Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe
-
Size
444KB
-
MD5
0bf19719d63853d861822dafdcc5df2f
-
SHA1
0e1b316fdbbf8ee2ec5a3e717547458234da68c3
-
SHA256
5cbe716ae7460f003b2e47c585630d4801f93891847ef2ef5d94a53e83531e26
-
SHA512
e38e5b4539411e1875f0362f6e1380a675e75ef62ee5184f82a3c71c493ebf9659a9949d1c8dbcf0289b2a5b217ce69f253ff7f05ba00af8a76a10e6a72b71dd
-
SSDEEP
12288:YiSC/HRl+iLb0Be5Wqp7ssBlRwWW6o6dab3wF2:iiJJ7zBlRwSo6d
Malware Config
Extracted
cybergate
v1.07.5
cybergate
infosystem.no-ip.biz:100
HK53V8K7XY7624
-
enable_keylogger
false
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
file corrupted!!!
-
password
cyber123
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\Svchost.exe" win87.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run win87.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\Svchost.exe" win87.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{JX36643Q-4LCF-M732-6FK0-5D488AUVXRKY} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{JX36643Q-4LCF-M732-6FK0-5D488AUVXRKY}\StubPath = "C:\\Windows\\system32\\install\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{JX36643Q-4LCF-M732-6FK0-5D488AUVXRKY} win87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{JX36643Q-4LCF-M732-6FK0-5D488AUVXRKY}\StubPath = "C:\\Windows\\system32\\install\\Svchost.exe Restart" win87.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation win87.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation win87.exe -
Executes dropped EXE 4 IoCs
pid Process 4776 win87.exe 4072 win87.exe 5116 Svchost.exe 1468 Svchost.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\Svchost.exe" win87.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\runAPI68 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\runAPI35.exe\"" JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\Svchost.exe" win87.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\Svchost.exe win87.exe File opened for modification C:\Windows\SysWOW64\install\Svchost.exe win87.exe File opened for modification C:\Windows\SysWOW64\install\Svchost.exe win87.exe File opened for modification C:\Windows\SysWOW64\install\ win87.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1164 set thread context of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 -
resource yara_rule behavioral2/memory/4776-16-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/4776-78-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/5036-83-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4072-153-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/5036-171-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4072-172-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ win87.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4776 win87.exe 4776 win87.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 5036 explorer.exe Token: SeRestorePrivilege 5036 explorer.exe Token: SeBackupPrivilege 4072 win87.exe Token: SeRestorePrivilege 4072 win87.exe Token: SeDebugPrivilege 4072 win87.exe Token: SeDebugPrivilege 4072 win87.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4776 win87.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 1164 wrote to memory of 4776 1164 JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe 82 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56 PID 4776 wrote to memory of 3416 4776 win87.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0bf19719d63853d861822dafdcc5df2f.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\win87.exeC:\Users\Admin\AppData\Local\Temp\win87.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\win87.exe"C:\Users\Admin\AppData\Local\Temp\win87.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\install\Svchost.exe"C:\Windows\system32\install\Svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468
-
-
-
C:\Windows\SysWOW64\install\Svchost.exe"C:\Windows\system32\install\Svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD50c89cccddb783c0b4e598d66b3c7b56b
SHA195432c73eb38fcbfea426f86cccfb75d6991410c
SHA2569322a5968383d28dfe9f8caa2cbcf347e9f33fbe9602a20aa759773b6d4e832f
SHA51221232866aa6e4b8c86cae6e23fb3a735db52f772f307bdc2fa4e72ae16d9366c2f4c5aa97e6216b0557f34995107f39d320a2503b8d67e402768f4e1b2a3c48d
-
Filesize
8B
MD5c1f643245d4fc83af2f2e40cf1e2b4d4
SHA1f1da3bf25236b5f6afe178d3098f4eee0f5b33df
SHA2560102c7cd3e13f580f28ec2d26ec434837cf1dcbf8cceecdee0a299b3e41ef276
SHA51230b063f14ca3cd1b6bab629a197db4dd94d90253a9a059daea29df69fd64c3ea0fe4e8a679f5386669be2a1e4ac39e4fb1c2d58362a17441e774aa598667c5e1
-
Filesize
8B
MD589953c7f4855b7fe551baebec77d0fdf
SHA1cbe7dfbf6388b9566152d6d4ca1b4c622bb46fdb
SHA256a3224d852d063a4ad42e01ea2cd6d2f268531143641092e996d517ab11d71e20
SHA5124e77b7b9836be8a7d777381d8890ebae47bb037292b9cbf5c31fa3e3d6c837f6229aac1a2314949be17274b539b8a251299678b134664bc2a45cbe35506f1fcd
-
Filesize
8B
MD536434c68f4ee2c79d5de061624007e7d
SHA173d8bf149786a64e866ed4cae48e3727f007f751
SHA25631b8e840f8132678beafcb7d01a7cce33d73c69419a881a3e12dac126c2744bc
SHA51299ce9f62ccf79178e0d7ff81d23e173cd4ca01abfb102926afa6b137d4896af73d69ab2aed6f0ab9b54882ca08c6da9797498be84f382ad3a52f221705c4b462
-
Filesize
8B
MD5a9eb502d223e8d2f0088868e43288fa6
SHA154ffc57bb414a62c7ef12559c78aac5333ac867b
SHA25669b050f3dbb185ccfa4be6aa7f63433a977617ebb32eaf5593a7add965a30b49
SHA512fd1cba29150445a340d04d4ebbc0ff3a58e9d6d54db42bedd630d603fec8aa86ba2f94c33c190cdf72e5104644b62fbaa8058ec7674cb3ba602b6858658322e4
-
Filesize
8B
MD5bdefd0437f4e6930e098a614c066d4fd
SHA115d4001aad9edbd596601f8a1ba654bf553c6bb4
SHA2565c8e0e4bc1e560e0c68a7d931fed1b47d55a1bae3a5bf89ec0f6bc19911716e6
SHA51208bf39b9404a71189dcac4349b919e0c363665cb771f7cad61dfdec4b441d2330e405a3ac70b8b9b1aea26ddb7818afdf963a4396cab632db03031800e90e7c8
-
Filesize
8B
MD5b2167f8cef81f607d94b3c481635fbec
SHA14a84d48479e22766be78239bddce40aafe2a9d9b
SHA256d536b2c3b776db075036bc5545df1f31bfc36073031fd423e4727d88ad998b95
SHA51248a3578a8a4358a1bd737bc140392e5b4bd6f58f121654a3ead25d0cbb26734469bc85756ac4b31d5ca7ec2b3c742be066f61d5e2145009d839c8b26292ca551
-
Filesize
8B
MD5bc47242c9e94775862fd6c7be8afa1c5
SHA12244f5278de059b3f7b954a96c28060008b8199b
SHA25618f8ecfe1572dd4d083693e40ba3688405b27e07018e6012f9ae01db4c91304e
SHA512117c8027933e9eb88019f3d66f50cb429054a8bd3b7810706dd2523316faf05448adf9d4e7c8f86af1782166b09cc2b627a854d9d5c76e563d776ad20284d3d4
-
Filesize
8B
MD51b2b76fd5c13e564b45bf743e4955bc6
SHA141df42e5d2263ae2a336d778e23d66bde2302acf
SHA256be108b764ca19c67defe621d61858c0109f5870fb0b7ff92492280374866e27a
SHA5124238808cb7e8a1f343df668aa94cc6b95c23bfe794e38f2085979d7739806ba71781a8f94f00e481b2d79f300366ec94f3c76d9c36ce9be83c817814d09c77d8
-
Filesize
8B
MD591f4f0fd83d46d1615500d835e196f5c
SHA122d62442fb5594fc8041b3422d7e6027a8e7699f
SHA256f66989abe11a24d8128a5aaf2aa157fa137554f5d9c3738542ecc6dd7eeeca85
SHA512a14134932c1cce0ed5435a5f17130a18f33473615c825392abb072113a8814fb8d13558f62f0cf736d1be1837789c2715174d14e91e01e6ce0fb99b17d1ccf76
-
Filesize
8B
MD5c3538cc1f8d08be780e0cacf187b499f
SHA14e40870150ac2a407be33e17a66cb90fb2e0e67a
SHA2567c836c05536eb8604a1ac12f1fb67b56b1a822c6013faeb6e9da34c470d0282d
SHA512094dbc1d5908238cd62007017cdae1c11bf3793c38593c76986f281acc05f874165777b98337c84f809c84abc4a52f9aede3d1d7e25e9199f4bfa83f7000aa06
-
Filesize
8B
MD5f63f3154d6c5dfb651090e02d63778ae
SHA12e0fd4e1d74b46e774c645b9c75305f78ac77159
SHA25672b42f2b7d46b09a228847a59c6bd0a07d328a19176d7f6c28cd16fd30574869
SHA51265c76c5e85ce377c0e9b486d548d23bce8e5806e33072de7eb4ba7af4114c6e217399c4004e9da7e8db35257509521284361e25aa0a5a784ead7b7f45ece4988
-
Filesize
8B
MD5f92c954d5249e6e8fc8ef18dfe4be64b
SHA1c5718a27b7cf2bc858f09ecda08277955c7fda45
SHA256f507333471581d494b116b437416a88ec6871f984cc7c78a7d52855615ac87ff
SHA512c059f342ff77ae62b095f3ace0448bc94430f9323625bd087d25831b379d7b50b1c683abda918c1fd4a8ec98d5a809d7965e4c20cff0eecfb9e3a39e0235e5f8
-
Filesize
8B
MD5083a0bd23449fbb298b3385956c1575b
SHA1d32c4b6ef51249431de1e9e43e6efd1b98402b76
SHA2562c100df6a92ac5727caf45d1771f5e78edf41507f6fe5ca38524e0473517d8a7
SHA5128a2d0618b57cb594d503c8da44a8154c64aefc343430aa54d349878745f423eade0ed9e50358661f7831b269ed144972461d4c2b916439d0fb87956b59c2b2f7
-
Filesize
8B
MD548a2c3ce91aee35d32fdbbc2cd81f289
SHA19fdd6cdb4c9b726e96d974b9a3c59f800f8a37a0
SHA2568dc2b0b9ab1ac73ba5e21ea8b10e200ba5ed8006c538b292c680ad2e85ed55e6
SHA512efbf7cc2807f8753b290ae017ae3bdbd6d826fae84fa40a1450bbffdcd593feb01f477257907808a114d7b2b7e131955917ed76d58f2c3d429bcbfcc6935b2c6
-
Filesize
8B
MD56a45f58ae971d7da3ae73027c768f36e
SHA18312edf6ca4437f42d5e813987a024554d4d3663
SHA25631c0bcfb3fc0b8461699e6ab603521f9a0b9fe2a186187bb3e72ab5aea597bda
SHA512a699eeb9d7cbb336bef35382a758d767173c37c63e31acf712391606e9ae970ce83f13afb7e8d07c41b09effc588c1d91bfe881f315f8277a9ab2073c70f94ac
-
Filesize
8B
MD579e525f54ea861ebe6988bb4f1b0066b
SHA12f7848858275437ed7bd2199741bd5097c3afd65
SHA256a06565c20de10a13ce31f7c1571814ed9a9a4de8a2b8b19b2dc7280b513d6248
SHA512eb1cdc6b8d933f438a93026e34cb3a635a88243386df1b2a1413a7579e31aab95a2a0978b32eea39a6707aaaab6d56f449006908698107495f552d61af992330
-
Filesize
8B
MD5666d65f8d4485216b3a351af7316ee54
SHA1d8a20922e54adfcc1808d635344edbdf49ef2932
SHA2567f377ad82238dc2a2e66b29afd4960b9d8f3af19c56590b8850e0466db251723
SHA51220087444633c70f0c0db0c70296d9fa0f259b8f2562b486938c1c9fb172abea2d40aa0d5179f15543fdd8e0d31dcf00f8b2e8241105c278fc83c60c9f4f9525e
-
Filesize
8B
MD52dcc0a7db14b03207c93dfb1316aae18
SHA11c0164bf5d988e9bdea09e279f62286870395860
SHA2560ec352703bcba6f0cf67004de816ad9eab807603668a88bd7ecb62f31f174627
SHA512ba2991ade4ebf50088f9e115c1c90f862c0e4916f77662b159cb1d5e594cfb0b7f25eb1189177c2199e0dc79902c2e5ccc6675b7cd838f62eda35fa4dfa1e055
-
Filesize
8B
MD561187769548862fbd3964abd144cb4c1
SHA1c083775bb441e5767fe5de28875bd96781177663
SHA256b7ebbd705249edd87d13619744a3d425b1621da928ee010951caaaa1760c6b2f
SHA512993a0de9ff75fc8424d0b662d4c6036af360d27b5df37c356afddf6d79fcfd4e693ed5fbe6c5498a5b34d2bcc7377ea4d1084c2e6f08a53e081c19f3293316c9
-
Filesize
8B
MD5952845802b590053d73eae981c8235d8
SHA1737259b4e1c2cc01e4866aa99dcd5a54bc20bcf2
SHA256ab025632a3667eecccfc22d721e8c75143b7ba0f9051449d2808c7c32cb7254f
SHA5126fb4129035eff40b75057c562aa5ca859d17e2134a6b3ee5713ede4b09b8747a69348892792a8725ce3543561603e0b5ef65230a1275e78c1adfba859a27b48d
-
Filesize
8B
MD588870efc7294aadc6565d48f7d8b7bd0
SHA19d210abce0bb81b96c5e23ef2ae29a450bf87a59
SHA256ac699f5aacb192765df8755877cdf9a487cc76bace7986e5a1410df381f67df5
SHA5129f0e514ed19f6c0725ee4b04ea19235174e965311eeb021941d9aff057d262063618c70995b3e6e885d4c884179ce552b80bb86c60d809f321f13f3af5f8838e
-
Filesize
8B
MD5228da5383e63ab2507c973d9f3d1a784
SHA12739b7e78f4d3b0d0f64e976ecb77720e258ff15
SHA2562b5e2a6a0b2a2896a8be9d40fae7ade19bcf03d40f6910d4b7f90f0af868be7d
SHA51273cf5f9dc43c2942b035a7552e8d3177c70911ea3129f92d9b75f51dbb35e84da68c8ea3d2738e86a96a9f9608ba1ce217aae810e37e26483e65de23d2779358
-
Filesize
8B
MD56e09be13f45ab17450f9ee19453e90cc
SHA105ea55f81a1ea5e0b88f1f2d52fde19e36b39df1
SHA2563e2f7410cd9e4f155c4d9f11ba0b3b78539f15676e6d08d8343a8cbc789f5473
SHA512b710ab88c0f82c8aab0a746a1e65e98bafcf8321554399280651a4a5e942b06c2214e46ada4dab94d482f4f8ab570bcc44a2ed50e0759897ee61335afd4a31c3
-
Filesize
8B
MD520ae73d02c28eb0a2a25f76b0e9da92f
SHA18df26b21ae3211448ce7745020748ccb09a9ca59
SHA256babb0fa77fb7664ec69fe6c97c9d873c6a6d331ed1f26d4dedb5240abd027159
SHA512ea6edbb604145c1cf694a7ec3a45231ea8ba04c0c46ac2f2e73b834f214b85a8e920636a423352c6a1276c7b84f641e52c0070bbc4753bb2dfbdba64dba61901
-
Filesize
8B
MD5612a8d6842b3076692b6cb6730a7cc49
SHA1e0f834786c59ad770c28394eb81c3ac223e82e93
SHA256591215976daab28bba93bfe00b4c37633cf2aef86d003dae350239e7e4153ff2
SHA5121abaff742c44c108f51e81dd6ecb247d778df045b0edd39bc545f673795ed88968f0df2a4c2c5b27ba44bf2677fd574766b938714c2b421c59c62a2658091472
-
Filesize
8B
MD518f7929cfd4fe33fd4825ef969fbc6be
SHA11405c84aefa76d2705563fa8eb94dbd56b404cb7
SHA256b20d735e4dacc3689e6638a29a9c505fa19e62d42f03e67906bb3b30982dcca2
SHA5128e58144226ff0368691df684602c98db37007b72eca605d59737097dedd2abfa2ad51092928e91d4aa45bf4529870ea214c9c587e88e400379fb83975e60faf2
-
Filesize
8B
MD56da5c16e082b5a2fdfa9bb2359d7126d
SHA12603072ef33727fd1d2fd43a47bafb8fbdf17173
SHA2567e63b358e22719be76ef5068ac284706f67c18f1eedb0daf69a068aaa0a29b5d
SHA51225ff996bbbee36594b2d4ba0d99bf81fc6e652de6f8965763e84d7dfd97e52fa31da048b904f2dbae8d7f6a34db65a6ed1cfd9b3fcc6688d98bb4fdfbb05980e
-
Filesize
8B
MD59f6a1d79e453f2e4594f3eb4da548fd5
SHA10a2bd6b78cdfd93a002612aa6c86a8f5f86dde12
SHA256d535a223830740514a2d51e90fd02eb78b04d8e56bf1a0cf3ac623fefc655459
SHA5122c8670cc200fb3d2953074dacd8dc6a45d1e591320ecd9d7b76c40f9db4a03d7f9621f12163420d3bdc27f1cba5f2453c8114f201e79d37cfdf91e7d8d32b679
-
Filesize
8B
MD55ad92fe1d6838b05388a987395d90d8f
SHA1dde7152ea0dcd7c7fe4b7dfe54d545539f1f88f9
SHA256ea1d5ceb4453b471811ee3842c59b66370391e18d146ba8a1d0d956b4050772d
SHA512bcf87dcd1ef4948a78089aeb1a5e9427fa2b8ade2411dd0abe9ecd4ef8350bc6b31497ad3639804922bf0dd1146f59474d4a6d6bd6cc60a81cc1a1f1f23cd3ef
-
Filesize
8B
MD5abfaea878db7b4e1cd9e35109fc75c74
SHA1603a49d4bab78e002bbb98b3750387c9e109784f
SHA2567ef826a3aab7d51c0791556caaf356c5fa28afd255a95e5998e0461db439f92e
SHA5121d4ad391f5d8584dc11a76bad1a2d4caf4466cadfc90ae49c91b8f16c49f162700c0e992f9c2a663f60ffdffd42e1a86f34fc2e2a276994e8db99a8befa4fa5c
-
Filesize
8B
MD52ab5831cd1210cdb0d72a9b3677fbd75
SHA1bdf443b4cceead4a3e08954589ad2b426c87cd94
SHA256c2bf3726fcc8ddcafa222f0c91e077c5304a0d5d4c51ca6308048bba46224415
SHA512eeb2d50615a17f9a0f848a96945289e11ed7e24bf082e63b30e3e84d5cec062ceeeeb8e8cdb9ed1fd47c1c6af24e79e9adf76829f5b37cfe853ce5aa0cc34378
-
Filesize
8B
MD5548cf85dc01023e638f92a3c73f0428c
SHA127b4f6ddbb56c0b82616c3b66b6cce21338cd01f
SHA25690060abb13e9dd63913cbce6ac21b15a55c2557b5445efa5b977929223d3a8cd
SHA5123037460fb7d80a299d7cb10f991249d62eb40f70a719e384e62e936dd15073c115bc0bbc4582ebed532002718ee1cf94c2c21599519f9078da098af76fdf532c
-
Filesize
8B
MD5fa10fd7f2846fe55b5657d734c89db7b
SHA1c9d8789748a5bcde0e0f73f4ea8451bf019b9369
SHA256f17d9f6e97ca7859ea1af8799ed0a4417f8d4f87b2b746913fa120f309573f3d
SHA512d082bdd7c753e975ba17089d57d3d3e9c4ee7ab56f778574aaf6024524e9446bd1b6b6a1140f05218a1eb8ebcea8b83ceb1cf8495e481914c9e9411e9a351ba7
-
Filesize
8B
MD5098d7b90d55382fe1ea12b5125dad7f9
SHA156d4e91c0dd3f5618679bf3a5d5d5433d4c2e529
SHA256cf5ff37d98e92e9eb715aaf1a6a394871e0ece69236acecfb4b7519c98def1ab
SHA512d9f5431b4dc0a8432c06aefc50e8a788394f8adb1524cb4afd3b7569c7a18ff27b152449bbf0c74db620c9601aa0a274fd13a7accdae775808cd1ccac348701c
-
Filesize
8B
MD5fa9a39953c4d8b8fff199fbb25f8fb6e
SHA1e80d6a760e316ef1dc9d792acbb83a73c5350e5a
SHA2565f62c4114a19beaf23ba2056ea1b1850ccbabcdf96fc57f58ece93221f4725cc
SHA512e7b9c76708add98cff36f933c512e98c13da0e45f167832de4256e1a0cdb6563ff87a63b703504dd31d8c57f461eb100ba8163dd619c2d83c1dd5c5662562572
-
Filesize
8B
MD585fabf3b056101ee3badd63949a1320f
SHA12196c926aa2e2dc28a49eb03617b507e210b829a
SHA2563083ccb8d6d86a3206453f9d6daf941b16f1c89abc9e74e17e0ff8d3f539f3ce
SHA5127b36304bd952259f19dd7b21ddaa1bf1b92bf04dc7e3417d7982347ecb58173854c7ab0e420a3aa1c2fd231ea7d68c33e2d02dd032f203f080d042049fa0d01f
-
Filesize
4KB
MD55e5ecae8b08152c885904cde71c50dad
SHA1727f24d102ab29be690c783ddc149b3a39430fb6
SHA256b3550952a2474802ae5f2d2d7e75987ccd7ca23baa8ba015c3eaa6fd04b55541
SHA512dd6287a8471aa575abbcf46300ac64a170c0cb19052d779c7bc0899149c6114a4e42520756dae1598e18458d94522d6c7701a7bc3a37067ac2a1616dbbf8e5ea