7706488a3bad782c379
SHA512eb34449a0d6ab20f024f765eb245a3a3a62bfa15a5730ff257ebd88e22dff77ef6650d50f1b90408c9c19d787faa97c5e459ca5004cecaedc88ee04d50695063
-
Filesize
8B
MD515f4eab42ceeef5fb6c80484f57962c4
SHA1b9a67baa42e58c82d014b0fc874c6c85097b120b
SHA2567197413b49e7a673df7df6c336687898e5136df7bac6eb6c889793d74e3ed542
SHA512c210bc9abb6bdfad2f92e8f34380038480f2952ba3eb87242ac3ae35b72736dafd572236ac7d7671c5a9f88e4cf827d491c25dd066b76581de5bac1d193d7c6a
-
Filesize
8B
MD53676361889e000796e4cdf4e50496244
SHA1a3a1238d590df1c28edd71a367883e6d73c38c35
SHA25657fa086c65dba94518e05cba6b6b8c4ad563d2157273f5f24ffde26f4607f82a
SHA5120042021a090bfbcb2035b3e608ee6cd596cc67ff7a9f0ed6818fbc718e36287f6d365da5203eab669206a7cf1bbb124d9b1ae1ad458df3be2abd9a96ae44ed34
-
Filesize
8B
MD5548c82eb51f83e671f6bb118da0595cf
SHA11e3e15ee4e90cf4fcc332ddfe1d6da02a41c6ccd
SHA256f2ad07698b2d3c68a49e526485f8d63be75b625576a3ba6358b4ff8a5db5e237
SHA5123b5f9765d81a758a88e6bf8d249ceec7aa53373883c731ea7a32e9be54a15f9c11a8efe0f673cf4e5e699b74aa04887d39799ac6d2cd040c4ee51b70b0b5179d
-
Filesize
8B
MD53a0e8f93a71cf5db0a3f206ea8454edf
SHA1661d2b9e87a4041cbe6168f11015ce9790e42b65
SHA25612a87ee547d157d1f067b95debf4c02878039906ccbc755155c1457f8a30adfc
SHA5128c65fae869929ebb44e19ccc4603487099a8cd7f629a47b035b388b1cbb6d2561cd4f3763751248b79045ab7b56a2789a78fe26e3ea94ab00593a98de690406e
-
Filesize
8B
MD58d4d373957580bb786d9adc6a69b8161
SHA19a93586085a836ef65516b29623f9044ec2c9b05
SHA2565974dcf6b7b637236af7e40dc8a769b1771ead7549c3edafe252f72a74880461
SHA512da3429bfbdcb2aeed7cb039d7e378f95b7b67ae5261bdd4a3dc50aa3fc471b44a9808366a99646cd60dfd67585a23ed947f1ac93d3758f8674e9b08ad8a3412d
-
Filesize
8B
MD516543c70013ce3f8073f358801cff26d
SHA1d9b46bbb19ff1bb7bc6a4f12a24b659f847536ba
SHA256378f042e25447d29aa3b4110504acc8a3304df9b43cc74ca9ee01a8dfde94e5e
SHA51200807c1808e73758415402c2c9e1afd365f62647c9caa6eb1d021950e4f3a67a2cb6edb1e68fe35c6515942ab0855f498932debcc8b9930485e046bbf8d4076d
-
Filesize
8B
MD50a881c1a9e33d42128ebc41478c64bc4
SHA1f3b7d4f198945b98698ede39a022d780daedd3ba
SHA2562ec58d682e9b8e664aa27b25f1667797c8574373216267f4163c0fb4721275ad
SHA5129666e6756fc6fbb0e090af0c89ce5337e87504344062686e59a37f2e2a6d184babe2e47e0426657e03c8057f63af35113bb9df599a3f2ec16d68c412b35daafb
-
Filesize
8B
MD5eeb8afc542b4a7e7f565787bfb69a2f2
SHA100b9b279b6ba24368cda50499136f04cd10b9d6a
SHA256fbbac7fb611e554d78819c52ebf4a83f763e2f557b26bd2120aa4b014dc755f3
SHA512076af0aed0f1cd2c3f4755437044a97084ed0f05fcd666a59a574f93fa72120ff3bb13777758545e1290496cddaec10408939eefb96f0836bb876c1a1817ca6e
-
Filesize
8B
MD5bffefdab13ae48ab2087e18a924fec76
SHA1baa1afce77d29bd14e11c53ca5bc116305217211
SHA25670816326be555e7d16f0611a169fe9b2154bb30383b4bfe7dadba86e8fc6b780
SHA512ca3875e42064cea1d0619ab3064fd9f36f57c23b732b7e63494d6ac83ab32e3a398d8b12944f56f5ce732e0497d51652553110e99676eb68708677ce0cf5621a
-
Filesize
8B
MD548be28e138990cd417b918724ad639c4
SHA14d4ec0a2b65b4ca1cd854d67d0acba13d300d0fb
SHA256b35e1657df85712493739fa9feedfdb42e0f63d5f850c23bec7b84ae8fea544b
SHA5129f6679e74c2e908c52ed1f5f9c38517298070124dbf4e2491c2d8f091e93f8c19666a4b7d1aa97821c7366c1d1153559f7838b18efee185f78d8dfa25f40ff8c
-
Filesize
8B
MD580459359051a8ca7a141470955d3365c
SHA16e1dd7fdb4b377892f0aecadc253c3ed8bd92860
SHA2563443a3f9c61c7c05b4358e4f40f1bbde5c2927ca16bb8b80483c0177573a0ce0
SHA51210f2bd6e3e1aa1b917e5be6dbbc954ac0a3cd169b36c34e70eeee548b6e80cc9ba65d2b02cf0d11a157d889c883fd19ad117c454ae76e9f7f9e49308291d268e
-
Filesize
8B
MD5e179027192df19534b95fd453ec5a296
SHA1df6c6ac32415a1372e34b70f1638a0fdb2ea44cc
SHA2566c033bf63a8bc94570482a2a7d48b7cb86cb47cf5b156b3b90b2fcfad0d8190e
SHA5126b62b0f74dd26fad9ab6563081be2878f430c69c0c9901388e29f8740ca0e0b8186506305b56bb35b2db89a4dbc990e889c9d9f43b2ca0d327eb44ba27a876c3
-
Filesize
8B
MD5663789304ebde27831422c0d26a942a0
SHA1faeeaa0949149a11ad4e7b06db5b988724e2c264
SHA256bf5724c599212ab0f26b4cff52a4069bea73f840d05b775d138ee254db661be4
SHA5121c5b5c7b0262e8706eca646d3977a4cd99e6862e408726ba8575e74d2625dbdf8be847ca4c0a047d77449b900327ec9c59c6201d1bfb623eb9a28dd38b88f6c4
-
Filesize
8B
MD56083e50a645a51d246c5ec27378ff5af
SHA1a8cd7bb04223a52a7e1bbcaf757d0a945dd99379
SHA256ff779a6d3e76835c90bbaa6f02dd93a92ba3235625e2b982e6c020799ef5e1f0
SHA512ee3674398ac44ad8a1a886ffff0e3d51ea08c848da8610c50a094d18faeae34d286d10bbee5ba1efdee8eb0e4e3a40fd2328872c0fa4a0c49755825bc0b9b10f
-
Filesize
1KB
MD517d2a4c5b9dccddfc8a1b3da7ac54cb9
SHA11482fbc9a9e5703863b41e2952851433c6f75fce
SHA256ba92d2c77af72c33ac6e314746ba4c8e0d8745d7e67e482ad6fdaa3017369a55
SHA512ca57a02ea53167bd3375cba41d14d542b922d840094e4e29b1bfd01104a5102613f01306b1cd09b015ad6216058c577ab6fbc718e516d98e1e854dc002524af5
-
Filesize
5KB
MD5efd37976dc556f5be0b8f73bd7f2430a
SHA103653e9913636e937d50ceed4478a5e1b2bf393a
SHA2568955e50915aded81960f5ada8912d8ecef60550ba98a7879a0007fb3d0ea58cd
SHA512835d6c554c15e1679c4b0e2590c1e50b7a0df8c8a74cd99c180b985224c43545b7c68d83b05e6e8c603c49b576a228a3b1062a95e58610353b675fa940559f0b
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
6KB
MD5d89fdbb4172cee2b2f41033e62c677d6
SHA1c1917b579551f0915f1a0a8e8e3c7a6809284e6b
SHA2562cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383
SHA51248941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed
-
Filesize
652B
MD5f7e67c39ee34227da5d50fddfc4d9414
SHA1c746f3c4eadaf2bf573e248b31c073cf7e1cf549
SHA2566c6b7157557690d207ed45c6f7fe1a82c5a8fee994331509932f6b95d2130444
SHA512cd0b1f29f842f378d70466c941fe783185672e3876670b6e543bb264c4227eca28a18125044fb09002a327d6226d2ad172eef78f4a4eab08716facc813b46817
-
Filesize
5KB
MD5cb25540570735d26bf391e8b54579396
SHA1135651d49409214d21348bb879f7973384a7a8cb
SHA256922ec415710a6e1465ed8553838ddf19c8deb32b75da6dfaca372c1067d2d743
SHA512553ce9d3647b196ccbd6612c06d301afac992130ec5c80fe8fa8a42bab4250053fad651227ff97d9fab4ba8aaff562d421236dc0b2b5d0d4a17430985dd07080
-
Filesize
206B
MD58feb2bcc774536c96c9f6a291af1a29f
SHA1f4e9230faa813397f195cde8676e168fa7146e20
SHA256717027a3fdd01db7d6dd961420bd1991c6fd55263aa4bc559b3cfc703da7d910
SHA51247e19d6779f87059e5fd1e68c43ec729e6c9d36ef3da6e880e2b5910f785ebc2c7d37084fc7c6c21d39bc1d6ad6b1e1483e80efafc96639a52a98af923118832