Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2025, 00:07
Behavioral task
behavioral1
Sample
JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe
-
Size
347KB
-
MD5
61755dfbb200f0e5c56734c1ad4e5284
-
SHA1
a2d5419fd5ea5ca1183b7a1cbf5efbfd5b50097e
-
SHA256
d7bba476126985026f5aecedf71daa70112d8e6414ec69b858f600435df4c08e
-
SHA512
d74a5583e58041761c6fde37c2b731e5cf2688aafdabe790779a5af3c5127aabff72cc81ce16c826f4908c4221a6ecd103336982d376ed24a8c61d08b0544bf2
-
SSDEEP
6144:aOpslfhdBCkWYxuukP1pjSKSNVkq/MVJbrIa:awslfTBd47GLRMTb
Malware Config
Extracted
cybergate
v1.07.5
Cybergate
xxpeacelovexx.no-ip.biz:82
6U86LBGC2FMC7X
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Explorer
-
install_file
Explorer.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Error to load file ! Please check your antivirus !
-
message_box_title
Error
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\Explorer\\Explorer.exe" JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Program Files (x86)\\Explorer\\Explorer.exe" JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y6P14PD3-223A-4U8M-0324-Y32VSBRDO470} JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y6P14PD3-223A-4U8M-0324-Y32VSBRDO470}\StubPath = "C:\\Program Files (x86)\\Explorer\\Explorer.exe Restart" JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y6P14PD3-223A-4U8M-0324-Y32VSBRDO470} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y6P14PD3-223A-4U8M-0324-Y32VSBRDO470}\StubPath = "C:\\Program Files (x86)\\Explorer\\Explorer.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Executes dropped EXE 1 IoCs
pid Process 4028 Explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Program Files (x86)\\Explorer\\Explorer.exe" JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Program Files (x86)\\Explorer\\Explorer.exe" JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
resource yara_rule behavioral2/memory/3096-0-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/3096-4-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/3096-7-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3096-25-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/3096-65-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2928-70-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/files/0x000a000000023b68-72.dat upx behavioral2/memory/3096-139-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4804-140-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/2928-160-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4028-161-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4804-162-0x0000000000400000-0x0000000000458000-memory.dmp upx behavioral2/memory/4804-163-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Explorer\Explorer.exe JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe File opened for modification C:\Program Files (x86)\Explorer\Explorer.exe JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe File opened for modification C:\Program Files (x86)\Explorer\Explorer.exe JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe File opened for modification C:\Program Files (x86)\Explorer\ JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3136 4028 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Explorer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4804 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2928 explorer.exe Token: SeRestorePrivilege 2928 explorer.exe Token: SeBackupPrivilege 4804 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Token: SeRestorePrivilege 4804 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Token: SeDebugPrivilege 4804 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe Token: SeDebugPrivilege 4804 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56 PID 3096 wrote to memory of 3500 3096 JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_61755dfbb200f0e5c56734c1ad4e5284.exe"3⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Program Files (x86)\Explorer\Explorer.exe"C:\Program Files (x86)\Explorer\Explorer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 5805⤵
- Program crash
PID:3136
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4028 -ip 40281⤵PID:4176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD561755dfbb200f0e5c56734c1ad4e5284
SHA1a2d5419fd5ea5ca1183b7a1cbf5efbfd5b50097e
SHA256d7bba476126985026f5aecedf71daa70112d8e6414ec69b858f600435df4c08e
SHA512d74a5583e58041761c6fde37c2b731e5cf2688aafdabe790779a5af3c5127aabff72cc81ce16c826f4908c4221a6ecd103336982d376ed24a8c61d08b0544bf2
-
Filesize
224KB
MD55532b5558a5e7618cd7fd5f6bcc39776
SHA1065f494af2246e68bbb4de64b170bfdc652d95d8
SHA256881a091a253bfb7026c84b0108d7c8b2b7ddaf1cccccc91597f0881a341676b8
SHA512291a004acad4fd79071fb9417e12c3ea4c6edd235d26da5446c1746061079b064ab3c4b67690b1de264ba462e57d248f18224e5018d631bff3d0770922e37017
-
Filesize
8B
MD53d06858c2abc23d11d934b76176db377
SHA1bd84cf01e9a21401210dbe54521d8e7ef9c421d8
SHA25647203d4ee178436c02bbece9339a864aee6c894e319ec7428e5c937acbafff17
SHA5127bb13367f28c5c58a4001904b48e5696c3b039351900967765710cf58a3692a432e0982cc55c32f13e2cf30f90674ac1cb2d23037ea95e173620619f7131731e
-
Filesize
8B
MD5931faa17bccde3ac7f8c3c71e47e1b22
SHA13ebdf99a718b83b3481c541359df8103da09df4a
SHA256c1d8fb8aacce0d76179ee7158396ffea9da0fce3abe2541a171a66582178ba41
SHA51277df48cc41832de59a285b974da70e237bd329f2d8e7b082e098f53ae922bcffb44f0b9b5242c42462fa4d132e968d5b6b57f8e8cb420fc1f4e613d5da991752
-
Filesize
8B
MD5bfc0b25c181c4a78e2b24e188e1eea16
SHA147f1fb60eb4a2dc3cf5f91d094464d28d82db85d
SHA25660679b8b3c00f774f2dbdd5a8126e20c37c1a5c465aad667ec4bcbcf0f39ca44
SHA512aeec836bfe2a0b8e29d62d7e849f90100ab98f5fde4f600bfcf0d0f880863a5b661065651fc6887d163fa0a2bc53fb6013ee5f5b78b5f018a1178794cafaa622
-
Filesize
8B
MD555027bc7c4a251bf4a5739c5cf95f3b3
SHA104b1262ea0255c799de7749da00e5134626e97e8
SHA25636f7311c3d51e7e99d3c6d80edfd247d273a27b7ca1cc7cd675099afb1cbfc1a
SHA512f30be6316db78907c88deefc4859dd8d707bf262c0106ed21cfaa485df07a033e9183fe01b6740891c97d9acfe438417f7740a61ddc2d98bce90df2901b88ed6
-
Filesize
8B
MD509d0bc9b1ff404a651ed5b7af50a6041
SHA1f668e383b8d8420d860d464b4b104f2bbb6a9ca1
SHA25691a505bae11063fdeae3fd7ded091b423de23bdb1fa9ae1e727a3773a7f5e8ff
SHA512a5ea4bee1c8a89bcf3991be5f76f7bc754edc998f0a745457b18bc8e7de7bfeb19e02d678fd5e236a1b65dcd4bd0a39ae5ef42f2e0632a073753927c28a7fb3a
-
Filesize
8B
MD5719751026387792cac062ad1318131bc
SHA1ed7ebe1721ddf120e1bad7463503dc25bf7a0195
SHA256f8728a3b1a63112da999f48f64b9999dcfa7d363f738d00bdc53acc0d5b472f3
SHA5128f7aaf7008e1a77effc43ef2ee453d3fab6a520199c594ee5917984c1ddd1d2e95ed743838eb8c0374df9a6a36c25f6318eac5bc5339982d4a30c71b9363b5a4
-
Filesize
8B
MD555696521e1616c9bf8553417922a0c53
SHA137aa496458b5725e3b3025eed78533d429a9a87e
SHA256c2a5a0174427ea174ad253f513c4d326ea01389927dd1e13d5c44ab889f3e86f
SHA5126054b8d192a6e0158970bde667f53abb4f5f0d8cc4def01b0468d12e7d8dafa131598c869cfdaec053a30552737485463644cc26ec3d738be134b7ed7c7d830f
-
Filesize
8B
MD5536caff2b84d4a7b7eed8b168ad7dcf7
SHA1e5256470a0d5b2b52896abbc92ef8045f736f836
SHA2565891599e18e4c0ef47213ece7d4a5321e8d1bbee56f4f3f00c888087826f1190
SHA512c5d753f980477d96995733097a8b98ee8cfaa6b4d6677b530a10d073ad09544e03755429c004d35bbf9a0f1fb1f015f0bc69a9a138546468556903b6a24edb89
-
Filesize
8B
MD599729cef6b4258653b5a34812ccf0129
SHA1e1693d68124a8e5b38ba535e462e691af346d31b
SHA2562c0d373c24efad8b2ddd02e0c6827dcfecaf0a27ad3f4dd7d9e32137e6f42a49
SHA512770eec2663359b4efa9ec703dfa9b2d8091fd6447936645afadd656a950c7e93f1d9f09ebd479d6709c0d8bb0ba0b0fb2ece42350e8507b84130631d429d0a6c
-
Filesize
8B
MD5139cef58fc456e306add1f1c943db793
SHA1f27ba6f3b2295767368551515e873a75cd916aba
SHA2563e1d87c17f446b29d1ea9c83e5d933f01537ca6027d3e2939975c6e88ec91d7e
SHA5126b1f086a6541689104121ec6cea6869439cece4b65c6c7df919727298095a0f085e067f8025fd3dbcf27ed19538ba2941d1ff6bdff8ff1ed122e785ef80330e9
-
Filesize
8B
MD5ce0a3caa4458f55ef864fc98c66e2774
SHA16c14b7fb3d8c1bd3352951209e19e1092c9cb0c2
SHA256fbbc9c787f0b51b2c75dc2477cd8011754d38082a068334262dd387babb60a5b
SHA5129a0903fdf3dafaa337d84079e6c6cb94bd365347207d4de9952e866e123d278b6b78afde79ad39129ec9f1ab257d2b672557a5a3c9aa0cd49820d28c72c1d743
-
Filesize
8B
MD5ecfd77720d45f212ab5e91f7e69a5697
SHA1dc50a72fc131510e4e8af69be963ac79ccc9df0b
SHA25698398f77aec859fc4cbc92b8e183ccf2a623a4adea85594a08cfebb5768c582b
SHA5124219079bf759b4563f4130b2f126c0ccb8e82afa9c700885191125667b3dfab03dfa65928ebb7d2f10fb36abd16e406a05578fa2ca3362521097fe857a363a58
-
Filesize
8B
MD50762eda6365a5e423c27f8aa970be940
SHA1418fc9ccf03df5e8b056ecc7a64a694c979e2c2c
SHA256ae023a5064f0345fde604b289f1a94dc1c58a0f7f88d4c17b5e125ab8eb566d2
SHA5129feaed58f76815ca28535305b6adf82cd8c60f7757a63bc4a1c34fb273832fbfae260151906e93641c8ad2daca8f6e7cde477d05b9a53f1a1384465e8c07a622
-
Filesize
8B
MD50dcd8c164f5b2ccf7df5d23711ca6fd4
SHA1dec9c46dacd403589cc3e3d06471fc40e21d0dcb
SHA2565aed1d048aa7d6baf89823b61ce769ecb368824d9f5877675ccd232a55325f45
SHA512bac21e047796164e6c50b595d0886f2d09d47ad47bde6cfe4c2e99c3018569bb17d334d05bebc33391c65919b1e68660e2105d184f379e89726e0345a332c691
-
Filesize
8B
MD506a86009fed68499f20da264fe68d0fb
SHA105bbe336efd20e0b3281b9e94e343dd0d39b2e2c
SHA2563db5462f7d0b7848c9ba5003fd002e8f50b603b52edd30f055af1b1529bbcac4
SHA5128a692d6291b6f482b84995299725bd8e586a6264777915c11ed3e629bb6c775f3a5d3c228c4a1d829b8fc0748449e90c175dbafcc61e409993cdee5862a051b2
-
Filesize
8B
MD5ff3ae747efada5e9cea87c3b3498588d
SHA14d9aa2ff1f2b31f3df0a8b6159cbba8d55c12f46
SHA2561d529e5cebdf9523fcce87d3943a69e3bf67ef51824ad8f3b6c371b9760e88dd
SHA512aacdb5288e35c36bf4ad3e15fe59a6ecd0911f44eaf61e2194bfbf96120f904d4addd67e85f974b4c12369bb7bcabf88d9194aef40618cd717fb9dde793050f6
-
Filesize
8B
MD5eb2b69e632a35dce233dcad47beb0a89
SHA1c47c30a46eb6fc7805dfc082cb45440e1fe5208f
SHA256382f511173d0a850aebd06b0095257b57017d353f2e6d1624773e04699f91fe0
SHA51248747c75f8dbabc941142011d07d9c9bbb01aa5ff9e5d32dadc652b8dc12da24ef3ea8d9daaccf66d869c8ec9ca978f7dc7c3320a49d7620e913c107236baa07
-
Filesize
8B
MD5cafb489c23981d4a9fea003fc9a127e3
SHA19ba6831ffe40520b1cc9a3fb19808b96aea3354b
SHA2563b36d86054d8b7efdb1e3f5c663bc5daacd0a54f3341f24ac344a4fd5675b2c6
SHA512f11fab0e1fc5a104a04dedddf5b1aec487c9a4741714a00899a71b5df9384b6fd780e85ddd28e4b7bf593d71a918c68b69d13fd55200d049ce7b8f5cc05e3735
-
Filesize
8B
MD5bd612d4d9fba2155b5ca03d1b88c8c0a
SHA13d6a473c0d4ceb03b3231e4604e17e1a6fb83506
SHA25658f75412d4a6fd69d7368a203cc9501edf997ad1aaf449f80c174acac82cf2b6
SHA512bc4030afc39d235c21c906dce8bd47fbcb1a1c02d54f39846081a6bdc0014e4bc2548b6230a8ea4f670616e983ecb724e820ddd576f30ec104a2b26115416027
-
Filesize
8B
MD5426d8347d27577518ddbfef8a35fec47
SHA1fff4f3ae7200ccd98a01bcdfeaf79368c8ff79a1
SHA2565bd86a80a1b4b60cfaf3b9d71188632a403e2bee5e17dce097970ef5c9e64f2a
SHA51284a1f7d69314a8b74997a8e39b6023356acbdc2e25d40e3cbf817115541d193c419280a05a186352f795af9b3049e722d5f44522b49f73b8605e0754bffaf041
-
Filesize
8B
MD50d77bf8ff6a408387e25f64d8dedfe26
SHA1830e8d3b91e5525f9dfcc50e9e3253a44a39c819
SHA256bd3890a96359b51b8a99a6def641d1d71077551de9bf249805e50be13a2f0ae0
SHA5123d54760a3051d5826daa7f54deccf3c2904ccf88c1c9f58ac86ebbd411ec178d30bc0664d68eb5ca948172c38ee30a8330a1954b7df5a162843b18f8c710e654
-
Filesize
8B
MD57fc79f87b447c0663c0842185e60fe85
SHA11ddea727e7dfed98fbbff09e0c0d20665e91b34b
SHA25684556f2ea9566bcebd529e4253b3b1743280485451e8b8ded6f7a5b6d9efa69c
SHA512177529a03a5c9294171cca285d15298e7ba81a2e0bd6bd99cc0933f6ea8614bcd15e08f350acb36ace1f572e4c132865d8c38e843ba9d151c69550906b2796c1
-
Filesize
8B
MD53a69e84d9778791fed7d060b2ffe4348
SHA13994eb05ed6905f42fcddfad9f4f493b04033568
SHA2561d100aed93698db3ca24a70dd596aa34e6d0467248ad97b222e870b4904d0d03
SHA51241a1dce3abf649655295a400ac2e58b5f5371132342c54541cdea16f61805ff2cc38c9620f82d48c98532c8ef690448eff2ab2befde8ebc8fe6ae1c270f836d3
-
Filesize
8B
MD54d0a6d544d36847fe354caeeb25a1d3a
SHA1b42baddff8688b29f058dee7c4cf061145065e0b
SHA256d674894fb75cc86b38dc335d8feb0d97c51b8db892eb82f110eef0e31714734e
SHA5123a00331716f8905f95df0e53739490c697283aa7087bab0ff442c2ae6b028ce70b9a7a67347820b4064f380e873b07358c62e4e26a7a8f60e466597fee2d5d81
-
Filesize
8B
MD5a808e6c7f308c774d0ebe96789584d57
SHA11e35e403b8e63cdffc4b6d18b5aa542bc8ba5920
SHA256457a6597a825ddf43f34833de5e80e22532061deb9c47b9f3aeaba66151e2b09
SHA512f4d3d2fec95ec89207e3e8996a66d2fa42c27fd4ef263c2dc3578585d3546913f819df9f2e348c62967791a1e3477fe023abbf360b08ec9e27544b523463ec5d
-
Filesize
8B
MD5012e17e521a22de450c3d62ce2521ff0
SHA1ba0f6592f9e6b0f4f6fa4b937f01fed61bdd6ca7
SHA2560a5748671e25a09421de73997b7ec2bcf6ba84a108f4ba1731b1a0d92f2630d3
SHA512bb5278f3e0bd25a74b462ced16cae74ad1d7f14d05a6dc598081bf52896f329156761de633464a7cae393291b97706c89eb132890f387ed6c6dfd645ebc458d1
-
Filesize
8B
MD5fd4ab14a3428e286c2a849e983789dbc
SHA1c245e8c25dfb5b07320b9c1bbf9cb9e1938134ce
SHA25614e34d7f61825ed23e91c7f5d785c64a8829f4cb53454ccab77d694fae81de60
SHA512978b3ff4c5d07b77e83f333a7a1c3bca61059dd0544974a32eaaaa192c107a816c60458f6754bc7d08e93a01c7f02409dfe6559e34a9bb75fd4daddb76e30e2c
-
Filesize
8B
MD59c23949dccc23b6a0756022812e46896
SHA1b8538050b77c6b5ca99e278ff4514b9ec9050e17
SHA256c9ab5f87b6934815da5ad274b31ab7219c41c8181bbba4c6b9f377fc4fcda54b
SHA5124badf7a2a55320d5b706c764bc3b51bccb5a6b2cadffa3c75b564af7058aadccf1c9652537ae5dba77eea22834e5cb0b4c5da90f16de6a4c37d8f33a64d3165b
-
Filesize
8B
MD50198aa5f8b4f5f8870e3cfdea90a2ad1
SHA1f7e7f9b4d52c107fb69ab88f62d60862703a54c1
SHA25614f35ff7d067b74433cc2cfa92b2730336b6bec460b652f4d6b8be6e0727ff2a
SHA5123f17a12a5b05a03b1bf7fd1b17c9b254bf22c70e618d57016da15e235c7037669aed575fb0df93e2532a44eba3150360ffeed612c18c3da022a5926213654a06
-
Filesize
8B
MD503144be43343451f4d1eab95ec3e85b1
SHA1b8ddb2f8462ea1b122a68f3e570c317fa745d09f
SHA2567584c480609e2091ca2a0a557062ad164c6a48a3a394b218192739b907064319
SHA512f82205732c162fc132dc3275988b40b50513b7fa2acc525cd5601dbbeb47108f870ff696ccdeca7c0588adc6ffff3c55800d3498f6221b4becba1aa282443949
-
Filesize
8B
MD58b687c83acd06c65051ba4f1e19bad27
SHA1c282fb48a7f2d379b93178c369de318fbdf85ba2
SHA2566bd283daa7f39e1f1a890e7552e3f5d67e736a7cb3bc39041740ce1ea2a1b616
SHA5128e5930ec9d1032df5f6b6ca8899f85bba68984bc5687d4ec0848b3ea6913f2d3c2684d8545ae369f2e8bc6d992e816f78f97163d66a191e3a408a5f4d9433db1
-
Filesize
8B
MD5e280a4bb1a0c8ddac6d4a330329aa9f6
SHA13697606265e01bab2f404799f5eac4838f4de245
SHA2568ff1df48bcb050b30c0ea795252fb42b7a82f8dcaadb09859503a38ed53bbe57
SHA5125abc6ed691f44216b008b14d51ee51af18e59cbbca67b4d714c742e93965ec32c468a018bd9796629dc80f2d4094bfd03dcb1af5a2fcc38e3e12ead9ec63f15f
-
Filesize
8B
MD59a3af79c3fe4b29dac67587a61097528
SHA1ae53c07baee2aae1e9d3b0f552e927e34634926a
SHA256c0d1485261c734116b0b9e039799cba6933e9fe2c030fb5420891100e3d90206
SHA512019cd4076a6184eae3c9cb1b16bc8cf38661f96f2c64bdde881a51c5af8de34a4ea128840385820f0df5c9f76d31d18a2b1f775387509106fcd0cdf808015136
-
Filesize
8B
MD57e32a2f4ff34c54bf2704a545314a3b9
SHA115f9f9384d718b5e430175bdf872ac3040235181
SHA256a210ab57735241b286fa655af48751e32ad37a937cc97c0d29f11f746cc8b4ae
SHA5121dbc58c46489fe6fa008b658e545045b2b9d3b891c51dfda92f3b11cb98e4745f62de2b57021cf46f41c3133f9a1650ac3edbc17743b57861b3e17c7b751d57d
-
Filesize
8B
MD52a9dcc451d9e96e2d5d34a2e2452be09
SHA19b25151cddd8af23c329e69bbc7dce5508f7f1e8
SHA25642b42cea2a90304d323d76af96c670add8cf371d617fa4d83df437f9f61aeee5
SHA51276ac4890e436c3a651be41e3d7e575fb1ab0f492bd29c2ab7d2341af76cd071763e67ffc7c362ff2b7a351f0201120595a8669b6dd5990be8a642ea91fc8c560
-
Filesize
8B
MD580eee402041c9a9b8b57ca1457eb54bb
SHA1769b99c7a8abf8e042adf939b136e5fcfe6d5f3f
SHA256c040bdc3529d571ad3f3bfd5d51f68609d70df0b008080634bf3315943620ef0
SHA51298696dba9f7f4bffff7c9e8dfcaefc9e5c27b34b1ad7c8db029d856a2f8ee21f6d15b13da8f5736604aa0b1a882f5eeac2efb5146954cec215f4253562948150
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314