Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/12/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe
-
Size
590KB
-
MD5
f350e3c3768789f30caede8dfc289e42
-
SHA1
ac1e522b126a68eae8fa1ccb89badfa43df7c2ea
-
SHA256
b02feb84defc5b85ffd780fc406ba5ee3077aac3855c7224e022185eb25f756b
-
SHA512
28ad0c372a75ccdc1b4a8bda6f9358adafe3c0cc61ff78fce3f99d722a3f4b437b3cad0e50d014c3ed5497f481ccda19bd7da002d9536f687930f2e01cb37f6a
-
SSDEEP
12288:eMvf/KAYAtUWVtc+dErtU3vFj7cTVvOaZgFfCINyud023vx/sboxvTV5n:7HbVGMgk6jeHyu22KETV5n
Malware Config
Extracted
cybergate
v1.07.5
Scr3w
1337cybergate6077.no-ip.biz:1337
6G34WX02OPKHYL
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Microupdate.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
error 562463. Please contact your local Administrator to acess this file
-
message_box_title
ERROR
-
password
123456
-
regkey_hkcu
MICROSOFT
-
regkey_hklm
MICROSOFT
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Microsoft\\Microupdate.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Microsoft\\Microupdate.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{K6514D0E-LBI2-T0WE-M266-7TK14I316K4L} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{K6514D0E-LBI2-T0WE-M266-7TK14I316K4L}\StubPath = "C:\\Windows\\system32\\Microsoft\\Microupdate.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{K6514D0E-LBI2-T0WE-M266-7TK14I316K4L} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{K6514D0E-LBI2-T0WE-M266-7TK14I316K4L}\StubPath = "C:\\Windows\\system32\\Microsoft\\Microupdate.exe" explorer.exe -
Executes dropped EXE 3 IoCs
pid Process 2780 vbc.exe 1140 vbc.exe 612 Microupdate.exe -
Loads dropped DLL 3 IoCs
pid Process 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 2780 vbc.exe 1140 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MICROSOFT = "C:\\Windows\\system32\\Microsoft\\Microupdate.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\MICROSOFT = "C:\\Windows\\system32\\Microsoft\\Microupdate.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Microsoft\Microupdate.exe vbc.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Microupdate.exe vbc.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Microupdate.exe vbc.exe File opened for modification C:\Windows\SysWOW64\Microsoft\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 -
resource yara_rule behavioral1/memory/2780-25-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1848-555-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1848-908-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2780 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1140 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1848 explorer.exe Token: SeRestorePrivilege 1848 explorer.exe Token: SeBackupPrivilege 1140 vbc.exe Token: SeRestorePrivilege 1140 vbc.exe Token: SeDebugPrivilege 1140 vbc.exe Token: SeDebugPrivilege 1140 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2400 wrote to memory of 2780 2400 f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe 32 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21 PID 2780 wrote to memory of 1200 2780 vbc.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f350e3c3768789f30caede8dfc289e42_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\vbc.exe"C:\Users\Admin\AppData\Local\Temp\vbc.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1140 -
C:\Windows\SysWOW64\Microsoft\Microupdate.exe"C:\Windows\system32\Microsoft\Microupdate.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d31303be50d0907e9bb868c105ad4c38
SHA1b78e352a25f99723b4f650fd76374e45ede2d129
SHA2564743a29fcfc92add724b827ef7e6f58badf2710c647daa317e5bb75cb79f6f42
SHA51273c8310b65e8fc8da91e76ea1acc3ffe7f123af2a1d495a221c42f0a13b028dde7ef8e5e323bfc35e573c935d4487280eff972f49f1f908471a63105c1623f34
-
Filesize
8B
MD59e008a7dea3e21b4ae6e40d62610768c
SHA1d8a2e0eaa43b8976a0b89d0a51878b91387f105e
SHA25691ba10c2d8ee98673c30442c5b4215dec9299cd04b7c9a4fa299a8336f8f9dcf
SHA512b9b77e399621b0dbb35c1890649126beffc28931b31dc4e59afecb8a16f24c15f161fc810c19ec10ef39031a3d974d00a8077287ad0174d08927a2b933fd6f52
-
Filesize
8B
MD5bf513bc785ef1808a10cac4c64f955e0
SHA17c98f8b52ff467425bb6c48904e6fe125721ebe8
SHA2566b98cca18b74278a305a40b3f21282824f92e3c6e94b306de5d06a0474de3bd9
SHA5122641afda0912b02b82cd41974d09b97175fb8e7fa57b51c136148a8f8df0f93abb418fc2eea283007108a8eeb7802e1a19c5cd3ca6dbc211089ca9daf23ef8f2
-
Filesize
8B
MD5c76edcc2b6543b874b3773da24716b11
SHA190ad8be66ffd5db9ac5d1e7f3b2d736fa717d46d
SHA256e6f99d402bf50dac9026ecad19d50ba1baa347e3d234c0ce98b002a3abcaf8ba
SHA512f7fe1e99177ed59730b0295dfaaf587dedd2e9338c0c65a5240a848df3f3581c74e6c18d87b2a1f4c9baf3841aa083f582d3339eb874ed42f6657802689f322c
-
Filesize
8B
MD54b0eaf11ac9c4698a99f7d40f833be62
SHA17c3e2d5e0e84fd43095c9202aa19d95e8951ea9f
SHA2564151392f2b0398656de024ffd8698743d1207495dea6e7a1969a416928f4212d
SHA512d08c1f9e66ee7209d082d2c067a4db0f765db14c8c3b32bbad8edf8ccd6692c00c5a3cf0c3de3829378e398b10b127c8b37313361c7991e13853bf77a6bf5876
-
Filesize
8B
MD5c26be120589db1366709e88195d68081
SHA1e11604be1445f93bd32d282530d32d2a78aab9fa
SHA2565ee3c809af27629e71062c82b170f7b867165d80f8558a87d61c134eba5a8888
SHA512ab9dd889ce450b0b46c5f7ef6427dfe8f2806e511ab04ba616057c0dd260ded333ddbac6da4f4ff0c511c045b2bafc876a2c7a1b638285bec957701427b4fc8f
-
Filesize
8B
MD5f8b532c82bb52c0e1bc854f72057a459
SHA1af518d8fc1f8d00d77f45976a28560d5eafd4b5e
SHA25664c73c7e4e0aa70a596811b12d0ff7a1b2d393eecdffa5688bfd70fb83e28979
SHA512929981224607ef40bcfc1825924ed58e89140fea5370fdf176c60f22281dda775e1187f73c8355d18c1cd74654bba94aac98aee9c00a072c35ec6e3a04d6f2a4
-
Filesize
8B
MD50fc0b10c0bd281f6226143294a420c48
SHA1d23778b73db06539ee21fde25c4d06cb6d0844ba
SHA2569089c056a63947af75ef97bc3272d698378d1ae1e91f13794f4e0e23317eb785
SHA512c63ac800b27ef10374ff966863a5f9d2869dd51f08ec2e46849c7d6c972522b8a1395e190177be3b554df99bd44e52026dd1ad372766b04b312db4410c15d0bb
-
Filesize
8B
MD5b329a93c612e8cf1aaedc6f1c80e3aa0
SHA1f622566c5c85490ef3f199674bf8223a689abd3d
SHA256c0cbafee0ebdc35ea8e20669430fc8e7a291eaad91d6a7e00fc3e6b96ff91177
SHA5128b295866b4cdf6accb468dc7ead8384cf034c49cf1f501cb9d58cc6d1081d721af5f2b03f54cec9a51258b3b1574ca8697c2ac92e2bc880ac3540fef7164a863
-
Filesize
8B
MD542f1d5b978fd46033faa4532f54c9160
SHA14b0a56aec3d1de5d2d8f6200226c40d5756e7d19
SHA2563bff3af5e9848499239ae7f038f258b0475d277e4bf709d0983e1bc57b66ee6a
SHA512b9f9925d10fdb6cc7a35016e936be245f89e81b5e6863fb769446cd6b43f8db376b87d1cbe93df75cd2ac224d0ae8af0d7207f6ea7f0bcec8a1f23bb40a72707
-
Filesize
8B
MD554969670862de186d2981b6bef509e5d
SHA1faa0e023b20aa34f2ba362efb383e9ca3c467756
SHA256d572f17066d4e84f225ff62588415e60ad688bf627608de5a1df600aed84bf9c
SHA512fe64701cf68e4e77f844f3cf9b15dcd26780863d9844f3fc807ce06209d878c17383e37ef6d33be2f78207b4b5982c76bc1630966acd89741261b9db32e26ac2
-
Filesize
8B
MD589eef747891ad5ea24ba3742c5d8756a
SHA117369a210330052365d905489a76874c6ac89b80
SHA25695a1ebdd4e7484f04e673385d0bd32b1299ccb500ad7633d51666a2be4e579dc
SHA512cfb6a06aa1f9f388d2439058f87e1fe17906d851e7e9e92b8801a33b38bf52dccb2aa5d5d367408e2741d8bd5693a7eff90379a9ce27ff98786a6e7b4d198a4b
-
Filesize
8B
MD5702e8d773193557d8f96db4a9e80c2a9
SHA1be2222ae26b652c1ec454c292cda9bc0bec477d9
SHA2566f0d0851223023e332fc417f2b7d822c0413d1d292daebad8a2671de461e23d2
SHA51208a251e0a74f97c86d5bc0accf3547c9f4f2be2ccafd271f0de0a73a8d6e20cbc9035e651cb3ea1433a048da6c5c83aafc501f578432d3b96593908359031b87
-
Filesize
8B
MD515895d1d7189d31cad1125c2e97b7250
SHA1ae8f60d405de5d2390c2a00c912d55625886e8e9
SHA2562b3c0e6f602a9b7dd2ff66d4780b8576f99454b760c56be2540b814b6c12e52d
SHA512876cd804f7858fe2c4b336c71fa8d24a6b2f5f0a3414b211acad50b46e454b90cbff13c509fa22b52d199fd45376aef57a3caa4df1a6a41544bfef0137b64baf
-
Filesize
8B
MD5e91804b34ca4422ad1dd973627c2a3d9
SHA10ffb7dd2577dfc0b6697ed86ddb4d97f6b97aece
SHA256c50a35a17b293612cb2c9d3946779cc6526f1103fd37cb4cd70131fbe005c025
SHA51290ffce6cc17103d33e8ece0d43f43f102c503af92b081e9fc668752cc84862182716b5daa6a87bcf7d6ec02c073a01d9ed9478244aaa2cf9dc174381d7518cfa
-
Filesize
8B
MD510ef5202fdaf9785fb9067e51b880f1a
SHA191072080b8608a3e9326255a946624ca292a0da6
SHA256830a9e8ea585d3fb4663e0bb11d5b3e22037a770d5300ab0eccc7088138e8a29
SHA512df7688611a0e5a6357a72803f8d94bfd112a55812caf5f34e070aed9a4444a3aab63e41b6432f842fa186cd87962effa56da23884b556656d31531dd92dd7e8a
-
Filesize
8B
MD578cfa64d2b16820f6fc72ffa903325ea
SHA116df7e4845fa774d60f271fbb2fc9e684377ebd3
SHA2566f56e64d01ea179942d5d289b4d1e9dd58dc1811bf9900f436d16b27d7f5da84
SHA512c03a975c2b59a9a1851727ac69e4fc7a89272409ba7eb2d86e1239196f904aa05cf23549c8ee3b8738b52c2c101855534a41d3f2c83b2bff928aeea81bb745d7
-
Filesize
8B
MD514c6f80810acb34de9caa111c343d83e
SHA154fe766bbcfe44567156c1e3061ee310cf1825d8
SHA256da51a4e4faf65a8c46cd549010fcfe445f9072cfd0d4ca30e34987bb36ff4e80
SHA51222e2a95432533412b3bbe562e9fec2a794c4da22a6b736373726c8bfaaffcb7c25e31b141185136428cacbc3c8a23470e1bc8627466734c21947a75dd3a192fc
-
Filesize
8B
MD598304bd3431be54ec811188f50ab0927
SHA1102a72f16a5f49f323ff7fde1338fdfa3a406958
SHA2565a58111ca6e1a912c7e5a9f50c3ff29e8010d09deb8e59667ad20c5e2ded32f3
SHA512f233e707e9df3bee23b7a1b03efcf985c968dc40b634068e92ac64b35015bfcd5c0299fae32917f9b8cae9280ec620bea1c3a25ffc7801c1b5d58ece8498ae48
-
Filesize
8B
MD555e7f3cd358c283447bc8b147859f676
SHA1489063f595a95a70bca85eb507ed8f6b33bd45ef
SHA256dc753f563c2302188dd0a2419fdad98bdd8e204173b00e08da2ab5795975b404
SHA512e22afdea51d7691e8f9699c76867399a4d48c977d530654f0d786ade196e73edf0ea5f6b7935c1c81238b2e52b16303b879b196ebf945771777db2f4f207feb9
-
Filesize
8B
MD5a60234668320b277e22d0644c79f2e42
SHA1572f9121dcf377edb8a4559438117a1b6ecaa593
SHA256bbe00d819f82b56f12afeb7d34fd1e640db65a3ff9869ed8210d5d9eb0f7e850
SHA5129ba0d8a17541682cc8fd40adddf44c62a861c7c774cabe57ad3e3f1fd75a7d50730e934d240f1abce5ecd4496e99926e21243e0cacf6ad700cf53a9e3a06180b
-
Filesize
8B
MD56b04daeb36bf036d407e92ed9400f360
SHA13d760ebf2636dfd89cdff7fbe2d0b5c157405e80
SHA2563c09a460c085da377e478fb68c41e01393094149d570e66e265d419307b922f3
SHA512c27e6e11c4167effb806f8798a608e2602fc69e2a442e844948d28c865ecacce47c386369fda8b7500fbef05f7a4bf823c7ef1d94a65322622c6ba9270d331c7
-
Filesize
8B
MD524fc0d8c2eef82978871913b42676284
SHA16d80e5cb7da935f6afde4361b9e9bd4fcc43b95b
SHA25648b1441b7c82d7ae0c62cd89253a9f65896cbac152067a1aae69d300e6326825
SHA5127924c8f455e8d80d3bd9c8e262ff3ffe150b3ff7af3486cbf8cdde5d7cfcb73751f25dfaaf8b4e4bdb5e57aae91bd4a356c6ecafa44489f63f71afc3547533b7
-
Filesize
8B
MD5a4181f03a0ee390dc0b99127f75e316f
SHA17ae4b95b9671c6897a9f136a85cf02197dab84f6
SHA2561def690a11bc2230e13a5699d9045ea33531a3b78aefd44921355a83e9357561
SHA512227aea059116c33d968c30ad247029515310c580ce79250f65a4de75c66e91c850714c22c953792815cc282414608a67515c9b9fd817428aafe37b6cbb4d6289
-
Filesize
8B
MD51d0887a08d55db03e06688a16b3df764
SHA1753b3ed2c216629572e644aefa697a4da990fe1d
SHA2563fe917fd993328ae9404c525f9c9fe29cf2f2e3b7d5e3b3688f47ced6606dc09
SHA51269c5a9f24012791b90f85e03e52cd3bc92610429a1f4ed55cd9cbfae64abdd9bcafcd538ed5b5c6048e2e9d07f31fcd359db5484ecf028badd48af370facdc8e
-
Filesize
8B
MD5f0f100f4334c2c32434c8398e4fb4997
SHA1d078f4dab80d296c398b664b8b91698f80a3c7fd
SHA2565c80b9112713ca873e79f865dec55a73adeaf734b633e417364257e93bfec61c
SHA512bc31171308fbf7e73be70f4f14d0622ae34f203946a85179f851a3860753fe0ca024924a34120b3095ac6fb82f750341b735be91717441d9379a0fdc2cc9265f
-
Filesize
8B
MD5b3f61108fcbb4276aeeee1c69db4a740
SHA1fdc696f9eeb38210e8967185566cfd31e697fc0f
SHA25623ed5962e92724c827ad8248cbc5f32105feaa47816e3082fe8611921376c3fe
SHA5120d668ca5be72911d298700549dc9f4ef17d4391810bd952090f649abcc7400f491c88dc054b6b05c06f2781af545e3b22623f482b640245897585b2b1b555877
-
Filesize
8B
MD505d10fa2df93d6233885214217613fdf
SHA139635b596948d8ee7070c967bd958110b2972772
SHA25676049a9b47aa2c245dfe6b79e504383ea1367d526bae5dde1f1f7c8796253582
SHA5127e5c356da124fd93f261ad495ae2e22857301cfa00e2b8ef3de795aaecf3d09abf24e5b6ec72f89ada8db944ce46a2105ae640471ecb53228986ee8d8c5f3174
-
Filesize
8B
MD53f98510c88e9fd47b13b2f7ab3b39235
SHA1c6316278a37fbb35c424a38802bc91a873e3d6ea
SHA256c462f0f57b677eba918c976949a68f4b199a9ba0b3dc31f4c05fefeba99bc0be
SHA5127b99e6a31fac5fdcf63599fb1a88aaa243d28fdc1275bca3812df0984980ff237943d1e6c282fbe1c4e0b0fd9b8aa18d90b92e00266905e4bf74ed889c0abe0f
-
Filesize
8B
MD5aab126b0fcfea13620e76268d60ccdd0
SHA1474f8493ff14afee24d2cb8751208302957f3d16
SHA2564628dbe1d12af99213c87b4c1e4faf04239f91b8685e33f78a59dfa5b51a7f78
SHA512ffa2b31bd8c4e082bc6da15d08866784a3eab83ac34f86bc5ebdc706218486fb698a5d4a1edcd4e20fa2268fcb4f6c0e6337bbfe956b1bc27b953ed8a611fd3a
-
Filesize
8B
MD5ff668f5d7159c022ec77bef71c81ff40
SHA1fa5a6e04cea7a1da8bc7708ea64da3184f833562
SHA2562e4293ae3dab14e47ed7daf1962613e15df7b96de9beb3a48549efd18cdd488a
SHA512c727391aebb6ce01ed074ed60763f9692d4f51749331b432391a1f78af15cc042f3019bfd290e8aece2a7f04907346e58affe808b6fcd8d1c5090f2e0011f04a
-
Filesize
8B
MD5281d13e9aebdd18ca14151f4e16cdb87
SHA1928b54e76266e3c56345b2e0e53504a26805d551
SHA256c5add97273b139e7397e3eed4123f92dc9597cfcf95256ca3c7c6cc96f26d0a0
SHA51257c999607844175b02cf5a247404c744e7c739ec29a41b6ee3c68899d58df01d0e3073273e3718f1db81e5b5a96bc3e8f20aad89f901b4d2523f30d211fedd29
-
Filesize
8B
MD5b63a9afbdb21f12ca4e3a6623d8076a1
SHA15eadaa2e4c43a6c1aa938355b1c4adf6ce00019c
SHA256b0e0e954bd99e47b8e66081977632479e3ec526639d5cf03d6caa7b145276347
SHA5126988d6f1df69233bbeb2490191b28ead06b596f316f7690eef71a74dff505994adf7058767ab38d2e67109035e16f69b2b29b33a25d12a4a619161e55e369270
-
Filesize
8B
MD5f571f176e93f52596e4434ff131b9bae
SHA1cdb50715ec9c9eff172b214f11169eee82b5b4df
SHA2564b4c59e54050d4569392aa10efc9cd3f76b1fbf8874a29b3b1837f19372901a6
SHA5122fa4250f088229616dd108443d3f90cefa77c3e0521659ec45b862e5b1e017ebc73f695662c2bfad778dc668c74633a38b77a27914009e6dab05fdb4572fa6f1
-
Filesize
8B
MD5b2acabbcc7f527340f9b4a4428fbddb7
SHA110826ea71e9ec7389d7b3f67dd74920d00667dda
SHA256fafaaec0b1fb3dc7bff7e9514c8703b963c11fc8b1e575fbd0bb3b6852236726
SHA512e43458accce947a73b2b7a66538bd227109acb65e40b4c97093e074d0d42a0f9d6385e3cce295ddb1d6864e0ec75c767f6e289d7151dc8fc1da3a957418fc478
-
Filesize
8B
MD5d64a06824124bfb842d79c4b1a3e9612
SHA19f2824b473f926cd09a105f02758e60fefa1c872
SHA2563a158653cbd301ad97168500f6dea238017c87d90fc3564d7ae19be02bdb3073
SHA512ba34253efbfe0fe5d701074c75bcd1e5a1d4fbb1ab5337b54b383afb0b50539a72788ffd593dc635cbec8b3bedf1ee2dcc44cf8eff2edcbeb30f1afc0e4dcb58
-
Filesize
8B
MD5099f76868304089d60e189506023b7a1
SHA139df6e9d4c401c1cd821229a9d9c699269889279
SHA2563f44bf0d770255c5ff1817f24adb874b23d8d779189ba451bcc9e829290fa3a0
SHA512ca8aa72f22cdb0dc7af7945b36ad2966f1b2922dbe5e0f4bb0f86a3cd088cb0eaba47f298ec97920250b48964018ec619a22998b00bbd22ff4af69238a2d1c81
-
Filesize
8B
MD54c8450cf06e9689896b0e995e4e80746
SHA145838caa392289c957abfc423bb883654b7f8e55
SHA25646f298d78178eaa55229138ae2174e580d1bc4ccf79377c93b69b5b13ef95df1
SHA512522bca74c77fde98e0c6b0f4f8e0020756e9f5cf1fb99c4792e235b4dabc56b3b5c2b2866aa9943ab743dc5d2b7073ab9c3fc39632fa50d393432fce6c8d4100
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314