Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 17:36
Behavioral task
behavioral1
Sample
f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe
-
Size
345KB
-
MD5
f04f5c550ab73d8c1d4472b04a9be779
-
SHA1
860ef10c41d6a1b56f91f0bf9e3101f68e615522
-
SHA256
38a269c9ccbd442b4366348dfbfa48b0b4e15beacfab27c5ec8257ed714a7d18
-
SHA512
9e69b49b9478a9a5f61197670dbc0ce781c299bb18e6ace7ee7b86d167a9cc8210e16bf5fcb23fe9f1e2834a9ef0a51f20fed3db87e50cd06077191be6c085eb
-
SSDEEP
6144:AmcD66Rm5JGmrpQsK3RD2u270jupCJsCxCsIBhd8v:pcD66VZ2zkPaCx2h
Malware Config
Extracted
cybergate
2.6
vítima
darkcitow.sytes.net:80
darkcitow.sytes.net:82
darkcitow.sytes.net:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Error al iniciar la aplicacon porque no se encontro sqlite.dll. La reinstalacion de la aplicacion puede solucionar el problema.
-
message_box_title
Generador Ugc.exe - No se puede encontrar el componente
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36Y172SK-618U-12NH-P664-456KUOS475L8}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{36Y172SK-618U-12NH-P664-456KUOS475L8} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36Y172SK-618U-12NH-P664-456KUOS475L8}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{36Y172SK-618U-12NH-P664-456KUOS475L8} f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1548 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2924 explorer.exe 2924 explorer.exe -
resource yara_rule behavioral1/memory/2316-0-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2316-3-0x0000000024010000-0x0000000024072000-memory.dmp upx behavioral1/memory/2316-312-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1332-540-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/files/0x000e000000018701-543.dat upx behavioral1/memory/2316-867-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1548-893-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2924-889-0x0000000004630000-0x0000000004687000-memory.dmp upx behavioral1/memory/1332-895-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1548-896-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini explorer.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\server.exe f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\server.exe explorer.exe File opened for modification C:\Windows\SysWOW64\install\ explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2924 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2924 explorer.exe Token: SeDebugPrivilege 2924 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 2924 explorer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2924 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21 PID 2316 wrote to memory of 1192 2316 f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f04f5c550ab73d8c1d4472b04a9be779_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:1332
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2924 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
PID:1548
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5dfe8d7c61b338242c3400fe753ef67c3
SHA1da40d8a9149c0582658eeb4067b15522a1584181
SHA256d9220539014848a4f8b34d628b38c9621e5b5f57b90f4574aa30c55ac8dc64c3
SHA5122c3355e05b6db6b16638cbb0eade7ae6b418e33bf3792e0124405195b61fa9476882c7ca3424525ac89d96941ef144448c7c1982ff7d65005667f90617a5a62c
-
Filesize
8B
MD57b7eb081ac755ac79be3243293680e50
SHA114b4a7bf59ebcd2e206b5891547a70739c415c28
SHA256d4df044c94b5dfa1160d9e51c80aa2aede24e74cf269b6133f7d8c3fdb4d9466
SHA51286a98d9713079318a16c9119a0430bc0d5dddb55cd9df3a45247523590f0f7eb44c11db6b3af7cd9310c52c5c1ba801e9530322388d40a47ea5a7fb42f39185b
-
Filesize
8B
MD5311a9f9923b0fc983d5cd95779b2ddcb
SHA133b0b947dbb09a116e4497166019cd98a8cbaecf
SHA25647bc236f587d7319dbdddee702b6aacb92ecfccfb42b69ccb2cda1d50241889d
SHA51239ef226ab251cd382841789cf4c9def0ba32a22b4610b8db7f9a86eb9a69807dc1b1a3116668c8fcc4cdd581a72a157c7784228dad334a91ece28dd3d3601bfa
-
Filesize
8B
MD5cc25f8aa5f60b82d48aa5256935921c4
SHA11211818af642b4696cbf63b39556bd5a62f96092
SHA256889e545eff0bb1fa5435dde639a864514e749e013821f37c7a44ddd4cd98dd96
SHA51203265605c93893ecbbacc1472c3b88347d323edfe151ef9a9cd5e85491c714bdf4712957dd57afd8b7805c737aa45508d71796330f0a6e012c01396c9dbf41d4
-
Filesize
8B
MD5457af60c639cffe0e13c9772db0a2712
SHA1360c3ed8ba9f097f87d07388b4ccc982edbaf273
SHA256d5d12dc345c401b27f8b4f241939feeab13a325aed6a0017b7acfbb7d6a6a255
SHA512ef4d79130c2376c585d1b7a7c07f4e111a6b21d048584a43ec9dd1a86ce2d7566823241c6634fa54a4262af0f8bd703bbc15f14fad3fc23c95dbc8f9f0ba3559
-
Filesize
8B
MD5c8945d3eca3330ba61fb49eeb0c391e5
SHA19f0dc9f5a460b9f43286c7467d26d88f16f812f9
SHA256afc9064c1122ce2979fb2c241f3e9f2d18b34d0401cf2d15aa65ed3d0a85e51d
SHA5120f4124b4af9ec678a2d7ae17bb07588e620142682485d6c45922cc2f81a7b9a58f3a1ee21e0fb14ff6e2f69c8ebf879bf4b62e53e90efd50a0276df7a5fa9c20
-
Filesize
8B
MD58f3a26da2f2f4c297bd55989945dbac9
SHA18854d6d1dfd4dab790d6f6a30642c4fcfe89c76b
SHA256fd8bae25b89a9c1e7722eecde59188c6a1c450d722cedd3a8f901924f2b860b2
SHA51238d5d7ce6bdb0a3860073bf3f4652b9a1e83d9ed4d5c651759839b91de9293350d1cc94946b1187433e55924907e96df05e29522f05fd73eea9ba5e49d41d6e6
-
Filesize
8B
MD5064c6f83ff139369fc9043f9bdc5a25e
SHA1d379e54646a84ef042084ba07ca57afcae64fd97
SHA25687c31f832100596ac1056bc30b394413220250818cb600fd8e725b9454264429
SHA512776b320092e77569b2c5b66796dc4b07f6f7fae2958798edabe16d7c2e69e1c72afac3f5ecbaa819d36392f2ffb85c1d23aae66a902dc3db8b83a1314620be98
-
Filesize
8B
MD5b8f51600a07a77ee5de7f5bbf1344c23
SHA179cb251a157fdfbcadd112fff0dd5a7237b9d439
SHA256536b7d140c96b7c8bdb84954d34df74bde7b6052dbb2f1d87e0370c69401b530
SHA5124e5557bc9a6e0d99ddac6862783b9de36516d7fb3dee16f9cda657eaebd0d076f9a19c86122cb565aa1665205832fcc005707652d7d9201e5c33228382b5c409
-
Filesize
8B
MD58d91f68925ef1e317dfd30d3693083ac
SHA1e2f128fc5b6c061fa2281f5a75f5439b39592746
SHA2566ded8ba27e48f66837efe410c6c9230ad0917bebe58a3c91abc4bfc007142f1b
SHA5123d8e707869a0d7e1df649eee79201df24b75d10bf196cf0a34906c62165901f5d3cb6465d2e5df8bfc2a172f9ddd1fc86f8da20dbbba2ec344907af63912fa74
-
Filesize
8B
MD5aa24e803781ebad288307dbd38fa7d57
SHA1baa4d5001d6005174217283721173c3a8c84f4c1
SHA256ce8affed468953468d5c7884c4ddb7aeebc6c7075bd1820865522f5b72fa7e74
SHA5124302ebf3b76d3f46f31fc058159e2e6a36b420a6b870acef5fb5124f8ebcbf16f8b661d5390be3f9b0dd06ca72283a2db7c0304a9ded82fe6777690f151aa32c
-
Filesize
8B
MD53466005ed5ccbcd7487a893676e215db
SHA11083777b109502ed021b0facfd6c645b4979554b
SHA256be504ddb1d0c039307daf0fc56592ffa425307948f16f7801969e8061c893b09
SHA512e315a895408da25e9cf78f5003a8b2866557ff797bd6dda9d08c4703b74bfb002d1ba280384fdf3a270ba5bbcbd83c8a4e19ea559c7109dabce2fcf31e368d3b
-
Filesize
8B
MD56861daba426780b16861798a4edfeaae
SHA186e58d57913c20bc3a5404bcb1f9c498a683c11d
SHA25610b3567f924607f8f4a89eb324acf6d292a5c35363c324db9af078bf37adbac5
SHA51228c730deb91a6159982ef029605b219147248b9539b15900feb49547730bab4f1df9d051c4b899f6481126c2648b4ced7dd7d633de1338594585e866cc0db828
-
Filesize
8B
MD5f8a8d672f2f50746a7f5312d9e4b6500
SHA1ef07ae6ccc1c54f537fb8cedb26ed40e086fdac0
SHA2568e7076a8dac970ef681d9aa86b8c01b940f1dd109bf5245f2864b56001d73aab
SHA512ff2bead52aa7037e0fa3786aad0056b968930c8f1232ef1ad417aba4084332fbe9087d60fdb571ca34dec7e52531b32f7a973b62bd93b8682395ece83376cf52
-
Filesize
8B
MD533091fbebe3159b1f3676f75b608ffc7
SHA1cddda52722b01c0f6b9ff81f0dd459592a81c273
SHA256fc3f37cd904129209ec927f6ef3a831863475fd7bc271c071040a9ffda005262
SHA512c1aa36e55857863e1c40051f2bd2bdfbb10c059ad8c6665e7830d4eb818cf7da350c79e792ce6dd9f0b1e584cd79356e2df6b2e811a12d033ca5f1d7759faf13
-
Filesize
8B
MD53fa255a716a2df95d26f851cf251d633
SHA14a281b40c26bc6edbbab41a73b40aa757ef47850
SHA2569cd535c81e6d429f4d92a94b3f049b74a2ac233caf9818c6fb9ec16a6479af3e
SHA512ee46058ec0d7886ed82c730f621e2f1613657eddcc96d18194de0aa9a9ef7bb766daf6770b14a14ad819e602a40f4c98d6913f1a86414f66b66e4ff20cdeb510
-
Filesize
8B
MD53825e1c77c33f9bab9e10e3da22fc140
SHA198bcdc698c70f60d90f0c9197aaef1e5f2d5f09f
SHA25686991f214b2425c6079a66352bd56d91b1ea62c68ea7159b46d3b5bbaf4b2b9a
SHA512f6b6fdb3905d63980fbbc90ca3cde4279d5b041ff135be3d90fa053165e974928bc6ea6a8b2b722ec38d95116fd0b849f96a211bd9f687808dd8378ba8f37f01
-
Filesize
8B
MD5af7d8bff43d9c338f493fed6e60263c0
SHA14d492fe2592e5c3cd4163f148fd5f577a41b9639
SHA256ded0512ad4c93c45327f477be4fdb584e1bf90daf6f745fb0a205846e948d070
SHA512cc77f35f6f084f2eb40a1d74e3cd8f02258a18fe4e82e3eabb9376908bdd8b1216694850f6443bb9f97dd340c8c28e0cf7ca11a2e5d3e87a0e12f82307488e3b
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
Filesize
345KB
MD5f04f5c550ab73d8c1d4472b04a9be779
SHA1860ef10c41d6a1b56f91f0bf9e3101f68e615522
SHA25638a269c9ccbd442b4366348dfbfa48b0b4e15beacfab27c5ec8257ed714a7d18
SHA5129e69b49b9478a9a5f61197670dbc0ce781c299bb18e6ace7ee7b86d167a9cc8210e16bf5fcb23fe9f1e2834a9ef0a51f20fed3db87e50cd06077191be6c085eb