Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 19:58
Behavioral task
behavioral1
Sample
ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe
-
Size
548KB
-
MD5
ff3b7f563de4bd79698ca6e2ee3ca06a
-
SHA1
06e5eb41bec31f468229ea93a54976dc76eb4ad9
-
SHA256
ffb320ec60c0a19ad1a4a3dddd22075c6e66a94cbef4c321a6d09f5f3a36ae55
-
SHA512
29e2ec9acb0e011ed297b6bdeb1304ebd70593ec85b7b63ea89552ac05ed7f791797e79db7eb400cd4e08064e668ccfc2233bf6981ba0945ed16e83fd0a62a11
-
SSDEEP
12288:DuqrBDT27EdMxsygLDeFCv+WNCR0oX5M/k1:DxrVBd4lZjXB1
Malware Config
Extracted
cybergate
2.6
Server
asmida.zapto.org:81
asmida2.zapto.org:81
asmida.zapto.org:444
asmida2.zapto.org:444
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Microsoft
-
install_file
Microsoft.NET.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\Microsoft.NET.exe" ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Microsoft\\Microsoft.NET.exe" ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{IU0B10C1-5Y46-H4Y6-CF00-SA8JM4BQ8747} ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{IU0B10C1-5Y46-H4Y6-CF00-SA8JM4BQ8747}\StubPath = "C:\\Windows\\Microsoft\\Microsoft.NET.exe Restart" ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{IU0B10C1-5Y46-H4Y6-CF00-SA8JM4BQ8747} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{IU0B10C1-5Y46-H4Y6-CF00-SA8JM4BQ8747}\StubPath = "C:\\Windows\\Microsoft\\Microsoft.NET.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 1608 Microsoft.NET.exe 1672 Microsoft.NET.exe -
Loads dropped DLL 2 IoCs
pid Process 300 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 300 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\Microsoft\\Microsoft.NET.exe" ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2860 set thread context of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 1608 set thread context of 1672 1608 Microsoft.NET.exe 36 -
resource yara_rule behavioral1/memory/2860-0-0x0000000000400000-0x0000000000673000-memory.dmp upx behavioral1/memory/2860-1-0x0000000000400000-0x0000000000673000-memory.dmp upx behavioral1/memory/2860-5-0x0000000000400000-0x0000000000673000-memory.dmp upx behavioral1/memory/884-6-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/884-8-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2860-10-0x0000000000400000-0x0000000000673000-memory.dmp upx behavioral1/memory/884-13-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/884-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/884-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/884-317-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1532-548-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/files/0x000b00000001225f-550.dat upx behavioral1/memory/300-572-0x0000000000400000-0x0000000000673000-memory.dmp upx behavioral1/memory/884-881-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1608-904-0x0000000000400000-0x0000000000673000-memory.dmp upx behavioral1/memory/1672-912-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/1608-913-0x0000000000400000-0x0000000000673000-memory.dmp upx behavioral1/memory/1532-914-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/1672-917-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Microsoft\Microsoft.NET.exe ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe File opened for modification C:\Windows\Microsoft\Microsoft.NET.exe ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe File opened for modification C:\Windows\Microsoft\Microsoft.NET.exe ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe File opened for modification C:\Windows\Microsoft\ ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft.NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 300 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 300 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe Token: SeDebugPrivilege 300 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 1608 Microsoft.NET.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 2860 wrote to memory of 884 2860 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 31 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20 PID 884 wrote to memory of 1124 884 ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff3b7f563de4bd79698ca6e2ee3ca06a_JaffaCakes118.exe"4⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:300 -
C:\Windows\Microsoft\Microsoft.NET.exe"C:\Windows\Microsoft\Microsoft.NET.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Windows\Microsoft\Microsoft.NET.exeC:\Windows\Microsoft\Microsoft.NET.exe6⤵
- Executes dropped EXE
PID:1672
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5e18d8cbc78b26b05ab5f2c9589fcc2e2
SHA1e5931a83af7072391dca60220f66932c5de98c5d
SHA2569605a26a6c7d61a5a7eb2f4586a3f7d8331f1894edeb3eaa6896a208ee664e51
SHA512146b154c25599674c604122055e5f8982210d18078cb23d5037d46bc906c0899fa5762bab5b0fa8b4a65764e46683a6ccedc029f338a0a6f464e2178f9ada07c
-
Filesize
8B
MD5cb39f176812163fd88f07ee341e00eb2
SHA11f6d21200ae020625e8a1910c1b670cacb43bd77
SHA256c7a27894655ae7f9233a030c4c6400d1e97f418db37523f29908d9b34c17fc07
SHA5124d074f36f32af45bfe732e6b7822ed41505e13fab1e2c05cb372f28abb6e823bc3a1e02d0eae9944b8633f0a90df73e52393cb24c43b948f261f2e0876be6887
-
Filesize
8B
MD528c696ff5eb728fe67db0ce72eb6056b
SHA1abaf1154cad94efbc3f801a3053ad24f640b77e3
SHA2565853dfc45a375c3f0f8fbb1cbca992ca9b9c72b5f6eff58a3e652094b20a67ec
SHA512250baec64f766a75a70fa7a79dceb6e56beffec4df885b74f56e94af27f5ab30a76c7aa2f6570e3b6a1059b51cfdb0568c065da9a597b66a1e25deab8a900dd6
-
Filesize
8B
MD53b26093030e8b32b4d475346644854a6
SHA151dc46b55e8f292cf1d11afb04d4c70395b41314
SHA256f4ddb612cc4d62a4c93705f61219a20e1edbdc2918cb6f11aa44e2afe01388d0
SHA5121fbead627ed9a46094a51aca117453568ce37cdaeba726dd7a3078284ea563f0b30223003e95e81775f7c789ea729515338069917ba76c3ee711cf29549e3257
-
Filesize
8B
MD596924c9d2c3e36e4c3b94e11e2fdf6a6
SHA18c357c69667f50377ecf9150a6d1e0a2e2c6ab98
SHA2567e2cea1c68d9b200b0095dada5a6d7125cfc04e09d98b80b623a173905b8f8e6
SHA512ae72674f5d7ef8e27ac6e013125b1bcfd729cc40ec1f2fb2e9b5611fe02e7828be859f9c5ef82f6d229b81075dbfbbd21a62c37cc935e09bc09ff9a25ceca448
-
Filesize
8B
MD5a15aa21f59e3f2da22853756cddb586f
SHA12de5d7657e933785e2ef58663d8634feb16d8c63
SHA25604cc646e7423948d58ac342546fa6e75da47135c6d89094b384ee814e2933b34
SHA512346a8938248072492351d066bfb56f562418a71d3fb7bb9e7ba7cc78bec56534c50b7c958ca134f66db7d012667388140436f3744f2bba570edcb6d8b67a6c0c
-
Filesize
8B
MD5502384de9be0f61f32e81378fcbffdda
SHA1e71f115f234953ff5d34027308f8a72bcb72ba55
SHA25660c0eb459a0e338c379186b22830383544b1bd0a497e1587055b8d3fcdfed429
SHA512e689dff09ab3a65fb17c31686571f8aeea36f14cdb5c83452027b8da1987bf88f6831be341ba5c3b285ab10cfbf26105b3964b2bfd0900621212c38b2bbd85bf
-
Filesize
8B
MD5fcda5aacd79327ed8683a28a8a708f8d
SHA1b1eb3887dc57ca2ee51a92946633b6991f683d72
SHA256a09d385cc4c4851278ae8f0398432922fdadabba96ec488cf6b1c87b15ff6fee
SHA51241de6ffdadc0369b7fc12b171d97775c06e9e342c5cec0a29166bd54b8855bcb15221c365f65ae57f4d68ec181cb1e3d49903e6696cd644ba4db8de6ee710350
-
Filesize
8B
MD54b414d64e690c87a006b73f5d55ca630
SHA1d5d6d92d358cf6e8daaa106cbd7cde2f3a696744
SHA256350af8b9a8c1229a0f1a5575e1b3bbe32d9fe0ec6c674d2fead882d973823b4a
SHA5126797da5ceae4fa5dd36be57247708739e449a775ece978da6f1331f471b4955535dd9d10c7eab1a01f31b2c5e7dbc0556bfa8548dab9ad5ba35b81d7839052a6
-
Filesize
8B
MD5da573b4d846708fb9efa197f69a45741
SHA1e3ecc9c4fcd77e2eaf7d1047d1dd1c760d6b5ba3
SHA2560cd16a3d6eec4f5ebf486b6ca2e837a767ab0ee55036d9adc967ba28dd8c458e
SHA512b0c83b25fa50d73fcd092f84a7eb8770b824be924d42b12ae85e441c4c0a196dee4fe7eafc7e443dc1c77317a991e04f8c19bc3988ca625c5d052a30a94557cc
-
Filesize
8B
MD5d5771c8c2d9202b67789d92665b32fdf
SHA1f4cff8f1e02d6fe18e10e5b9dc0513e39c0d8cf6
SHA2561c082666d8890b054f458e27ec2c644f39c71238993007d03a100f781594218c
SHA512e877a3bd632d682555b154c9f9ae4e2d726ae8e5b619313df45f3e09fd173bdec9da44cd6c2adf40319042dc4853a3a432b04d2d5ad63c7d6531bd1992242dca
-
Filesize
8B
MD52b66680bf68b2280210c62265e682880
SHA1dcb48684657ea635c792369981be57058ff23c38
SHA25616072093d550f5bda661f9da89fdf3ee3438d813a750deeea759188b60928aea
SHA51219eee998f56949afb4ca4a1abeb4700ae9f4ae0e216afdba5a56ba7abec43a2d973ebd66cd9675c460d0d13bf81504597604d9df6eccdf5d0d8a4e67a69407b2
-
Filesize
8B
MD5c33d01ce06e6736d103381fab8b4f70d
SHA109b053d9f7e37b38843f6f85d19eadb7cfcaedb8
SHA256f6a9cadff6856e26f7fe171f2632cafd08747d3d935fae27c0de06207fbb6b22
SHA512b9f01ab51880662bb22cba8c162d049c46008e7cac88e72cc9c296fbe8dd4f34bc77910a1bcb77e7d21b86342a9d25a6780d60680f872cb1935bc32f27d99b44
-
Filesize
8B
MD5c3f09657215b5937ce7ee99a09242749
SHA1dea1a3f3b77e45d41c221cf74cef105f8a6e4a7d
SHA256216dac02edd6d87b979affa4c86c56d71fc853839f454cd1168f8696d0183a9c
SHA512713833b7f0a6de01cb40566c0f722f44d2fb0818dd467099177f77134d98c7b854d43c39961bd4edbb8e6880782b823fa2e0e33d3e7e83cb30ae21ec97566ff2
-
Filesize
8B
MD5a1bd552fc482e63f4475ca65c21cd2cf
SHA1aaecccc08f7d3e2a99afe1dfddb211434045aae5
SHA256db60fb723a64b9f87caa39e991b2c2765f2daf51c313936c88fce4d013118550
SHA512ae51f69d709fc1f9d901ccc778ec8bb0198dec65e186027092e134e4abcfed314c3a2384b9fcf0027c7ae991058d854bc38b19c6c3ceeb935f80de3abee283fa
-
Filesize
8B
MD51ec110c34d55a7a78de752b30e9c0c57
SHA1e905e8aa3a58b99f4a71ac805f660147a54636de
SHA256130b15b4cb9661107fc2d617c57a4eabcc0f0b5d921ea7a1dc6cabb879a060f7
SHA51294eec73771667e35b8e5bf9e893d43e3bd29677dde946bbd3973feb0ea5b3b4042b322c352fdfd23b55f648f6b6f0f1403a2b574a8bed5a153ef73c231fd7b76
-
Filesize
8B
MD5c4104335ac708489c664d989d930b4d2
SHA109259de1f8d6dcbd593c31de406d03fc608a4d1d
SHA256d4a773b7dedca92966a583314144ca0ca326c31240a054630508556554f5e1d8
SHA512b4ae70e4f04dd691dc3b8744d3731028849f3c3127e7685b384f2e01f1ce56b7f184d4b5986389cc9a92d462292fd8c653b9d24e3bacaf80d04b81824b8b0512
-
Filesize
8B
MD5b09fe8642d0483b2800a9a4100cd47b6
SHA15170740e3e92e467739fc1e4e19d79caee81e358
SHA2560c1455e11a2955d4f8c57744ebf88e5f09564dbe3c2486ca83952961bb07f7fa
SHA51270212888b192da9d0b5807979a4967fef4e9d049edd67acee1505c9d8a310168af962a14372c71fee96b1edcb2e0c81fc481f935294ed82681df9a9c7f3b806b
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
Filesize
548KB
MD5ff3b7f563de4bd79698ca6e2ee3ca06a
SHA106e5eb41bec31f468229ea93a54976dc76eb4ad9
SHA256ffb320ec60c0a19ad1a4a3dddd22075c6e66a94cbef4c321a6d09f5f3a36ae55
SHA51229e2ec9acb0e011ed297b6bdeb1304ebd70593ec85b7b63ea89552ac05ed7f791797e79db7eb400cd4e08064e668ccfc2233bf6981ba0945ed16e83fd0a62a11