Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/03/2025, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_84420814705fdad80c366dd5713f5830.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_84420814705fdad80c366dd5713f5830.exe
-
Size
328KB
-
MD5
84420814705fdad80c366dd5713f5830
-
SHA1
f0628fb578daf51c2f5c799b68903c72166d8787
-
SHA256
25da581d16da426be770d3be60f3e3c10ccc728bad8a88b082b50caeb16e8304
-
SHA512
7873708d5438ebb9cfe14dc9f462e72ff50802b54d565bad5b1b000ad2fb0afc9dcbe2d35937625e2fbeaec7b42ef33c95ae755631a80b63875cc22b0c23a4a4
-
SSDEEP
6144:QTYaePXgDV4rLVAaxxQAMzgC+KTxImcLpbLf1+opLFfOPiUDTi+Rx7ipx1KW:Na8gDV4rxAgrBC34ff1+ILMha+R1iaW
Malware Config
Extracted
cybergate
2.6
camfrog
xxxnullpasswordxxx.no-ip.biz:4848
MUTEX
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
Update.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Subscript out of range
-
message_box_title
Run-time error '9':
-
password
xxxtheerrorcodepasswordnotbefoundpleasetrayagainxxx
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\Update.exe" JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\Update.exe" JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6PJ120MS-RGYG-WJ15-80S2-MN1R27AFTG3C} JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6PJ120MS-RGYG-WJ15-80S2-MN1R27AFTG3C}\StubPath = "C:\\Windows\\system32\\install\\Update.exe Restart" JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Executes dropped EXE 2 IoCs
pid Process 1740 Update.exe 2164 Update.exe -
Loads dropped DLL 8 IoCs
pid Process 2264 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 1740 Update.exe 1740 Update.exe 1740 Update.exe 1740 Update.exe 2164 Update.exe 2164 Update.exe 2164 Update.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\Update.exe" JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\Update.exe" JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\Update.exe JaffaCakes118_84420814705fdad80c366dd5713f5830.exe File opened for modification C:\Windows\SysWOW64\install\Update.exe JaffaCakes118_84420814705fdad80c366dd5713f5830.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_84420814705fdad80c366dd5713f5830.exe File opened for modification C:\Windows\SysWOW64\install\Update.exe Update.exe File created C:\Windows\SysWOW64\install\Update.exe JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2460 set thread context of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 1740 set thread context of 2164 1740 Update.exe 34 -
resource yara_rule behavioral1/memory/1736-2-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1736-4-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1736-5-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1736-6-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1736-7-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1736-14-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1736-11-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/1736-79-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1736-310-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2164-350-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2164-349-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2164-353-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2264 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2264 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe Token: SeDebugPrivilege 2264 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 2264 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 1740 Update.exe 1740 Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 2460 wrote to memory of 1736 2460 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 30 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31 PID 1736 wrote to memory of 2192 1736 JaffaCakes118_84420814705fdad80c366dd5713f5830.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84420814705fdad80c366dd5713f5830.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84420814705fdad80c366dd5713f5830.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84420814705fdad80c366dd5713f5830.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84420814705fdad80c366dd5713f5830.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84420814705fdad80c366dd5713f5830.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_84420814705fdad80c366dd5713f5830.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Windows\SysWOW64\install\Update.exe"C:\Windows\system32\install\Update.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Windows\SysWOW64\install\Update.exe"C:\Windows\SysWOW64\install\Update.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2164
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD54abb8f1af5b5316a38d5b56d98a06c91
SHA1c06235fba42e869b8588a25eaec8f2bfd52103c4
SHA25676049bafdb268d282d220c78496017f22858dd88aaca35f89d9e887799a602a8
SHA5123277a892e82f4e955e05c181ea9eaa2fce1512d7b0377b5d55fe73c3017231db54bb4bf5de90826e04be482956a6d2cfc62180d400a6e301d0a2c8788d8af44a
-
Filesize
8B
MD5e22dc6384a8bbac0ff5adbc3d8174eed
SHA1a6be4ad39db2e37663b207f263e963696368b33b
SHA256227cf0ebdda77248adae9cf14b200052568a2133da6abe61ec74eafd9aff9266
SHA51209f0e451382bd3dbcb1e986953b0645b5f81dd2610e66a5bb846d2803b7a8a72037b6c0ba122f5efead851103a6a9fba55f2e1a3087229751595e25824735d02
-
Filesize
8B
MD50f27b658c6265af71a047dff0e712d2f
SHA15cc255aa51dfffc73e182008f6ae874dcfeabf8b
SHA2565d4e7b662f9791a80b86e1c5c24454290bcc0cd3e58f92b0c88429a41917a7a9
SHA5124b5c66135ad80c2f7985b18f19eaf83840e0af3f3066e100c1801d010edea088b8bfa95c87130a3bed39924973b51d0bb402e977e86db786f0c1feabb6d878c0
-
Filesize
8B
MD52af479ec789fb7079981ef4c6b7dd1ac
SHA1ba48c23df500aca0f63dc40fce5f7fc3db5bfb3f
SHA2566ae7d5b7b83239ac9b4f052d7a755d2f1e1dea0e463f7d6cd6ab691cb3e2c0fa
SHA512e8bbb44863bcf2b3d1710cc294437f718a3ed0ec2b26034d60c0272574e11ffef8ab2d5c28626023db6f0854047190602d61dfe1e801b5150edde27fae6d3ec5
-
Filesize
8B
MD58a4cf7eeeef5733a8362ebd6a6d52747
SHA1abda2ed961b64b22e361803aaf7ea3964b42adb8
SHA2568652687053960b11bf1c47ce3d17ba46cf84a5bff8d4383f53ae73dbe4996d5c
SHA512afdb5b8adf3e565d30ccb8c6fac00a6fbdc65dfaeb377a13f7b531b570f8a1e0cf0fc35ed789edf3d766701d9ba1ac92c1b4c687f417748d2b38953f75f4eb70
-
Filesize
8B
MD5cab7fbed6e939f33dfa1700ec68a51bd
SHA1acd01d0921452291848c7940c8ab63444479dbf1
SHA256844432f0321b3f67c752976b103d2d1c21c9f363ac1b5833e65aeb4f907c2e34
SHA512305a2d2cbac7fca28599f28cbeaf5e133f5ae3d09b07b4b7fa8d3bea5579fe849ec2886bb710be5e5e8770f43630daa1ea85c8e212117bd89dd8f4c3d2fa2437
-
Filesize
8B
MD5b256ce54b243a94a6ea61ecf3907d83c
SHA10d70edb869574a848183154e8aef9949f2b73786
SHA256f48b38c04b5da6f5b5345dabc578b02c32567e520c958975911b3eefc3b51a13
SHA512c7e41f1b9ff9ae482ce62c56c69fd3d75b48bc2415252d0de5752fa53b607406c56caa2d439f63e5520e7b5f4e43edab49903769e8c72960c6f8390fe762cbe1
-
Filesize
8B
MD58227b0659d746c7fcda2f88279c15be4
SHA1fd1ec7db5147068d003fbf08f2dceea2ae21e14e
SHA25633f4a9e76ddaddf3bc1157bba453dbea0956edcfbd4d0182cefda7a81388de0b
SHA5124d70af09af3c1d94497158dad5b2d338ba085cd515d874e5ecbaf30bd889f203f371d8f8f0c72046a406925cfa16f28ec69e0ba9ab26ec8f7ff1bdb70a0c06ba
-
Filesize
8B
MD532ca3943baae9814e63af85f87f62e03
SHA18c35b50df0085c75fc81014d44ff4f323fd14133
SHA256b6edb09d1cac9992bb19934b00ac9a173aeb66084fd5b759a79e363e54f4232c
SHA5120ac5a38b7194cd8bd1a8c83d2c582b41a4e489b5a5ab0b2e25c9fef6b34b5d948b20d5a46bb68e0aab9080329292a89cf0bfba54333de7a6137821137a22a5e7
-
Filesize
8B
MD53609c7d48adfd3477cfbabd000ce2e81
SHA13fe8792a9f90fa2135bf5cf342be638b584b8187
SHA256bd91efea63037bb63b6922976d4352bbc95da8a89b7778c6a3c3c087e28e367f
SHA51283748aadb73257f46b050b0dc693f5282f3fd00e68b118e224bb0e60500307868962a680a38a0b83a702679017d592095479c097c28ab587c88eeca539040359
-
Filesize
8B
MD538ffd96e53fd7f66fd4560019611bae8
SHA1ce3cf22f4db29f2cdcb2ed00ea55bd7aa5051085
SHA256fa0ee84401651671007285f2e4a129b1d21ff69c5c32acac1acf88fc6ff9db2e
SHA512b8c0e3bcec342abf75f3368dfc7a95ff1f2f435e3b639979ce3cb7a30a6034eff8bae5491a15a9abe84dc56a48a212550d425379ce1607ede40747987d2d4380
-
Filesize
8B
MD528e818627fdf487a4c1b52d09edb87b2
SHA1b597fbb7c228692cce1928dafed66147d6b2d69d
SHA256dab596c61360a76c91b926f5d6585a77e2bd00d074ab6e05e34fb229155a03c0
SHA512f58e2cc37d2e3f40a2d70d64f536e44cfa6a214bea65bd8a1b2dd4fbdde77c8068ee9e65a8f5a1101b4a3299eb8149af643a0d1d48f72e3121886fbb6520606f
-
Filesize
8B
MD58946e53eb37dc8c3bb1557acf2f86949
SHA1b08baba66672c39b340a118b0d3a7a39fecc8c81
SHA256e1a8c4a273bcf3fc92136a93bb3c5acd6e2364be5ee03a2daad6d7882552b35c
SHA5129d040bab705cf9726832b883b81a87bd305b1ce8ac6ead76e0fb4faf99a3850676dadd140064a111fd5d07d9f83adcfade53e26eed0b78590b53f93196a9b41d
-
Filesize
8B
MD5bc0c247955fdb3c5621c147b79ba9a9a
SHA1cec36848046c9908d8db4a2fdce68397170125f9
SHA256f68308d8e50571e94d190ef3707efa8fea81a4313a7bd72104cb1cfdac25944c
SHA5127a75820541272672cea1a4c77ea135ed99f8004382575ddf0944248788c0de29978c36c32356e75cd50ff6cd042a604d853262b3e8645fa8986dd5948a869da3
-
Filesize
8B
MD560bc84d679804cf0dad2186b846bed83
SHA11cc5c258b424890517153bde5049f8c91705c73b
SHA2565a406504bb041b44e31696de8a076677df530f5287f52c8fdded251c86a5279d
SHA51234dbf1ae510961274c5748248e32612f9e6efbbd8044277224f0b6aa54f9091c1fb56dae716a4b7ff60a60eafd9557301edf9320975daac6584c8a0fea7d60aa
-
Filesize
8B
MD54aafe3339acaa655c5d22e06c31dc57e
SHA15b30c63ce961b58d7b6e0ca4f4bea392cbf823b1
SHA256842f14e07fb3f4ebd3d17b90c2a0150fab57df35e75e268c9a068cc4462d8656
SHA512cd720f14bdb87ec7a159c53bb6c462b8b59366f69da3bece2d5f801910f2ef68e6b423a0350df039e7a4065767aef233ff3881e6f0b3357f706c2060d402b99e
-
Filesize
8B
MD5951f1a656b6bbe1d7ac7e27a90f6ee46
SHA1ca7bfb208ebdfcfb718bda05de1adce9734006c8
SHA2566aee802810047b199f18f3283f24b1a7697e55a93dfd1db265bc42da88d2e3ff
SHA512f9eaf2e8299966a13e68b664c9eade2812ccd48af00b947affe4e725604e094d57b98dd470df7db8a3c5c6f77f2e110a3cf137ac0b437302f77fdaa779826ca6
-
Filesize
8B
MD51178acc1fdffa2cb82145f6fcc5ed4ae
SHA107a0d1606b5cbc0990e03f24c7d2ec9fc2baf826
SHA256cdc28d119712f28ca09f0c6d830d4703a0a0dc040c6acf67f1e60c72c95257bf
SHA512ad99f5e6aa219c1f4b004e2691f85ae5a5ed6e29fa8fd994d397ecbeb0f3fd04d9a88f4f53e2c4b259853e79c800208b44a39345bf02f5fdda0b00f9248a9c1f
-
Filesize
8B
MD54332ac1bcca1b4b8909e73660194a904
SHA1505474cef0bace3444a644f6e0432e7f88f50e73
SHA2560aea1cc07e3f397b248c6264709b1aba78e14ab60940909c76b073d08782e1b5
SHA512fffd3a96b196cea26f9abdfce46cadacf79572cfe5f652e1343f4fd0ac14497b57d52c88abb47a95b0d953f3ca1659e59c993dc8254fcb3aaa138afa13e85cd5
-
Filesize
8B
MD57dfac49dbab42c0b6df8b132a645f8c6
SHA15e7eab4efc6e5d0c923b3c9ee68f28a21cece7de
SHA2564230896f170b6e231076ebafc692e0961e49796bb67f19adad673c05834ed5b2
SHA51270b2cda67490e517713b98c28e332a039a8daa76cc36a2704b93fe7f21090d8369ef5a143e5bd2b1c9cdf21b215007cbeb49eb27862edd8b4c8bf7152013174a
-
Filesize
8B
MD5f3e6e0e831d5abc4f314ed6e7dad8361
SHA1f85da151a7afe74cac6c26f0c925a4c47ac6f815
SHA256b40ce7ab76d383834cfc3af26ec2500f4552f9ea5ec84886a355d7636850827a
SHA51222e4e50923d960ec41c8ad94730120670387a1853cd5aad9330489d1bf7c9f56507bed93986c82d6581a4ad7962f8ba08d82ff7583defe3e3766e1696e2937f1
-
Filesize
8B
MD56529182472a2fbc7ae8502423465e2f6
SHA17e8bf49adf52237f686c404d9ee26c901b1e6621
SHA2561077f588abd6898c3bd5410fabf8f33bd1c09ca93ac99919a4c22d2ea425f178
SHA5125621d54655d6873d782a88cf8d0d1f0a8719058572ecaecf699200120ec5e97f7aa32cc68ca33827e4c5745275b691aa772a0a78f36f2ebaed5fca6010c14cc1
-
Filesize
8B
MD5a4b19b100ff62ede20dc71b74758aca9
SHA13b17ca4b096af690a24609a225b20e102de96d7a
SHA25610e73e0563bfb00eaa8301b656d91d5e20838cf608a34f4209495694d7d89ce2
SHA5121af05447a5534f3bca986bcf0681df69d4957e37d3801320c54b55d238ee8d39c5c747c724963118ee50b42ee20550addad9d864d455a9b5db292a0c4ce48330
-
Filesize
8B
MD57a662146b7d08de016204fee081cce53
SHA1c2650a23c42d350e823fb0e26388c5e3c7d60a29
SHA256faa155d60efbdb35decb66184053e23b1dd2509b6ed16433eff49d89d4388f00
SHA512d451a8aa849374266b8580741ffc521d9edd7d07bce96ff6898eab529ff7a059cd8c88b697461dcb6f16c3fa835c9b929e16bd6cabc3d17fa2f8f202911eea14
-
Filesize
8B
MD5533f269d67289f4e22d88aa3c311624c
SHA114960cc22669bfbe32ae33cef3e7761edf69c9d4
SHA256327940e2b2204ab36d03d64e20f78a349a2a7dbb420945eb90cd9b1e808d6edb
SHA5126022732217dd82324e5a7dad0db5d86afc634ead6c8805972de7ae3ad1a189421e7d50fb590ee0cf34eb7b4b984dd8d136c1b67b1e8dde0f801e7f34de1a228f
-
Filesize
8B
MD555d756cb4a482832c601985f38c6d884
SHA10bf95e0f1e02ac7bbca7393c9020ea11d760981b
SHA2568976a2f0fe02bebea62a7c2a5040a4c49dd436a02e9f603326bab6dee4e216df
SHA512738d1ddd8d9965d2859fbeed86d0fe29aa8f4cde1bd86bfe0cf7ec0298ef6e71dfd92a41e98fb28ff41204f4826f83b08c59e1d8f05b3660636c34d41b6a98c4
-
Filesize
8B
MD5d8ed0a1607b732c252044b18e2e904e4
SHA1cadc316065581153ba27929cad4ac18984ebdcec
SHA256910bf571ad5094c449346713818f8ac3202fb67198d31181034327736e473761
SHA5126ffbf93e35b87b1e4badcd6203428670e98dd54a7d50fc2cd86f59e02c46b6dd3b9902a2c649889bf0e2565180f5b8d42b887c6bb02fa2371ae5ea9980a3e12d
-
Filesize
8B
MD53580b9d3e484139847389b2e15f3f12d
SHA1e6d9283d5bcc53e8b07e6f12b9e75bc997299488
SHA256c4d04c86d4d6b4fdb1a9f391d933e5b4801c4edad14367d930bbd5477ca6a456
SHA512c754779739875ba0a2539b5c9ff208d60cba2bc5976f4c32feb3b00c91f002093fcd625f38d6073ef91152ed26586fec03869e0c450b14417fe1c733f3ccb61c
-
Filesize
8B
MD56cbae5da9e9e47b7343a2e66bf642207
SHA1d0826727f681705bb3a8b422c5b1210705c6739a
SHA2568ff5c2b5003ac939479bd115d14dee1f6c5897f42e1eb1e700d22aeae24526d3
SHA512498975d760ec3b4254d3094a2242e84ea998e1a1c4021752cc700a2a46c8c91b6f5ec6fb288d4a3ebfaf1f8fa64450cfeb4522a6b8f201db23160b13a460918e
-
Filesize
8B
MD5ea52671d06cf5e990db2d88aa1174dd2
SHA15717078ca622a8eb3605fe997d72944135a51ea8
SHA256a40e0c67e41318cbf5a0efd76c3d3a0982c6d26162b8a77f1cb8ec04bb0c7b87
SHA5123cd2adc94a4d56614c1028781c04d6b155d4baabad61dd94886505f97cc1ab5e979a3d4095a07d0d0038fcbd743f5875dd7e53f3bb52806a40f4b431a8939244
-
Filesize
8B
MD53d1e08f7ae55e1e14ab1ab8f4f4dabaf
SHA18668969fe87b9ae5e073ec03bc31a6c17ee7dab4
SHA25631cdeae794f88a4c9aaac61199c5d0fcee38c7a128c4ab2f2b16555045d27088
SHA51282e0192f194e889d4e9d62bd754511716ea60eaf07684aefaf0402e048e4011ba18d792bba105e8dc9538c86a44ce167b987d464e25c037f19830f7cd11723ec
-
Filesize
8B
MD5065354652ff83d52b83c9daf66fcb5af
SHA13d0f0f615d846ad52540e8a326a25f99476bc030
SHA256280d8d0230c8045fa21ae96ea1551a02c4a0bdfd452dbac4eecb137e544f32b3
SHA5128c0fe349a47d6b9e0dda52c1e06db1e13ea7be8f5720f60220e59dc993dba7bca09863979ff75c4d88e9877aa330f46349f72614d1c7daf6f465de2684231675
-
Filesize
8B
MD51cd6b8aa33726fd80047e49deaf8ab14
SHA1e2fc5b1e85b40ada621a81151079c849635ce3d6
SHA25685e7dfc4f51f6311c48ecb56bfd91feb2f67f6e6710ef9078f2f59e193cab307
SHA512b9387d6ab9b6677babfe4beacec16dce5eaafebe8a514c0d8380fac210ee617daf5f134f43607a591a10e901aa1f6eed430b933a13cc5e8eff5ab2828176e705
-
Filesize
8B
MD5dc2570c2d70f3255a6bed46523a9a0d2
SHA12297c099cff8a8e44221929d38b22121230da5f1
SHA2566f033f56cd1c08e6579bebd92d06497200222ec51ae01be867f8a5cabcd30872
SHA512c9b79d2f01282d94238b7a26a2aa238dae3c969141739445f1e902c6719678c4c1d708b5ffd0ac3dd82129013475ede2c7705c5c127b9e29c88e79ce37ad413e
-
Filesize
8B
MD5679c264699fa032ad897606182a42dd6
SHA1b7ae58adf651239af65352e0414764507d54ef6b
SHA2562ed8d71ac8e2cbf34593499f20a1d4c41d5454cddd313d57fc1010e012591305
SHA512f75fc15dc0f7c77463aad7197d2bd8b69c12dbc1a4df7732ad47b692ed16c9206fd945a9df493fcb742770d713b158ebce51af6c0e85ffaa062275d5c2c3dd5f
-
Filesize
8B
MD55c9082708f69f24f6017229d629c684c
SHA17b7ca25bd37602ea76f38e1125e92f923b19205f
SHA256a6219209170763d5fa4f2a0c49ceff3eb685076b928fe0a3c8c4b69cd0f7d4dd
SHA5127acdcd3796470bfc152bda9db9c2c97b979bd8bd4663c3fdac4feceeac602933b9b23db612bc4e79097ed5dd3e5779bb09bb94984aad503ee0f0beac680f6459
-
Filesize
8B
MD5cc4edaaaf609346e03e54957cca7667f
SHA1035f591c86bbe9c6cf14d189402637a1e36f9d64
SHA25658bbcc75655726661d9a4e6898b16419ef19c0703ec7ed52c16631d3e21d523d
SHA512eb86bc1d759a6d8bb90fc3dee4f5ce14a41a0ac4a01a36d73f990bc59d83ab4b56f20fc579f7ce49838b3bb496a1ad9f656c6dc4f6c85ba0d348d75a12ef3918
-
Filesize
8B
MD596a60f9f24a625b54e4ceadb07e9a973
SHA10d8459f3e240c3afb0e4660ffa2a39641e208ec7
SHA256ef954ef106289f07e9b73ddf8eaae1bdc61548fc96983d7ecfb97ff5b36dab36
SHA512833c6c9fa44021635710813acef64b9adc635f738ff3f71b69e1d99af92a7ef370f0af8133a4585f73dbebe7f04d1e320b1aa0a0c687b716f7bd97eb391454c9
-
Filesize
8B
MD53959907f4a8c11f5fdbdcddd0bdec5c0
SHA1dee5cb6242abae3caca7abe42bbdf6be03ede6cb
SHA2565a6f220d874231c38e84ee89c633e105fc00d4d916d9f4acc30a0d29aa06467f
SHA51267820983f0fa6d2e2f6756ffb4537d2d0dc5c0c0d855e46fbd1e8153204ff63c224ca497017a43cfec85a12ad41434d0849579ca5adf54285bb2b45d01b6588e
-
Filesize
8B
MD59e9a8b06204124e9673a730c6f1158b4
SHA1246ef06b06013f5f3800f1fbfc6580f7c0907b56
SHA256abdaa0f3cda4bbb004cbda477530dac2c4107bbbffd75a9627aaed10f13d3c80
SHA5124b07a4e3b944c9b4d54b60970041366981eba15306f9810f1c91c3754dea3aa8224b411809f28044ba0a59acec4ee17a6b3b84110055495fd43d59987c006ab6
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
Filesize
328KB
MD584420814705fdad80c366dd5713f5830
SHA1f0628fb578daf51c2f5c799b68903c72166d8787
SHA25625da581d16da426be770d3be60f3e3c10ccc728bad8a88b082b50caeb16e8304
SHA5127873708d5438ebb9cfe14dc9f462e72ff50802b54d565bad5b1b000ad2fb0afc9dcbe2d35937625e2fbeaec7b42ef33c95ae755631a80b63875cc22b0c23a4a4