Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe
-
Size
468KB
-
MD5
eae458a8d7c770a99fb705633a2142bf
-
SHA1
63d927ddd5ca89703cfb6baf70557a5ad4f7efb7
-
SHA256
f1a4a1a76e43602db98448e8229a1e3596698453503fb5f861d19c5df0a2ec40
-
SHA512
a11bfeb15f6ffd34a5bdc45c89986554d8078007e2f7dcbce78712768bf51cf62356811a0505c95282ba92effa11f00c8bb9da8d596de39910b1752d017dc786
-
SSDEEP
6144:GuLjGGm5UA4ewDqeUMaadm9wg1/WgpEp/ZHMbJkUdTni4snDpox4+pIZd3MMbt0C:FGFzpsHwfnJ9MZMMhJyni/2Zb8qO
Malware Config
Extracted
cybergate
v1.07.5
ADMIN RF
hack789456.no-ip.org:81
13GS63566D068Q
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Cannot find file 'C:/Extracted/Tibia.dat/' Please Reistall
-
message_box_title
Tibia
-
password
789456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\WinDir\\Svchost.exe" eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\WinDir\\Svchost.exe" eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{3HIK5J8H-G30E-8I06-283A-1VC4C0061C4C} eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3HIK5J8H-G30E-8I06-283A-1VC4C0061C4C}\StubPath = "C:\\Windows\\WinDir\\Svchost.exe Restart" eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{3HIK5J8H-G30E-8I06-283A-1VC4C0061C4C} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3HIK5J8H-G30E-8I06-283A-1VC4C0061C4C}\StubPath = "C:\\Windows\\WinDir\\Svchost.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2188 Svchost.exe 636 Svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2060 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 2060 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2552-583-0x0000000000220000-0x0000000000297000-memory.dmp upx behavioral1/memory/2060-1932-0x0000000006B30000-0x0000000006BA7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\WinDir\\Svchost.exe" eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\WinDir\\Svchost.exe" eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 764 set thread context of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 2188 set thread context of 636 2188 Svchost.exe 35 -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\WinDir\Svchost.exe eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe File opened for modification C:\Windows\WinDir\Svchost.exe eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe File opened for modification C:\Windows\WinDir\Svchost.exe eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe File opened for modification C:\Windows\WinDir\ eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe File opened for modification C:\Windows\WinDir\Svchost.exe Svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2060 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 3068 explorer.exe Token: SeRestorePrivilege 3068 explorer.exe Token: SeBackupPrivilege 2060 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Token: SeRestorePrivilege 2060 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Token: SeDebugPrivilege 2060 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe Token: SeDebugPrivilege 2060 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 2188 Svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 764 wrote to memory of 2552 764 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21 PID 2552 wrote to memory of 1208 2552 eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eae458a8d7c770a99fb705633a2142bf_JaffaCakes118.exe"4⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\WinDir\Svchost.exe"C:\Windows\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\WinDir\Svchost.exeC:\Windows\WinDir\Svchost.exe6⤵
- Executes dropped EXE
PID:636
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD578bb75a8156dacb50265e0b639e86f2f
SHA1a61a749a47cf1c3763146ef0bca781acc028a130
SHA2562c0434e084d89dce4203df7a18ea0f0cb05e7838292d8055bb3aab6c4b974bdb
SHA5120b9e7ae507644d43bd12e6728fd637b937d7131730706396ae52b9c87fb020cc6b3fa2e917abd806d75ddc26a4eeb5d953978cb474a4955983fa2444b0a6e500
-
Filesize
8B
MD597bd1baa1b5f0e88573adb75c4bcdc91
SHA17c1ec866ae0ba7bca213b578898ed46bb6428855
SHA2565b5b9435ec6ba3ae7a56a08138be7e375e8034b8b6ab6fbd53052e83a3672292
SHA512b0f1ae2715651e9c6be62885b37763a98750602b513ee81f44805c294349e46b2e388a60f20c96a2a0908020320c1a99ee152306a259c017a95abbf0b894b5d8
-
Filesize
8B
MD522bd1b7000e3b75621f9deff403c42ca
SHA1cd159b9be029185961b6f2352c7f1cfd2404a20e
SHA2567b6ef5b0791df3bf60e9c02552b752a8dc317189659ca78f63a98dbbc842e319
SHA5120abfcab0189fefb25323a1a29615556227c2bcd7365384d990262caf3e5fb5f9ca2604df778bf74c92a4da179f6202ff3ab3ed3e1ff78e7927890258ea51110e
-
Filesize
8B
MD56e168d131b14ba35d07d15e09d7f385d
SHA1f709e60f1fea4cd34cb8bf9249ab22bf3c31d812
SHA256ba9713193bb47a5a20374b706d1ddc341d9f4b6ba55b6c3e57f268a91b8d48f7
SHA5121b932814de86804b0ce1fa19e8d6da5bed77257f919fea24fd1a3cfa89debd2123539f94bb0d6ead0e63aab6ad852ad210935376e9382ea01b5cec23162b1f8f
-
Filesize
8B
MD593d9b964df590fb8e17e5be7229641f7
SHA12c8892d53e3a9ed45590b2d76448b9b5fd4d709e
SHA25611437fb75fb8ad69ab87cff296e040ac6c402c421686c72d496ab3ac350b553e
SHA512692c35ed3536fa3b51e27c8840ecf7dca46db603ecb0fb9de2380702da2b7c8d33fc83c8b83bd8eeca497e91b0899dcac35b8754095ef98f3f9fcabf9a619494
-
Filesize
8B
MD5faf533403cac28e9439d120c5b206e9f
SHA1f29cf5423582fae38e9e83a8d9b8fa5bdf3f7baa
SHA2569371d34c6127aa21a572ca588295a2e8ed57beda40164e5721e0bbd904d22b04
SHA5128e029cf7b5062a483e9943b89749960c8d9dc7c04bf630060b8c68947569fb36e0dc1622f2bfe117570e087a79727fb43ca920c506d44ad84c659a756a33468c
-
Filesize
8B
MD569474caeb95a2cb4ef64d08bdc6e9ef8
SHA1bf538fcb5716b3461f6031498e24aed52b353cfd
SHA2560430625a4e9d64e55b82929ce6e2339561fc9ab84a5e6e850db4dc00709793e9
SHA51220c47c9d5d2552b9430f728d90a629c0460c1be92c6281cff80ab85238b893eb71a53b6bee712fb85879c8d0ff3a7ffeb6c8c620b444f9a0276e0162525f74e7
-
Filesize
8B
MD5f3c3ab431ab5728c8258e75e1762772c
SHA1aa390da136a06542a9fe425dc9a9bff55dc85e00
SHA2565a099a8ce36888030f34df12cdd2f65f923e6d68daa09e1abe4dc432a5fce620
SHA5124f1e6161c6a9c513ef674c4072402ecac32dcdd2c5445bb5c73bea9e30f00b5b6974406d83ac623beff7f8bff4b92c0642ccd62906f6073fff2918fdecf7e3b0
-
Filesize
8B
MD51d9f5a4b508c58ceda1a762adeaafc50
SHA167856fe038aab96d100a102f5b11461763ddf58f
SHA256273f919fbd9295c424749dc4debde353852162c5456318aca74269155a42fa69
SHA512648ebb2ed71b49334b512199554c335e417bf3a83d0169541e3195ff7a5251906625b66e6f8384c801ce33700daecec566bfccbdb068989edd62c5b778ed8efd
-
Filesize
8B
MD56ccf96c282224a1f3be38b1198be140e
SHA17273eb7de06ae6289aaa17a296561c783d974fdd
SHA256d4d02c631891473b994e2ae983c6fb6ec0d99e1079fe9812016aba9d968ff3cf
SHA5120e49d795b21de3c642d91b2c4244ab2bc98465696beebe64d92d5073719b3d58e42b105fca639d48e8a6c4af2afebae8ef931f0f12f28d903c2be4ccfbdde2ce
-
Filesize
8B
MD51ee730273230eb4bc8cf81fcb6e47743
SHA1121fdfe284cb82a9de816b2ebb1e38e07b01b6e4
SHA2569afb5b852348f78efc803ea3e0a7e42b1c2386e44ea4356d531324d44cdd84af
SHA5124f216fffd70d6426f2eff6d2845a82be0fdbdd057d93cf98c06cd2b749aff8f77b2590909199ce8c76d0654d8472b0a689824d8defd7dfa06c9e0b2592acbf23
-
Filesize
8B
MD5db9c898f296ef5fb0e7a535502a6b778
SHA10eca139866b3d41545e7a2e14d063c3b72cb653b
SHA256cbf2e4f755a20fa4d078b9a5909add1c93488fa6ca3a4dd59adf0b0c84837bd0
SHA512face02ca6d54ff01becc93290e14c37afb154aaf0213c13e6fc147a75caada29a58b3b45a57d7caf2724ba0eebf117c85afdf422d759c65b707422a8df5731a2
-
Filesize
8B
MD5eccd91f8d4fc1915d660ea35a449775e
SHA141a79ff0c234926f45e57909791c3ebb7ed716a6
SHA256fe63abe957be14535dfdb033dbe5e8e927b6cb0691ac7922e522239688e144f6
SHA5127bf98b7ef8042d1e1ed299741028dce6fbcf9129b11914515ab7fc17be41befc19659328a9679dd6bff927ee0b621516aafa7c3b3e912924700462d57b94207f
-
Filesize
8B
MD56efcaba05e0dbcc6a633e3bf44d42b72
SHA1885af76e73e03df5ef2eb0121571b814c6dbf60a
SHA256d0113beaef243c0961db4befd1a3761d4b13ed9b3de6163033e9f366998334a3
SHA512891df2b27e3a2d9ce7806fb5b411866f96e290108356b6922cebf89feb913581d000d9a3f03343778b5372a5f435ac8298a62dcb355e8c5d198566a621f51adf
-
Filesize
8B
MD5301f09cdc24acbcdc78566d21ee02630
SHA1138d351aa13e2c0f8cb2bbc4deeb3528a9f95f3d
SHA2568a24c81ea52ecf2791959ed6912e571688b175e8cb31efeb2698ac12071aa4f0
SHA5126e92d0cb8c299286412762d4222b8b30378b10bc4ac15a76c8093af196f9e5d2ead52ea2cb83a9be113cd08ee18527d95cba96fc99ae33c970f77edc20100718
-
Filesize
8B
MD5d2eba59490f2f4ad0ba70beae87085e6
SHA1564d2f628a3f32c8288430ce61ca3b2037ea1712
SHA256bf9fc421c3a13c3817484c9ef65e95f553db20e1be276ff7a7c7459949251adb
SHA5129e2153927a8bd16cf60f56da1a65c244a6f72476ed2ae1447130bd170a9483d489b74c053faf367c81818efcafa562629ad0ec239678cfa7c5b457ee7bb668c9
-
Filesize
8B
MD5896a5c80e949b0f54ebbd3a2283a1569
SHA1f873112dc26bc634acaa066a6fd5382a476182ec
SHA256aed53af3eff05852d02f223c2af120c9bb7df9379b1351b7b777ade5d6d2aa48
SHA512226468e6e8760abdac2b514b6ac617ec969563cd13c60fc1b6d3062a66af9f9c36525a2738ff19743977af07e14e493b0f2462db4e323f428ac5bd8cd096e491
-
Filesize
8B
MD523f3e746d48227c07a4c395492ac9856
SHA119797c90527abb6995341a33a75255533de1002e
SHA2561ce854dc01fcc603f3057470179f542050504294539f04a3bb38a7888d62d9b5
SHA512b5ca4da08d5c85a317b5d6b017f23150e006b86d2c377412f13fa2d0ae7d41f5ce8a10d86346d119d7edcf090d931bc15e5b308e4ddc6c44da2f947be83ab256
-
Filesize
8B
MD5719c118875f44dde3326b9e3a252011c
SHA1f34d407d8ac822afa9907cf0d0864c3f4cc15f75
SHA256c03311db00ba6786e54ee7aba2836fd6a9dafde72fe37af354cfa1e4de6a841a
SHA5123fb4e6c0dae4de92c092920e457c080c7afc5d98c9e79144ac5f1390a0106ba8d017f4b6794af6b54a82d2ab00c534d73a1dc6e29fa5115e6bcbd9adf9644ca3
-
Filesize
8B
MD5de28efb98ea4b9f7835915a8911e545a
SHA1d0d02552f92a477f029b43119686c8979c61cb8e
SHA256f8ebb878e6a7cbbcaaf98f5b3b6d3bd244369540ac35eb833718d8a3dcab3642
SHA512b939405730346475fe74c64b1d36162a913144db333f6489c374a1db5deb372b1f9ce00246e7e5b103a12becfeb28357969b797b7f4f923e7865222408c26280
-
Filesize
8B
MD5f00d5d5bc24b639d0d6874f08d1ae57d
SHA14df2fa5d495891a8df387831ac73a6ecb0ab9cea
SHA256f7747a7c8813eae785fe70c221e66ebd447362678278d4f6df61117334754a18
SHA512bfc0cce70c88ca98a15e5951c633361e46cdf6df913db0b83713ec2d5e38f61c2fec93cf6e5a792945943bb71aee0b22a3e5f96af572e4d6bc0bd9d10dcdc1da
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
468KB
MD5eae458a8d7c770a99fb705633a2142bf
SHA163d927ddd5ca89703cfb6baf70557a5ad4f7efb7
SHA256f1a4a1a76e43602db98448e8229a1e3596698453503fb5f861d19c5df0a2ec40
SHA512a11bfeb15f6ffd34a5bdc45c89986554d8078007e2f7dcbce78712768bf51cf62356811a0505c95282ba92effa11f00c8bb9da8d596de39910b1752d017dc786