Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/12/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe
-
Size
367KB
-
MD5
f7dc859fb3a961c08a05312fd50e8383
-
SHA1
845a455d43f3631b050e1fd252dd3c3bf319c0b7
-
SHA256
a6ae05c10303aa29e7bcae9b0634b5dd7b1198aa6b7cbc49a7418118c947f61d
-
SHA512
5f21814a55887ff7f4dab2c7b969b8d117e87dc05631376339e52a612437951e7e4a1b57ffcdeb8a0d403db9be91ea913fc07c329515499238100e04dc6bc627
-
SSDEEP
6144:cdvVjqqdqqqLJqkdh/zn2g6Z7KNaSCvTYorUikCRYgbChYm7xBxk/kW1ny2vKQvR:dzT56TtoRCxGxA/t1RUSIZEc
Malware Config
Extracted
cybergate
v1.07.5
remote
vietnamm.zapto.org:81
UMWBXI3AN0V8QN
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
vietnamm.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
vietnamm
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\install\\vietnamm.exe" f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\install\\vietnamm.exe" f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{KGP8Q3L7-CFT1-50O6-6P47-K4QTVU83J1BO} f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{KGP8Q3L7-CFT1-50O6-6P47-K4QTVU83J1BO}\StubPath = "C:\\Windows\\install\\vietnamm.exe Restart" f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2308 vietnamm.exe 3964 vietnamm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\install\\vietnamm.exe" f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\install\\vietnamm.exe" f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4104 set thread context of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 2308 set thread context of 3964 2308 vietnamm.exe 87 -
resource yara_rule behavioral2/memory/2424-27-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/2424-28-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/2424-31-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe File created C:\Windows\install\vietnamm.exe f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe File opened for modification C:\Windows\install\vietnamm.exe f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe File created C:\Windows\SysWOW64 vietnamm.exe File opened for modification C:\Windows\install\vietnamm.exe vietnamm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1308 3964 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vietnamm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vietnamm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4708 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 4708 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Token: SeRestorePrivilege 4708 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Token: SeDebugPrivilege 4708 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe Token: SeDebugPrivilege 4708 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 2308 vietnamm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 4104 wrote to memory of 2424 4104 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 83 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84 PID 2424 wrote to memory of 2156 2424 f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7dc859fb3a961c08a05312fd50e8383_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\install\vietnamm.exe"C:\Windows\install\vietnamm.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Windows\install\vietnamm.exe"C:\Windows\install\vietnamm.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 1886⤵
- Program crash
PID:1308
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3964 -ip 39641⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD50650e07bf9f976f03202d189cb15b5f5
SHA1ee27bca7d5521f8ea29688492688ee81e1c64068
SHA25628137c07a38a7533585b326fc0007e39ee5fa8e6b941e2856639a38c96721d60
SHA512d7181bbede558fdf575bb1c8c55711504e86e650338c7ad1fc2cf7ffe58504fd75cb01b545cc8989c548aa80a78358117d43a92e18e43a0fabc04e7cf979f3f7
-
Filesize
8B
MD52c9e3fe744585b40c529eac8a6f845cb
SHA14c902078839790e5f62acc8b56d8cfd82fdc9b19
SHA2565462fc8dc3cd8105eee322f252c317919be61cb73474f846fab6dd71b9b3fbe4
SHA5124f6c7abab4c8cfcb9085ef3496ef97816b81a802c24977d6d7ea812b54b10e021b584353a3a75ae77b12ecc6cc787b600f6bbd28ad9227e03b6236906458b6a4
-
Filesize
8B
MD51d9cf2ba18b2e4c8f270728a7baf3d78
SHA1fb8335dd07350871a841badbc99f3e47a655c36b
SHA256d81d7a47167f17681d324ed93b9c89c8a02ca7dd87196f35697154f0985d3993
SHA5122f1557332b732807005028876e55823f8c31d9129c512ab2101c9e0037b01222465bd207f6e8996cb0da9d2dd970a06c9f49bd5fdd87776abc646f5af056da69
-
Filesize
8B
MD506647f3a7c3171cee6cf8008f2c8dc51
SHA17e6ad691ef9c7bdbb35cc59fca72c91e48dc9f31
SHA25699629aa5e790bd52cf02a4ec5454636b4a58dce524274c6aa705cb5194691d48
SHA512ae817e4edb10195eede50cf557c369b81a2b2e2fd3c82cc95d538d740f24147196109c73f8c0316bd29b99a9fe70d35c9678531e609327ed3ee06b32f2db0243
-
Filesize
8B
MD558be7110276bfb3b773ee1ff8d10a55d
SHA1ca4a77da4e3d7d71aa81aaf8f6be0ec10705536f
SHA256c57f265eaca1ee83f829bc394f0a715c4d58a94d7b0a534afde47ab06361ebeb
SHA512fd0e61ae0f9cd6b90a3cf31b0d5e3ade8644b1e60d812e7040cea373ef30e4741203a14be8b864fc84a7433fbca452739b7e62eeaea22e4ba6e95b30cda67d5e
-
Filesize
8B
MD5c3b30edd804498d6650382be15ec9e4a
SHA1c5afbb095514ecfee44ee26365e03f87e55af9fd
SHA256637145ad4a14b4328d73cc832a0090a353eccbaf9b1e39e34df0c4f60bf8f773
SHA512aea436bc38b6efa03679ef0a0f121cf0237e245d91a0e927515ff9e60fcf106b7ecc1d99573384acf8bd8f84e4cd5be49ffb960ac5729d7851c64ed5c12b32ba
-
Filesize
8B
MD536834e0dbe42a67ed6fc40252300b1d4
SHA175eb1e303d112a070e42f1a35a75fa7094d36611
SHA256fd636825edcaa20a6bb0fccf1a2bd034cbd75e6fdef08703e3fe16b35213119a
SHA51227e2664ee51b92d6d3d8e0065aa1704c906f499ff6ac3e08f33365cb6752584d2781628d104b94866b96fd19ce596d8dd9c80a314a586abb3ac791735950ce05
-
Filesize
8B
MD58a4fd5c89e3c2fe4f292ee7f74a23aac
SHA1b53931ce56ca916c2f7c0c014006ccb0e44e258f
SHA25662540e896344dc473e36e8bef4f985beefc34fe84a535d1d7958f86b9831c447
SHA512840a11edf680c1638d6f0461adfad10d528bf1ab113c63e5638f2ad799710443b292c734d263042f7b3d3b429543d9a6acad8e50968889cbdad3cce5ab2448a0
-
Filesize
8B
MD52d5a16c1847511aa5e23110994bc2aca
SHA18e2097afcbd850dab3075990928c1649cd7b2a79
SHA256f0cdcdef82eb4d8da767f307bf9c5a6a96fb847bbb84c99fda0ae327b961f92a
SHA512bdb2a5f8ccc52ec646c24a97cfc03a00c109675ca147c14862ed13ba1ae0c3cac3003c3df5393b9e343bba88e302e3e6f4509dd03da4db4963bbc92ab50df315
-
Filesize
8B
MD5290ecc0f5b4247f88dfca2cefe85ec79
SHA1119136c2ccbcf1213858f274208bf8af85f71a9a
SHA256621e04cee1cc8d9c534a42abaf3597b3cc0b70da2a33787993fe6cc3793878fa
SHA512136ef6c848631121f081fa5391c31230bec6ed6173e4409789b6442b35c0368a0f9c7db04559af965437a24c95d677b35df0ad4db46405e0bac77ff6c95c45d0
-
Filesize
8B
MD53afad757d7e490ff0148c4b23bf65eaf
SHA1dfcfc858d378b812d73ec90f5eaff0339f50bfd8
SHA256654ad722fa994d385737866eac0a43b87cb4cc14779a2712549c55ad222b44d5
SHA51247f3b501cc1a86746fcfeb223bb32d3c6174c4f659ed8a1511df1b2e58b000f4be8a71c5cfa2965eb88b97f516c40c69bda65ded8a9f33ea3b51cac2d935f074
-
Filesize
8B
MD5ba368e04528eaa7ca4c097cfda62c758
SHA17395a13501fff47bac72fb68711ea84e36932d97
SHA2565aef06d83fc195f0d62c562e36b86a9dbd7104f89a181443439abc440318e48e
SHA512878ff14783c232990a77acfa13a19f7e1ff462aa8c4906ccf76ce119643038554d4685b26fa18bf50cc8a2678936bd577270cf91474b268d548a193de7205e07
-
Filesize
8B
MD58beac166a91e9b5289f31e17e4d22490
SHA1d4ea08fc3a549c79f7f0cadebe0c16ccb478f90f
SHA2568caafa86a5b0e3edff9c9cea3d68cb3d6cb3759bc58e281b5cf5f5c05b4433f6
SHA512fa68032a884bcd35a15109b5d276fc764247c6f5b090882e65f5da14f5604b6005612989694be891ac75838177096d5f94cc308f46a07745381e6b4d5ebaeff5
-
Filesize
8B
MD5eec1889d2e6d70635ac6e2fd409af838
SHA1fe980ad0df02c60f1f66421fe8a2e5725d69183e
SHA256f55ba11768416aa91fbf33c57b7f80f9b8cf67771aa5331294db3d56b9733720
SHA51256aa1697b5cb6afe95716c6eb6c88cfdd068ad1b44e7ed5b8f159667caebfb32024e5612a005f40d07f4d4f07a390ae3e1770557e95ff22a272dff6798fccc1b
-
Filesize
8B
MD567a031e878383ff64d4e5b696602df53
SHA1c0052a035fff7f1f6bc6655c2feadab3c9771ddc
SHA2566145345f49ddfdbf5a0d22d87a7cbecb90e67a04fa4c652a0793ea8f0951b675
SHA5126b6402cd51d2e6971351b75709f1110cc02d1f12c35bd8aa43e586f5d2b614659f82eb88effb74f1c4a12bf0cba43a12718597538a112887e8dd72b58dd77d4c
-
Filesize
8B
MD57d0fc110d8a3b575ba409f7036aeab25
SHA1963eed7273c16d254ede347277fe3e292642a76c
SHA256b2d369e84cc551f61aba0d5c57a325d101f6de2487135115c9f947c70f8f98c8
SHA5128def9bdfb08bdf3780abbb4f4cf479c152cadf8ea777ecbce110b5b20c710df1ccae24666313d557c4e13f36724cfe912d5ff2803322a0555b2c840f48d2b2b5
-
Filesize
8B
MD5c4716c7c84ccf9c64a4e264817cdf0b1
SHA13eb791a8e5f23834d9afd53d95497b54978cd3a1
SHA2562473cdd717dcf86a3c40475715878a439a0c5c8e81f56116607a4064571af652
SHA512b37710f6254d940c816857c968dcf8ddd6c035b16f926aa7f6b4b6e2b69ee84772623d2af3e5ee8111319b10f9c785458bb3197f4fd216312b5203efc64f16bf
-
Filesize
8B
MD538666c7cf82b54638fd1d9ceb8a82aec
SHA1d1c28173228d2ad0120c1e5054eb49a78bff8bdf
SHA2567fa25067e2ec6e3ef3fd4dd232e59e28c6f1d706f46b99344bda4f56ff3780c2
SHA5122ed3cd77b45985c34cab8fbb17a5d88dfa4df070b73fc588119368971a6135e2bf433a26ef9bf8b4aa8d04913bd139b709ca08354dca36a24638b4ea057e878b
-
Filesize
8B
MD5b501054e8b6754ddcb656b9890f9fb06
SHA15a193edf2d3acba1bba435c59e19f0c1230e34eb
SHA256a80f78ca4f3eb224f26f2eea8aa2bbd1cf5cefaeb9da016a442986003f7fd6df
SHA512cddd9ac07bc9545827c32c22ad5adf8d40d0947b3a38e4af79deb6c8ad43f87180e69d2e46de300334e3836503cefb10a06d86639ebdbdd8b576d414848e59b3
-
Filesize
8B
MD53984fe6850aa202a7d23d018fadaa60d
SHA1790c8452ef0a5e5c6afb7330477e3969982b6d65
SHA256a1d8d965bc867a4a2c5a042566f37cdcb5de42f829b7c8b513637be687f67c0b
SHA5126b558f08e0565caad58e09580daf1f15da7fe3d0f2d7624b427b1fee4df3a8175d7809042334b0d906e963ab3171b2974e7466809d4de842e0ce112d4aa02290
-
Filesize
8B
MD5668e63a8f8af1e7bea422f83ae5aada5
SHA1988061459fc9b80d916386d4ceb62927d84f8f35
SHA256ad70d5b8036da1a6b8af8bb7b6c19503ab5928a13bf0586c24ef7ddacaa1331c
SHA5123637ea141f80c96de4e158820a44e9822e3e83bc5fb7ac91bbfe6eff841316e5a53ced0d7d8c41c2c7245b83fa779a938811211bc990e98a7695b67c0609f1b5
-
Filesize
8B
MD5188683c5fb58c42d5415b24dd42b8a8e
SHA177fc08a3c59ab6e164989bdbd2cc7afd8f87bcab
SHA25601fba99a114a9d0c68db5a59a8dc3ad47177a70a982846912ee93288278c6c86
SHA5127444cf3f90d276b2a12ea94bf12511dbfdd5af1efde4be464e7c9009d954e10f1bbae8ad1109ef91cef5fcfd49ea11d2f283ee932b63362145b9236f144ca902
-
Filesize
8B
MD5a49093b13f46a89aecfbd40c26da3c65
SHA1eb1e02e0143bfc955df9c4d17b4da313ee09a2be
SHA256140be3da7a1cf58c8128c7a81cc4798ebd350c41f16a1ad5f6c4659f657055e1
SHA512151e02471e3dbb390f8404a8762bac8cea640208ec98d3711464845ec1f596e8561d2432865472d76651833b159d6d92659d270deec515bc82e23959de04097e
-
Filesize
8B
MD5c6dff790577f1bab1a99f22f67a48d6d
SHA12906c02089832228cd5d437201fc77e21942dfe4
SHA2568333c46cd97a0e68efc26e449dc3c792ade84b3a698bde6324abc4af5ca6f213
SHA51200bf3563f5ed4afad972ea7dfbee3505a48036bddb6cf97179833dde978da1819c4d587c8a79ce012fd842bf0427fe3208db2627ebc7dde62b1badd9adedec39
-
Filesize
8B
MD5ab14cd18475d30bdb1415077ff873bc1
SHA17525addca3daf4705ce7a0eae2878812212fe9f4
SHA256557fd88e5a4f2e8c4c43d09717453cad120606aa8238117604c5dcd01421d5cb
SHA51250779f721cac261d80deae2c9584b9fe922ff40f7b0bb8a3969f1170599508e6de07ee81a4340db6b7a4c20931ca7547333961f26c52955241a13037074e46bb
-
Filesize
8B
MD552d4c1c9891d393c983e0808aff9187a
SHA18a13127acbed6a953c196204c23375aae33026dc
SHA2566b77455b176840ed298d6eb21a44821047179cbe3d970d0a7103db9ca816f404
SHA51246f12195f7ca81d92c2f1353635644e9535d4e5fbe2ca5c68629dd1337236c15bf2957af6e7aaec5f1bdaf254e6f2ac234ec743717ac27be7fae263525fa33f8
-
Filesize
8B
MD54873a9343860e6c1bd6432865cc0069c
SHA1e8ccf74e55b2fe5059982c748769c8b7fca7be45
SHA256ce1b7a46aa0be37e572458e1ba1dcfa8fbd765636cab2109d5656b43d16b9c5b
SHA512841319f8f7657c7b960ad1d7f8832d1014c4291598cb8466a3aeefb1a189643b3efe4f3ecc49848e733e0f5ec55a77d00f9731807e6bf4e16346dd5e7c808fd0
-
Filesize
8B
MD5f6335e417518da11b965f20dfac87eae
SHA132b62cc79d10df491ece93cfb79701eb9b6b1449
SHA25624b2e56755803944dc76ec87b9f7512ddf674642a19832f600a91a6a836abbbe
SHA5129477d3b4d504b3c393c1c8a91e6d5361728bd72f1332ef3a84773e0c75d18bf239cb4f94a6b6cf457779c80aeaa7e74cce3131f6cd6e9e973ed7bb5e60c44573
-
Filesize
8B
MD5d0e71cf7fe3e1f54edab4e373e78802c
SHA17c0e00bf130a3ec0ee854b9291203853237d48b6
SHA256f9ef20b8256b22d517e54b2fda997cf7b5a9d9ffa789451a36269732ed341844
SHA512b92af24bc9b9f0b85d099e2ce5f6fed605061f283eb537ede20b107f793c08e02c59644e512868b319f8955271897129ece06a552a8d298bd63845880dd9c6df
-
Filesize
8B
MD5a95544234e6213c074d4df11b75e5ecd
SHA10ed17fb9a8797a32de72788379e3d40611b6a08d
SHA2567474fc0784b5c4a080337414973274cefd0652d9b651ec203debf2400a77479b
SHA512b8a436728677494ccddaae38c8fffc349097e71aa8d6d30f66abf0d8b683a3ac3d65969786acbeb4bcf03341135c70e537ba98be1012aca5c828af86ae82c967
-
Filesize
8B
MD518eff4487e63e694076ad74810dd5ccf
SHA1243065a6ad6ad3b59887361d7ddad862919de876
SHA256b27d5cb370dff84ff9ba9c18dbc7df1e58e1924a5e0573176143fb4590824a61
SHA512bf585ddbe2c1fb1688a947625489234c6420b73b401f866828a6e6c026a077bb9c106a30da246f78c1a20586c8ceffbc9b628a487d51b380b2e86792fc69eddd
-
Filesize
8B
MD5d5e717fd96b4267b2db174e99d0e5128
SHA1bb0a4d493cadd48718195e8afc9d6cc01eeaaa55
SHA256eb538d6084249f1288d45f70a3330fe0de2fb79e92305dd5120587184bef1d85
SHA512dbff6ca70cce8ad7375c83ccad0f7d60630d287fb01e411d9374e211821551ccf24c99c72ea6290aed81eda57eeaaee3afc55741ac07aa06f60763b3cd46f9fc
-
Filesize
8B
MD513ea5976b3d1d0ecdfeba23db1081448
SHA11f42655d651cf52ebea8b2746bd33ae87e4ff4ef
SHA256761c842e299e5423541ec9b718a038894bb81c05c64433afdeb47572255cfbac
SHA512c67f6d6143e0a7f4826c3b0052c2a2cc8fb5e3e66c1f14bef3b5de8f0889c2a0d10761c2e13952d8a023a945b02b6d8706fed19d454a11538056c3a34bbe8a6f
-
Filesize
8B
MD552856041c33d3f8128bf2bdb336347df
SHA1a4d26c62a700a58b46f865f2de4d8779b740b9e5
SHA256fc4633b78a468346910a69013d38e441fff81c5f9a9b3d9b6bd2f22d506f78a4
SHA512473eec742c890434ce934353fc4f04b9e362506f2f8fb6490430138ea6934ac4961c394ca8d6f2606e4d318b67912c4e9223d1270be63e4fc1a2ae77599c0826
-
Filesize
8B
MD5737b52dcbd268d4b6d95f72ad799d30a
SHA16c766eeb3edbdb0d92887c82fe5d115ebda85497
SHA256711459dc21c5acb9bb545d67fb462f6b0a50b58ab7ac69d22489c34c1a802a02
SHA5121dcf6a611dbc41d9ac0565ad37775824bb48e33882771d69471cbbbfb2b090a9478a277b1074b1b8a71d3a281cd681cf9f4ca4dbda76a0303add5a9626c1c4b5
-
Filesize
8B
MD52622e641890d770e12036aa7f9bf5ccf
SHA1966e835a78f51b8db626ff8b998571d8db50e8f1
SHA256ab9c7738683fdabfbd7997f8adbd0039dbc9fecf0c8df86282179c2bf062e056
SHA512d151ee31015720ff44b01dc9a73792f45bc62a5c8a189f79e3d6a6c93f34185b47bf26dc64c145b2e5ac178a0aa0629e182386bc599686da1991e5115d24d759
-
Filesize
8B
MD567f8df89ebc16b3fd034d56f2b79d3b2
SHA14505d820fa21fc7e266a65806b490946c68a53bf
SHA256553389ae2da515ece04188cd4a83ceecd6552e4ad7c49d6683df022ba80ba04c
SHA512500ba6c5852d1ca299ca05885db3dbba58faf45901ea72a71b99449fb5608537e31e16d9d585354fff6ded2f33d17576f9ef652ec7611db02f1a792cc68ae66a
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
367KB
MD5f7dc859fb3a961c08a05312fd50e8383
SHA1845a455d43f3631b050e1fd252dd3c3bf319c0b7
SHA256a6ae05c10303aa29e7bcae9b0634b5dd7b1198aa6b7cbc49a7418118c947f61d
SHA5125f21814a55887ff7f4dab2c7b969b8d117e87dc05631376339e52a612437951e7e4a1b57ffcdeb8a0d403db9be91ea913fc07c329515499238100e04dc6bc627