Analysis
-
max time kernel
150s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe
Resource
win7-20241010-en
General
-
Target
6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe
-
Size
332KB
-
MD5
6d4ad652eb1006c39863ad878bb56e29
-
SHA1
eb2acc6e3eadd2252e6dcb422ab3965b6b2ed5e6
-
SHA256
df127cb1436ca391992997fa0375c19c33bf140f67e7391a6488cc13080865d9
-
SHA512
bfc17908c15a2bf62b0cd640d636b07720102cc6ce15420568358acdd96425f275123cb9d4e88d15ea625e77ce688507d04ea9a181f65654ad532cece8751cd5
-
SSDEEP
6144:S+R5emGAGugHUESZ4xdne8xk2gu7yTn2LEZmAMxptV7s4imQJqIPFaj:vGAFgHUESOxdnJk2PEZuptV7s4fIPFaj
Malware Config
Extracted
cybergate
2.6
vítima
127.0.0.1:81
playmojuif.no-ip.org:81
***MUTEX***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
título da mensagem
-
password
abcd1234
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Adds policy Run key to start application 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\SysWOW64\\install\\server.exe Restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe Restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe Restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500} 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Executes dropped EXE 17 IoCs
pid Process 2860 server.exe 1472 server.exe 1644 server.exe 316 server.exe 2272 server.exe 3064 server.exe 1256 server.exe 2900 server.exe 2336 server.exe 2860 server.exe 936 server.exe 2920 server.exe 752 server.exe 1588 server.exe 2288 server.exe 2764 server.exe 2088 server.exe -
Loads dropped DLL 24 IoCs
pid Process 2300 explorer.exe 2300 explorer.exe 2300 explorer.exe 2300 explorer.exe 2300 explorer.exe 2300 explorer.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2300 explorer.exe 2300 explorer.exe 3016 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe 3016 WerFault.exe 2300 explorer.exe 2300 explorer.exe 2300 explorer.exe 2300 explorer.exe 936 server.exe 936 server.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\install\\server.exe" server.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\server.exe 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\install\server.exe server.exe File created C:\Windows\SysWOW64\install\server.exe server.exe File opened for modification C:\Windows\SysWOW64\install\server.exe server.exe File created C:\Windows\SysWOW64\install\server.exe server.exe File opened for modification C:\Windows\SysWOW64\install\server.exe server.exe File created C:\Windows\SysWOW64\install\server.exe server.exe -
Suspicious use of SetThreadContext 8 IoCs
description pid Process procid_target PID 2916 set thread context of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2860 set thread context of 1644 2860 server.exe 36 PID 1472 set thread context of 3064 1472 server.exe 41 PID 316 set thread context of 2860 316 server.exe 47 PID 1256 set thread context of 2920 1256 server.exe 50 PID 2336 set thread context of 1588 2336 server.exe 52 PID 752 set thread context of 2764 752 server.exe 54 PID 2288 set thread context of 2088 2288 server.exe 55 -
resource yara_rule behavioral1/memory/2484-6-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-8-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-12-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-15-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-16-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-17-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-19-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-18-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2484-331-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2300-547-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/2484-832-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2300-684-0x0000000024080000-0x00000000240E2000-memory.dmp upx behavioral1/memory/3064-1012-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1644-1018-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1644-1136-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3064-1142-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2860-1157-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/3064-1171-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2860-1516-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2920-1501-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2920-1552-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1588-1562-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2764-1586-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1588-1598-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2764-1764-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2088-1905-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2088-2139-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 2104 2292 WerFault.exe 32 2224 2272 WerFault.exe 39 3016 2900 WerFault.exe 44 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 1644 server.exe 3064 server.exe 2860 server.exe 2920 server.exe 2764 server.exe 2088 server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 936 server.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 936 server.exe Token: SeDebugPrivilege 936 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 2292 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 2860 server.exe 2860 server.exe 1472 server.exe 1472 server.exe 316 server.exe 316 server.exe 2272 server.exe 1256 server.exe 1256 server.exe 2900 server.exe 2336 server.exe 2336 server.exe 936 server.exe 752 server.exe 752 server.exe 2288 server.exe 2288 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2916 wrote to memory of 2484 2916 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 29 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20 PID 2484 wrote to memory of 1204 2484 6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Windows\SysWOW64\install\server.exeC:\Windows\SysWOW64\install\server.exe6⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1328
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\SysWOW64\install\server.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 2168⤵
- Loads dropped DLL
- Program crash
PID:2224
-
-
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Windows\SysWOW64\install\server.exeC:\Windows\SysWOW64\install\server.exe6⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2732
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\SysWOW64\install\server.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 2048⤵
- Loads dropped DLL
- Program crash
PID:3016
-
-
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Windows\SysWOW64\install\server.exeC:\Windows\SysWOW64\install\server.exe6⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2156
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\SysWOW64\install\server.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Users\Admin\AppData\Roaming\install\server.exe"C:\Users\Admin\AppData\Roaming\install\server.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\AppData\Roaming\install\server.exeC:\Users\Admin\AppData\Roaming\install\server.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
-
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Windows\SysWOW64\install\server.exeC:\Windows\SysWOW64\install\server.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Windows\SysWOW64\install\server.exeC:\Windows\SysWOW64\install\server.exe6⤵
- Executes dropped EXE
PID:1588
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:752 -
C:\Windows\SysWOW64\install\server.exeC:\Windows\SysWOW64\install\server.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d4ad652eb1006c39863ad878bb56e29_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 2205⤵
- Program crash
PID:2104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5722f4815e57d59b7394feae15860be55
SHA1d1816dd986fe9cff91cecf6feb69affbbc1fc3ae
SHA25645612db3832377346c58de9d7dc5a8c44d066eabaaa8c45c4445e00d67a52b99
SHA512f2fabfd5915c87a8fc28f5c7bef5e1780abb56526edd7d3d10ad98ffedd438cc22f9c63b317a6785cc640068b942d1d7571e4a33d3cea9750637715d90a55d31
-
Filesize
229KB
MD56584f58c8ec45c525fe8e14e01a642c7
SHA1e2f3ae7b2c965be3b6eed937916e4d3c63854ace
SHA256c037a3a0cca6090c9484f77db09e2933fd12aa4467abb7487176efeea8b1fe02
SHA5125fd58911b602574800f7a6210b6e1c07891786a92709a83ffad40614ec488a50100a0ae4d900a8943c356f8edded88c09305a3fcf15b0a833785e76527a55207
-
Filesize
229KB
MD504b714387ac840f0af840f1516dc4f38
SHA15379f6fcd1e4808fdb53fc6acb78239dd72e468d
SHA2562ff92f1ff271037f1e10c071270fd2e4b4eac690dc413f34313b488f3dd285cf
SHA512892b3ae28dd4e0a3e02e41fb2225325fba1b170070850d7b287390c4fb179ecb1108c7c9a2bb63c7a194f491203286162c2934a235749b1deb74ffab264e2a83
-
Filesize
8B
MD5bc4585dd0c18e59125c0b04d732ab97e
SHA1119f5702eb350b0e0a6d5255dfd2593939e54af9
SHA2565e64329bc171d471c21f7d131768148c93c60a4727a0186279ecb5bda80fe0b8
SHA512f982cf0546346bc46ab96012e78a50da11a5c16c982c9ba7f10c556656c815d0d31a4dbf03e648568b47ce7d51ccee79c248c95d3f3b6fdc70ddbc8557463213
-
Filesize
8B
MD5631b75d1fbd3884cecd7eda70e941477
SHA153a0263c8ee3607abb9a51d5e11539f4d5d5b757
SHA2565f650baffea69e733c0803ebde0fea7b28e23e2535cfcf92ac9bc762d19f149e
SHA512f156e165f68f0d6a4b31129c28c21ca8cace199204ecc2604000b342a2acc1d143a71af976f5bc87b5d24ab9a4a8417d21d9ba698a590b63639eaf1100646128
-
Filesize
8B
MD5021452c4ae443cc914e611e51afb892c
SHA1cee95e0a9a57cbffaa0d450fb74cf5ea3cd14c5e
SHA2566ebd7f0dfd8d925b98cf294ec343bb908cdbe98524b0d318005dcf9a76d3f056
SHA512ee965a148a8ad1f5953b33d9e726ed3e3a096205ce498aa258aeaf12b048277cc4bbf9b01d6cbf83180565beb9ef35cb8c36886e4034c5a93459f8fe4a5cb9fc
-
Filesize
8B
MD50885e0f759fd528851d7ec7ea26e9843
SHA172c2742235881214c7ea0cec1be5b11e324a3d0b
SHA25655a7a7c132b03670afe15ee3f56bdfa60231b2e2c0befdcf8c44877caabb388d
SHA512bfac8b1b9dd9859ea5bf3b9713a432432b796c5cdc678b233510af82a64dad791bd38fe7cd6eb5005ca45031a494e7efac7ec3f1e4b9ebc799799ae95ea9b206
-
Filesize
8B
MD53e9cc927323044b54e2ce20d920d7b24
SHA1560ce453182390df8827734d1a260b0162e137ad
SHA2561fbab123739222433078b04426e938ec246380dde328bd3436638f6bd385e8de
SHA512e665399f2c83148bc72bf9a577a71020cbbe2dbd3ebadfdff39c95ea51264451b681599b623f7a0fcb03a3ba9bb2d5b78e4ff80e28c50efe9193a3572b1ed290
-
Filesize
8B
MD51593c397b66987ddec5814a3938c1e94
SHA13b823fd4e54ae3ff40ec6945900099daf94ef2c0
SHA25614366e2e61d9284c972156adfc40a12c007c2760def19e395c3bd7e797629da4
SHA512d6b361039a0dad4a72746335cbe5f2c1551c8846f7c5798c6bf0edc185cef48de9732afa54fdfa9945945a8007b6bec629fa46d81091acc6e9c79a5e9a6e006a
-
Filesize
8B
MD54f54552e1aa19ad13dc050ee12d23ee8
SHA1384dc90485a88f68e94f2357b4e02318e98fe935
SHA256a3648ed8c8baf7d96a5f9cfdfa76aeb63a8abf3c1ce9e5f9abc1b1690e3be54c
SHA512f6bf247ce2e22925919bcff2d6690aa1fd356a6d2ff3b8d43e1ef4e511c93c26039d2a22268f9f7835fbfcc1fa89c11d5af49be799ad9b192a74b7842f90bfde
-
Filesize
8B
MD5c429f63ab517cb3cb57ef9c5a0d5a92c
SHA114beaf43713f7d5f785f8088988b0f77bf1a0dc3
SHA256b16f8598c9577390bbe2d213e4698d9fda87c88d171c826e89bd76b7c963bad2
SHA512f732e815f3d86992a2c2eabf40859ee2bb0346f35abd72c61d40ca258970da43a33855ff1ece0ab1377de3a08e92bb3732bbe128ad691e5321ea481ddb1d19a4
-
Filesize
8B
MD57d1aa660b009e738ab40799bb4451b92
SHA110e4bf7f968df2817bee42c80b1d2c64e0d3d14b
SHA25691865e8d462c9e62a7232ba6a2ab9c6d9e67ecf8d5fd012c12ef0cc525eda66e
SHA512ebcc02aedd96865609bf0e95544c9dc39f9cea4a350eaa4c356817a9368664ec362ec24f6b5fcc72ad3da5ab6249c907cea0ed828ae3fe6405355df39f681d71
-
Filesize
8B
MD5382983dc03048c2546f9110743e11f85
SHA131cbee11602588aa33f346d3eea0f81c7160c598
SHA256831a109dd7edf0a77eef44388e89c261662e904f8b3edf2c520cf9d335428b9a
SHA512e9a96aa1c1292bddb11ffdc016f45dd0bf4fa235593408820ad89ea2dd991f8d3af46cbe38912fdfc287a510b337f3af7b7436b223fd4dba3e33475d99eecf65
-
Filesize
8B
MD5b9357ffc1541d917fbbb49d6180ee90e
SHA14db09b00bdd169704b9bb2f8a565622e2249ea00
SHA256fb6d98da884727d4c587afa8538391a10874e650a2ea0f1b9d70d0a912f98733
SHA5122cfb008b36d680ddae476f67f34d57628ec467025ef69d60d769fdd010a58422a4d31e269effe843c20037c8d494e44bf6b6bcea0a56d08e4d0fd6f1c043d89a
-
Filesize
8B
MD59ab499cda89a6380cb2bf0665c72191e
SHA1304ccc739d3f98b413a76d1432fc1a3921c7a504
SHA2561fe8cf55c495bb589dad61e7b615ed2b3db1a6651da5106c62f8938213ca7854
SHA5124ae823ccee2fcb3cddaba371e902ac78b1ffe5458c36db569a4c703ecfe039d2f4e2c9a43d0d3c0a383ad7b6043e5910b0fb341f674db6e714b94f967f31aaec
-
Filesize
8B
MD5780cd7b87cb837116336f337fad4366f
SHA1ecb749214bf6023e89156fabd7b2124bfca6a1fd
SHA256e1af06916cfb54ae9a27f99bbc9b607de7b21aa57ebd9e026ad5a3b51121ee8b
SHA51274d3bacdffa35daf0a86da2ab7c895ab6814500b7c57b36ebe07a5dfdd9820b8d61c1f5709806f1d5dc86b75ac77a3af9bd21ba51deb65b0a9aadf85390274a4
-
Filesize
8B
MD5eea743b2f9ce0db60587886d87a437f4
SHA14fc4949a7431c09e1ef08265740a3f803595243b
SHA256d2413f58fdc040d3daeb3dcefed25540f9c5e089d64baa941d95578c7ca42f65
SHA512ecc511e35f69adb7718b923faa5adeacf129bd0e58208ae3cdacc016c97140335c719b9f4f4e0f03d2b9ef78db01c973a23a96091ddbee7e5b82b883f914207d
-
Filesize
8B
MD558c15d179a93bc5de53185d7821bb629
SHA1ab29bfc23182ff3808e58f1d4260192ba053423a
SHA25635a69b43cca080701bf1193b9a16090fc361295e95a4acefc204baeccef9ea07
SHA512bb45cd534a311886d7462eb34eb650c4f68af9e4ac2f5e8aafae918dfcb305b3fa86e9528bebd9592ea67bdb66f89a9da6118b1206d5aaede4eacda4836bb0cb
-
Filesize
8B
MD58e07cd7471a28b6a72481c4a9c861332
SHA1a1c3c6276543366f1fb48ea55c7f76876c607f9e
SHA2564f56166d7ba33dfa6c71d414c282e86cafb395efd6a5c12e83d0fd7e806572d2
SHA5122b3082d2acda213a6ee51e0d1816f67e0396b872c4519ecf08d828b597fd13d3eb0c995a04dd8edd3390c8696ede2ce519a71cf93398203936f4be20cdd85f07
-
Filesize
8B
MD547a5790b67e74269b27aa875e686e74f
SHA13306ffef47e912f403dd8c1711928db3920435d9
SHA256137447439c6530819a309efb309aa482d7549bfd349d8fe061fc7ef24c8484e1
SHA51233cd4d254d31cf2bed8d50df2219e4d1eda6e29e11573a937ce5fe66886a84a2ea39142643a62a8da81f1c705e8b4bc2a168ca26f9658758dba80eb77df764c7
-
Filesize
8B
MD5c3c2085838c43ef6ce721b5faa5ba148
SHA19b4de52507b3e7aaac126adb8f78885d41fbed23
SHA256b04d5dc3c339cd352be3741acae223432701518a8644f4a192f08004bc9a2b77
SHA5129b8391edd91c3a299eb7997fe5d93ceab4e6a039d6cb586b2ea711241fbaaec35c376c2bb1196ddfac4f536293307d0b1304f7361194214fcb06eb5974a7fc70
-
Filesize
8B
MD540d3419788d1ad597404a811161bf671
SHA1c394147efabd2a299e0f9dbcfd7d12a359687a5b
SHA256ef7bab7f063092f0c4ad577affee7e4c9d91381c60945f667b1f14eb75e3c8a3
SHA51265987f0ccc4ae449d2b93ecf5e8b44d356347fb3c9d3bdcd2f32d0037859a5ab971e60232c652a82f1dbd8479a657b06dbc4020d59b862cae4b7ce54d20fb8c7
-
Filesize
8B
MD55f410d74fbf82cca7a95a4ab6fdb2508
SHA1c336ec2869dff3bec0fddc502ca5e11818dc71a4
SHA2561bda3d9d5851514181d6ffebc868bea5c9bb9989b33e71472a27ec510a8274ed
SHA512d230686f245873ffe6406ba75956169b0c3fcdcfe889a886d2d9d7f60fc0da9e5835a4f532011d6bc0f45e6d69788025bac41ffbb0a70ee8a3797c984ab58462
-
Filesize
8B
MD594637c6c0efac2bc0315031578e75db5
SHA1a274e48dadea2b800e3b8ca0a910b1629cbd69b5
SHA256792be31b1da1a4eb6a52e8f3b2614a5d8600037e5c3268bafefa2968191a8197
SHA51243e9da6adead42e31db5fb73cd3cc22b9d6cbfe507d79b556fc3417efdedfefd78ba501668c5c5e0abb296855ba6634191e92c0d16f4b28b2ebd509473a2b26a
-
Filesize
8B
MD59b7db02470d235a7486d36f646891a11
SHA1ddfde860287ab2d229bd6575f6963a1e8acccfb7
SHA25662b2a8c4c1d4ebfb43e85b6ca4af30ed40706e4f765017c98ffa63e274f1ffe0
SHA5120698368f484285801486e7cf893b84112f166c303df0ba0af0a8c92922f51df98d3b24fb692a4f68ee08d25bc6bb082b482f89a0b7ff13c96074c76da365bfcd
-
Filesize
8B
MD52fde46bb60561ba760986357c640926a
SHA158a16ca83d47a1ee91077adfcbd18ae7e92c7105
SHA256c4fd6acd72980feb77ec8e8c2a4881647d7732819e6652e238a12e176626b917
SHA512584941ece9a2da2595c8ff69d3435724b47760faed98420aa12308427b9c22fffb9b643c38111150317ecb85b009c789b64f9840fd5476cc7cc9b61a68edc583
-
Filesize
8B
MD5afd5d63261dce539602789e2d92c4ff0
SHA103d19c5ab9c6a0b3bc5f85b7e84350d88ec21b4c
SHA256ed3b5ca862e5372bef0bc5de0df3b9e6853f134f30900a7305a26ab3763994fb
SHA5127dbb5749a7edaf1e1d2d0b1afd69e5f1ab5702a5c061db1d565853b54083d46d73a65b89a320e7e95e2dd3dea949daf778296ae54a40463b5d52ef249b060154
-
Filesize
8B
MD5c4111beed50f40d6bd44d305bb8d55a2
SHA1c910a01480fe0665111581e5212138e87f25af45
SHA256d48c269487caf2209f98b74a907969644be90715c325621ddb9088fe6d63cee6
SHA5127055c24aada57dc247b425574813a9ae2c2c5773eb67b4cf131d815956f3e0624cfe663cefff79db5ddc171fdead7f020a377693801498afe062cb3e6560d898
-
Filesize
8B
MD5f0c9c5491741bb6fe8eefdf2b5a23f35
SHA160a70b6f03c9ba6eb34b1bf9be635e9919ccdf16
SHA256517701c9f49a420fef538ce082b236a950dd552bbdbd3fc0d955bec457491e47
SHA512ec53e35cc47a4ba80e50b062b8fdc41eeadd27e7c0b37c8bbb0c812f5d4c0ff357c11176a380bbb7850570d2b302994d0be3665b24f049420d9b29e5b5da09f1
-
Filesize
8B
MD5f37eeb5962b537d7e49ec685a0535ae9
SHA1ecae6bbeaa163d416f0580e43c459f571c73f18d
SHA256b8d78693d5eacd7a343ed3e39a85c711ef83b26f8b9099997e3466946c4302c1
SHA512f761d542c0c26e584e19f32f8cf5734422be09134b2f6c8c930fdf2b204036f377682afb2b19a8dd6ff9504f9a6d65c2a7035fd0e7ef57a2cb5df43f10288316
-
Filesize
8B
MD5809a8a7a508803df9ba9938fa83eba64
SHA1a407b9b137fef408c72a8bdf96d9389c8dc0fe03
SHA25689b62acbdbb4092b8871cc77d61c86a7d75e55f9d52e060318cad992e332b814
SHA51233138e4b1ab595db8838182f05a115d8f59de92057cda5171a7fd894e11e161bb8aff89e676c9a85aa618b5339d96cb5d014ab5527ccc9b982c5871d3a169fe9
-
Filesize
8B
MD5602125b7e15cc7d62afaed071a2af632
SHA1d65b9efab20dc1ba086fb15706f09dd8452e2e98
SHA2569fe9f62db601ec85f22fdfe5339663dcf1cc701a37f64a8aca5723addffb2f14
SHA5120facfa512f7df085a204dbc3649e97f3a2c3276d7ad3cff556d476a9cdd935a56e1dac1f69a99a99797b2b35167c3bba09d4969d3a4b0ca4f39c2b65092313b9
-
Filesize
8B
MD5b08032739a62a7e0eb2338de2dec2cfe
SHA1ced390dec98e847093ee88fb76effb0ab6abf286
SHA256d91abb226e5f624924f20c8d9d26bc20a398bb71639ad947ed7aaebd38c65841
SHA51259d9bcf6e927c0ad18fac1215a5183712927139de987274428141448a9dcce60b6d3bb1cd532d1f44c7063fcb04c8e4417d7c0b319d82d14608cf2acbbbbd89d
-
Filesize
8B
MD5e3fe40a1db56f8b9ca59454ce2371305
SHA11da0df324aebcb31e2986c3ecc413a437c8d4786
SHA2561e8407873890bc5781c4710330555aaafa414b665047d7fb573f126d1a667d08
SHA512cc8dd2d54d23948dd976985f7196ae3fac0ebd50c881b5921074917472d0255a03209834b6b857c11b06ed13e781642052d2a33552ab7f1158945f1a4307b9eb
-
Filesize
8B
MD5ba3a8708e24ac942db077b9e70431d9c
SHA19619cbaaaa690dc2290a004b72ff9b17ce6005f3
SHA256856a7232116469d9ecf974918e261c4b557a665cb5c2c8b46163e6aa6523e5e1
SHA5129d2a40a5583986bbff16e54bf4102b86959f8fe0499f09691c07e3839ecdf590c0a2283ea7df9cd43a5076f1878594d0420a88b0e38df526a4dd5d3aa9ca0913
-
Filesize
8B
MD50ddd8eccf8929d634bd6503728ce4e4d
SHA17fa1e770df8ca95845c265348e2fbaa0f199d148
SHA2560263705cdd3b9c319e5333e74499ce12ce47db26a42d0ee240ea448903cd04c3
SHA51258f2f53d20d9cd7440a95f690958953104fdc2a98960f3ef4a2f3257469685903865b56c10af2e2b1fa62d35572950df862281fdf4c52092c2d44bcbeb2f9cd0
-
Filesize
8B
MD57d00433845d81b40954b5ded1a65421d
SHA1fdf2973d65819a6b1cb650b3891afe4cddd17163
SHA256717cdc6261bf4699043a6fee8415fe88f1422d56a853a5adf2a1a0270db4cc29
SHA512873b4f45e7425a128d972133ae06f7580bb39dccb96eb1f307a23fa5c66722bdfcf77f6da6148f0e7f0decbac0c84f415bbf3d2eaf985767afeeac65804a4e49
-
Filesize
8B
MD5efe1ea3db5a7cc656abe7a2674945761
SHA14212331290317fd8ec59942c34a510fc83e81f95
SHA2564413b06809f9d89abbea11725755c74f45dce2205378262198ed55ae31310188
SHA5123301a3e9587a44870fd5eed28dc6a68eb5e799639c0755a5a22432c3fd34954a8e641fc610e3e24df3abf2a09f0644148c4d19ee0cb262aeeccc835115ce298b
-
Filesize
8B
MD5b1c7447643e1bc2ad49113c7a31b96aa
SHA17a3d9d8b8f77e66965d23f6b5ba81387d3d6f7d8
SHA256658ac6fa503569a4870607e90e21eef947287c8e1d2ba24e50e52bd113b014c9
SHA51268b344ca3df8ad715a73e847d37bc83b67e418dc0782e8daf8e9c907fa801259f5823ae9b76c823be075268ae7af9f066f31565636a14dd3688d1d2524e21eb9
-
Filesize
8B
MD55fa06022ee90948d59c6ca06511a4636
SHA1b642a800eff8b60139c9283e1d2c57d329a80e89
SHA256d18a9db6258d2c8ad0bcdfd12ec4f452ae871c09722f55d1aaafe005d5ae5e97
SHA512dcc4a7002b161211eeb1b915f976b876f81d0629be5c8567418ed4aa80533e45aad313dac4a6ea2a75a802132626eba7915884eb0de45a14eda057ea49a58c4e
-
Filesize
8B
MD5536ffc3c3e011371ad67dd01936eefe8
SHA1011f01b1a48e7ba5f8431c3fbffa4f3b7f80c9f3
SHA256662fec8f3b65509e47ca880b7374aaf28fb55a6d643b0130f3b6e380b1939539
SHA512c049afc406be657de8894a6f72a89eb853be229d7eae1a55b2e550411bb87c9a80ae5458a0a598b7c5b7df56526316292abaaba470c22a629034cff12777a60f
-
Filesize
8B
MD54eb183324ffdfaa031cb388a0b3af5f5
SHA1444ac1905ab004763186b5d4a406a9c45c2316eb
SHA256928906de54c2f768cbe766b77cb43250dc5cd5984418e4982c923be78229a3a9
SHA51249905ce93f5f4c8c87a92cb39ca6cca39d0499b54e38d30a759d805c1f5cca6b5a571d4e626f251a0bf6bfbfe07ab2aaef9b296ede6b6b29ba71134c552d098e
-
Filesize
8B
MD57e3a39a57d99431b9342eb7a43b00bc6
SHA13bfa25cb8230e1eda0067ac4c685235f6c720399
SHA256f450bfbe4e0701d9cd82cea4e2d71d7cabbbca4b7cb0e9c437b47a45cebf3707
SHA512de1b5ae8121b5da5b5e24d2f6a1520bd40dd8c6e88fb660055cae7751007bb12c9d45e62b7985fc58b222848376053b654a4bac63c354b946b8d09e9a464b606
-
Filesize
8B
MD54064c7315dbbc5030f28b19d2ea967c4
SHA10c1ae254c5cf94a5749dbb2019cf0b4bbdc25ea5
SHA25693272c8b2252381ad26f85f15359e833fa461e0b02dded920f061bbf2b9c8bea
SHA5127dd9065338f58b295cd910041e500912492294649399bc6098f40dae2ea344307e2358cfd4adf1730ad790053403b0c8f70acfadddf8da7be3a800822c40c639
-
Filesize
8B
MD5dbe6e8d860bfbe32a5fa5bded4c170ce
SHA11f6073a34dd5337932a09766e2c02d32e59b9e3e
SHA256620c1845a888c8502c7d8034ba6494588f9268d7b5017e92e167a799abc90666
SHA51218c43b5cf2d5525e1acd00f20703b3afa688f91a9898227547f802dd2b912435873bce84624ff2da6bbd908ddb7309a04667338c5e2e01753e9f90b9c6b43935
-
Filesize
8B
MD561484787889fedbe7263aafac1b5db3c
SHA1592b0ba4712eb2fc66a028ed46c15245d444d718
SHA25622b5a094d8af8a48edcfb27477030507d83e5967b9225f34163452b456460d0c
SHA512927c4fd791c15899e7c67b0baa01758f368d2034fa35b0f3cadf08f3673a9a4dadfaabd17bd67c68591ae105e28f91bed997b6dbd6165162380bfa4d80db5b54
-
Filesize
8B
MD5e5d64894969b64f90834230127e54c10
SHA1411c1e546795fe165290922a50b2d973cd1ca3c2
SHA25621c563d93bd0c05e5b7cc9f9066652d9347f7311f19916a0eb1763c112c70277
SHA512525a1418e8cb6d1c7b29f5b2154bc97945e0ae38b2178dc9e9489a4b983f9d620f53e9bc26a3fb0db80a6867b11642737cba1bbc1ff2c201f10f063d15f995a9
-
Filesize
8B
MD566d8495cf9c73a77ac71ed3b8f112de5
SHA1c189bcb2cf1fdcc5697353f00947eb4ddaf7e4c8
SHA25625d9b2c143d126ca8d9417c93fdc0bc91624dd7f4f8a66838a92938f3518984e
SHA51261230cc067ee965617664dca704975f62ebaeede090ea175922de5652a18705a60a51bdcfe39310c190b961a392b363516148724eb5b4251efcf26924125a605
-
Filesize
8B
MD5b4378bc39e372ea205ab9e10041dd9ea
SHA113e92cc0ce419c09088d94d5f54604a6b4fa1d18
SHA2560c07a76c80770d48b2db3a084008744df972c98f7e4fb2c43449262c046aebfe
SHA512518f51d6056f52457f7dea716d5ec79c750ed6d18d304cf09afe0a8082f5317315f71e1eb895bc99ab331c6c2af31198c046a4ec91fde678791cf17743d5e61f
-
Filesize
8B
MD599325936f5f77da47fe2b186fa581e6b
SHA1013a6e89e0ce881423d33ab92e0f08b3ccea4fb0
SHA25642982116217da44ca3fe9797e49e3f012a59877a8039683dbf83cc1773d939c7
SHA51247251046ea5b8494a41c49e07051cee8250c7d946b5117743ef46a6875ef5cd99a356edc077f955bb70208c5607f6cb98c891789e3dda919b28e5cac624e8b73
-
Filesize
8B
MD5d4beaf29c7ead0015494e6df8c04cc88
SHA16fe0de81253166f6e265e29bc406967fee1456ca
SHA25660d2d2ae96f7730486b4ee518723da9ac6c2b4eb89aa428df2b9b58f8c28281a
SHA512a807ecf85932c50c1bc12c8b699d87d8a7b138c7fd42b873def5e5e8f803dada4a9060b952dab4501f58e6aee968ddffaedb4a29150fd731d65d8aa8dc615cf7
-
Filesize
8B
MD5e1dbf1dace81548deab1433c4c39940f
SHA1bc4778efdfd542d8d4abb407fbd0460619b8bb9a
SHA25611dca2bb50f4f43c0df134aec2e74c5f9861453366b17c8fe24a4a4cb7646b70
SHA51206bc023b5bdff40a18c32ca520a43e7bdfbfc283f20e9675b645742ca1c77ad4e12e40494935f77980d00e85815af26363b1d6f954d16929576c071f1b443246
-
Filesize
8B
MD53090940340628392a8059c266685fee1
SHA1750d7ac6b57fa759e1dc6f1a824884bf8b0960d9
SHA25646f2c9475e3bdf88bdc2ac9313f57f48c9ddbcce3d9cd40d867c0ba3b6a5dc47
SHA5124cf787afd9e33ab1aa024d3f7430645a6afc2cee92ce0559fa42476394caa3b83580409c627e5cbc73cdc40eee62a46d5644c7fe3c3b3d6a84c297abbfd669a1
-
Filesize
8B
MD5ecbc2a3b3e3c2283b044fc2cdea5f476
SHA1ab471c2e9cb7e72dc440954e5ea0f7e94cc8cca1
SHA25674621807691ce5c5928f8eb366aa3c2b3f732c39232e10fe4ef03bf968d9c399
SHA51284baf5eb13d88ef8f8408a9d58e85ec929a195e5ecc57516c322d3dddfa8fb398c7bbe040e40d7de29d3d79784819d9d61d4c594958c1ba0f6e6fd6d1a7f6e35
-
Filesize
8B
MD5e0b1a4c4d7be999fc26dbea28fe81c95
SHA191411df0a9c867a0ff81c716c0833949171eee65
SHA2560e26dce420c6a99e4e19b9c36d50e6774bb13927154a1d71e47d23fc3d038278
SHA51298e413241f509f1cd4aa02b76092b67c0c1fc1f1b35e88e65e64094a83790537c66109845ed601f2b057dac97fe7e5e98ffa79b21f73399a1e97d79e562f328b
-
Filesize
8B
MD51d2f4a514251bf140f93eeed57647dae
SHA15a4ea7a4cabde72c762f8b1118b6af7c2c144616
SHA25650c9ecac8d5d8c1709170577177cfe1e207b532ee57d3865120929d289a0d6b5
SHA5129af656f55831dfd5c8be89900ef55d589b7335ce8c667494f2451f5f6ffc557761489b4b63c02435655d90d702a22e4c8e1aa68c4c30dd7a2844dd1e803238dc
-
Filesize
8B
MD562e1440df00ae1968f83d4aaa4a4045e
SHA14c761db265c48a5a99d1d69de5754d8db70777a6
SHA256bff538565220004dcd2bd269430ae69fa3d0864cf4064abdb009cdbdd64c9242
SHA512949af9328de4756a5c579c7203fff41259a192f0c2b82ac19d3ab31ff5534821dce2dbdc3789a44bce1eb9c2952fe391e70dd0aac3906412dcbbc6dcc34fdb79
-
Filesize
8B
MD519600557e6b4402360073180624f788b
SHA15ee9e2e5715e07d768b9220f06a4edab8d543d24
SHA256bfda0ce50ee1e89d9ce3444635579ed79bd09454c7df7daaef7d615f14968a72
SHA51288dbe5633c043df1fdd9b4782b7e42edbbaa481ed52379dcee7378823204ea478eb157c9011801a57726b6a4a2cbd496117605e324865dbc1a87ab9162f74b9a
-
Filesize
8B
MD5674636a17fec774e48c4cc29eecdc333
SHA1a724b176dd52bb68914a64d7d4e15f444e02f189
SHA2560d601da61ce451e0543648e01e882770d93096455ff2e0a239b76da1c28c37ea
SHA51229e56129df8ded3abb04aea8ed3cd463815e79c51e9dc31900b7e916cfdc977cb61ada56d77e46f34b40a40dca705d95fdcc7c0c51512bec2d0fc541adeef501
-
Filesize
8B
MD5b07f59e2f370255342f99a1c748038fb
SHA1c6b01bdbf03ffd93a36a7f187ce1410635c92589
SHA256b3ef146e80afa5f96f9e41ce6b57fbb0d5013c331ed9fd5ea2d1b53a3dd6fa14
SHA512f8b674c13a1382b8beb7d1b393da074dd18a48932b26bcaf5e81d4b7c64727a3aa31e6a0c917ebc10e5c70f629adeab7c699b06b800fe12f51f133c74d79f754
-
Filesize
8B
MD5b784c865a8c4a6a51801de9bfc643b04
SHA1c282e46985bca3015cc98c2cdc504464609bb627
SHA2563311bab9c9dd8f98338c02dafef82303e32dbc620ca2553e6ea7c7101ca4a0a5
SHA51296602c63d38f4c495e69acaa6edf16326caab123a72ac2cbb69b8f856b2d8e3228a5644672476919661c7cd5693603b8352c5841ff406cacab163eea9a324445
-
Filesize
8B
MD528a32dac722456c46e4105bd8348f538
SHA1ccbdc77d4df3cf702d8bfbb9631229a68c87c467
SHA256785647bb2e50f09ca3f0f76d0b4013ef726282b15c1fdd4952c6e899085ee28f
SHA51273ef9c34d58c9b02ebe44ba3a256dc9295db99681e640f08053cee34d678c73bd01e0e1ccdee38219703e9b6d717e98089bd3ca037f6262231aa95b0c30ef27f
-
Filesize
8B
MD586342eb1dbc0d0865e897e812ab0c977
SHA1e46f6515a51de820e3bb9677492b72232385fa64
SHA2560da46d6344d4f300b6b5dbb8eb51b4c38bf876a2bf26048f0451421c0020d2c7
SHA512c63deaa5327f7a0e685be6ef67f26b52515b007b67290412691cd8e5f66b7003cd0aa945399d69f509768112fb1b5d272849e9cbd0f7bc5086f0f95a40011502
-
Filesize
8B
MD5a7121dea830fa3f8fa6e2e6495ac0842
SHA19ddd2e0cc349037572e645b27cce61302f8f4209
SHA256bdaa9f764309c7bb5a78c657256024e4e4cca0939fa796ae5aa3f5371522153f
SHA5123d71bf506476d65cbd3e1f3d1bba32121c7fec9ea2e28fb954d1fc2f5239acbb0bca9b35f5ca8f7e9538e80e11f319b29b4c7564f5753744f185268dace8be16
-
Filesize
8B
MD5a8d93773f08b15755d3392a0c8a6ebcb
SHA118ba79edfd127bab578ce593aab0b6bf61d6752c
SHA25670ceb6de3ac0f85f0e693c4f949af9bec27dae65ea8818bf776b9107c9f36bd3
SHA512d30cf2893786b1613163d22d26d74447cea7aa37ef055a599d9fc7d8430241749eb9e22f1507770afccea07d2cb02f53ae043636ae7d9577dcb56a8bc6f3744a
-
Filesize
8B
MD5c5edcf665b23d4bebde53d793a33026d
SHA1dff6b81b6ceaa995e61bd45208eb0377ce54128a
SHA256a61a28545c814dd6e1fa5abef7f5d16f47bde008c89a69664a325f2f909a90ff
SHA5129dc25bc68f3d534b14b1d3452c8a0b799daad88b95195054449a8c49023e7c89ae32afac62edb12cc29bd032cf8bd675f81ebbae287a504d88c0ca70ff368742
-
Filesize
8B
MD5d515d216b1fc8ec4a408c66e5054ffa7
SHA1e655d76f74fbd93a0d5b19680aec7f434dc84d0a
SHA256c6ac812bfbd4031590c5802af0a5ad731ae2e3701d041545177915a825236574
SHA512b079a98a0f484bf5beeabef79d262dea157f7eda26ec555914c3afce311f7a95410482ccb73a9124f98e2ecff18a97d27a42eb60f94a78430bcaec486076110c
-
Filesize
8B
MD555da3bc41a5aa2afae70236ac0311c18
SHA160c551947952407a795c6aac8ea5184da76ab822
SHA2562927288988aba39160c039eb92c229d2a5d8b69cf16e545952fc035914f33235
SHA5127ff44189f23ee82a389d1c9515d97ee20afae6b2475db640d6f13d9d5c8ac1970103e77652ae64511591efbae08e0c1bb349ded8001db4791ab7cfb39a5b560b
-
Filesize
8B
MD508cdc4c398018d70e0d43c487875c3d0
SHA1a3b1ff6850efe626676e4631a2b34784c991368a
SHA2569e42fc25310fb29ea30906cc87bc2746d6a3b7d8ee93ec860184f9d1b72d40a4
SHA5123215e8a5d28a2359d76ede330719f2f328e86970c506a21534959a8a62f7bfdeb924478f4a2499b1de5740e194b6907e1b1a44da174f97b91356f6507815c251
-
Filesize
8B
MD5fd7e727f3d97f71480f72bd02292f28c
SHA1ff198a7b3a4f44be0c9d62416a3899c201e452d3
SHA25673009ccd2d5a765b2172f55c4e9f8464a5a5b4656c9a0128968990bd85a9269b
SHA512c9c93dfce2edb1bae9d2af766c1b521b548cd1f4c2161776c65c762bec640e4b78a142cb1eb38316d8f8f1a3ba016623e229e76095e5d9e0499c8c3c6bfff336
-
Filesize
8B
MD5dbd39e3a4cebe4a47f9e3e7107905378
SHA118b6d2aaec9b4c67812fd84a234f17710f9f10ec
SHA256a9c0bb4a0f5a416d157c143615b837fbb859a5f78f07450f2fbeed275df1c4e4
SHA5128d074c37dc1f6520c475884865e03de232e777d1dc29983773cdb1c66359861ab9dde0a6e6d7ce76951b5cabb08c772890cd9a28720c8cbbcde3f85e33ab4200
-
Filesize
8B
MD5fea63ab5bd7a7cd5f616e5d5c3da08bc
SHA1630920c5b93fd61639e3e67878a7a9ac96ff85ac
SHA2566abd87cfd663fb965278615578fbc5035f719a4406a54d02f1b94b46b8ce0b9f
SHA5124d933cdc70bc7ab7e4793b9ace1aa3e200b129e776422894bfbfee78fe0aeae9df0999a6b4db0c1a297e4176aa77b31d93a380f15d2e6fa98974b55a16452fc4
-
Filesize
8B
MD52001a351165831ddcb3bb464a8535d49
SHA19d6a0c9912f4dbaf9fc5e635e390eb1e7141d51b
SHA2560473694a73c29e58e75144a3ddd83977ebecb342a260f9c66bcaa84e6deb6a91
SHA512cbbc57c63335d7d6c40cb3c24de1663722464d8e4370be1890d9972a369c2e59609bc8770c61dfd4493d047e246195e3a4217cb2d6bf32cd9c0e52a50ead1e96
-
Filesize
8B
MD527b90e23351a5ceca5843bca9d48acbb
SHA171029b8ac68ede5ef4d4e47d9967e0f9bce5dd84
SHA2568533b57d88749a5c49ab4bfc2564d9ccbdb101e9ac6e8ac87c3696b841fa8ea2
SHA5127546f4e1ac44c7a1560dc53ebe871136f3d8b810b2bbf202a482982a8e1aa7131422dc489c5050a043f3772adce89dffa29c5d2a84d8a6ce1937936ba176487b
-
Filesize
8B
MD5b36e66ad8ccf6cc5194e9897fe5c1314
SHA1ceaef7e1fde4a46c1058218e83e686938b7071c4
SHA256bb4e3f5c07c42b72d1041c9d366dbe0a030d1d75c097266e8cb58c4a4f1d035c
SHA512174efa5cf0a5668bc7f9d16026374352d3da782ba1180d3aeefaeb561aa71e31977b873f4f9362400e84d8ef027015c1d82b6c03386a5b61cadc6ae727734eb1
-
Filesize
8B
MD5a727c3456937a197a22b71f3b2b14aae
SHA1c02dbd5504e954a8ce0882461eac50e72c753661
SHA2569e5f347d37f7b6800313c77693a9f6743e9fa8995e872876ec57b1139a9f9567
SHA512b22affbc7e1227678ef6700ad699319ad10637a0347cc756b7f23ec55a428ae2d6c9fbc860d51b1ca19390317f674b8820397dacac5fd4f88c960ecc3f471d33
-
Filesize
8B
MD5b1c7e536da5a7fcda28d2382af5e857e
SHA1d4a5dfe90682796cd6421a42f1c7a6cf5ac3511f
SHA25671fd1182c4ed34bb58e4eaada199c3fa0d352a53e6e327f86b725ed5f961b0d2
SHA512fbd485f2f9b0c094c2ef3bf967e86bade5207f97cf12f7704ae7c0d3208df7c59c7ff5300e963e51d724684fdb4bd9e5e23f880257a06c942c05a87d6705367b
-
Filesize
8B
MD50713bc0f166b30c5a01aad3e9e663435
SHA1026ac0f8795a54f9f29a0620a6f6087e4d953850
SHA25633f85f306c5cd70ad4e630f545b3fbd48ab39f34adf4926b8140f9313671bb10
SHA512053f4d7dc386e0c97583ca405c7acb969d5622d60e8ab2d652c8a1d49b6d2d98709b692ae763fbebdd6bf461d1f00f3a7e8c24ca8becad378f0707f964ce28b4
-
Filesize
8B
MD5594a59230edd8a59253af9a7b925d65b
SHA1f800faded201582df582d139024509cee99e25c8
SHA2569573a01950c7e570ad87b5ef08dc1cf11d265f552193089b7b046f0fbf902af7
SHA5121bf616560ba0fe1a3b066b3914714653e022e69bbb3a2e97ba96bf1521a8c56a1a66fb4a7ce889f8a01719832fd62244290d8db3e6fa4a3b67bffcfd9ccb448f
-
Filesize
8B
MD53384cd7521c6e574c3407e12b370d0cf
SHA142291ebb37995e057acc779a8303e03eee8f7d50
SHA256b5a9c6c2cd85c65befdc9246b0494010cc9fa16a9e8e56ad0c377de3503a6270
SHA512480cc3cb48b62a6b92250560655ddf087ae4370d4592c4bdec3b90bd029e22ba086c47272ea79bad0d3b851937cff2a61499ebb82487ed0e63daa1ebf1eae308
-
Filesize
8B
MD57eec4334fc905f5170481542c02ddf78
SHA1d8fa16c5aff29573543600a4b13a3c7c7e6dd145
SHA256cc12636a130ee7b438d7fb9780f8027648094af21a585aa70f9b574e3761c35d
SHA512e59d005799260dc35a71d8fa2c958567cd597c60ddf9c93c6453b4fce7ff8919d238c0043c9535bb9e83e93f7c84299587f01e85dc72197f2f759060e6bd8dc8
-
Filesize
8B
MD5dedef438118ef056c88c3203ac4cd413
SHA1a56d385070a22276877418c7654f3ec0cee11e2f
SHA2563a57641d0b73f833c3f6b0f61b7e0a6d6dcff0d0fd6cc5b1811afeb195dfadf4
SHA5129fd61dac3ffd679c01e0c33b38ed5415e1a1c1a9ee64586347ab4ff7c10a2f888a27536508564e8f4028de700c78db2185c90707db583a5297cd829fcda83086
-
Filesize
8B
MD5d492a1b1a71a895ce0ad18fb1b94c658
SHA1315440d2fc757cfc5ed8a43a41f1c6191261b376
SHA256b774a460385e851c4fc876f1a6110684b4ae77b09bc43e89bbaa8cce9168a678
SHA5123d0864d172d7d500b7ba29273b313d7802e254e3c827b8f94d2f5ca0d3bd89697f0bfd242a1f1b67f043f08129e4d569d6f39ff82ff44d84034d35d2155414f2
-
Filesize
8B
MD5f5d98f0855ced08a7fb7ca5ec397f0db
SHA1b94a9702892563577b1af528ae07a389ad5fb4b7
SHA256adc6e140fb43f2d65149b4f2716583976324ed3e84fc2867d1f91fdf84f82420
SHA5122db63021677310f981b17f1553e33a5fcb355c2caf3d9f056ca941ca2b016017ab0388826960cb7947160bd484ea5b0f430f2267e7358146705ff18370553dc7
-
Filesize
8B
MD5cd46cd51d3d90f1f200db4019d496de9
SHA14b7c84b9ea0dfce1813432bfc36579b547bcce76
SHA2561d15b4c275642ad32a9daa9163b720c191ef7b5dd1bff8d2301b1474674a52dc
SHA512d74baeded49e77326403c23c05b50ef7413ddda7f93b02609c89e354ec889e34cce8589f16ade87c340d148bb142f12addac203e762514d2fdf63369680183c5
-
Filesize
8B
MD505af307e2982217a93d8df3515e3089c
SHA1f302dc3d4fef5628c9d90d7b14d59ffbb2137ec9
SHA256df96e363c952d11b7394fb602a9b14207f2211cf58afaaa63c57ac89dd2d2443
SHA512f2d11a389fe0ccc87ba8736a083c5c024e6406fe0a20e6c42a90e389fe4aa3eeec274a02a456fa9ce30bd35b72c115ca025913d914c80db10336661b89186ad3
-
Filesize
8B
MD5e2eeeea187f862561f43548b84794f56
SHA1ee0fdc62fe258ce3f8e7751b29e21547a846f2cc
SHA256dcc493a54edab597faba0a5bcf7eaf009adc102ad886bf20dc75fc0e52404d2a
SHA5123c854fd68f4cdf35326afa2925a2531a55f737374026e7743e5f204b901d1d4935584db38cfd8aac80ac465bec2527f2d9488f0f43766edde2e8e4e9326b3aa8
-
Filesize
8B
MD5ffc183a40da08476759360933d06f043
SHA1d77517aa704d28a2b7f426cc3bb0d2fcb4256105
SHA2567028645310802ff86c05cc26854dca1f8ae9851f6b78427c7a7ad704e394c65b
SHA5128b0e2e862b68ca30afb761324006f259a7305ece10c8bb0b97da06854ee651393be14454feeeb6e6fdb7a12992a9b395dbeea98644b7753842bbacc56b9fd05e
-
Filesize
8B
MD5b0de98c575bae658fceaa7f5e6288dc2
SHA18a398cc9f2d6dc8a093ba3e5dfe5d4809a3e53fb
SHA256213a090758f0510313b854f84845d3850c1156299bc737d1a6f6d03598962c18
SHA512c45aafe16cf23f43ab96e72f1f4290cf4e49bf5de35e82411fbc8487d5998c4215d2ef300e37ed88c5065b9225be7825e1c4a67424f42a505df5a70fd3b07c86
-
Filesize
8B
MD5cc9341b6461e662a2cbf55b3f9c040d5
SHA19b2c4b8459713fa2ea1852f1c3e93367b8bfc1ec
SHA256a67eaf41aa4b12b6b85aa4e020d905eb9302f639e931f8a70dbb49315d3d73d2
SHA512af80457f348e7ba75ddd147d61c4c05d73eebaedc1c2c44fe3904770d01ee3c851a931cb45c02165bf0935790bad66b90a465e99c3f99b5cbf558b9beeb83106
-
Filesize
8B
MD5fc28aeb37a9afe4f231ee9f24bd5f2d5
SHA12350b3c6c192893b77b683cac5311256904b6eb9
SHA25616a993dd10e04171f205014abef23ddd09343952ac279201f8cf12667878e7c5
SHA512753228e6a6d2e45f26bd65f572652170f4cb23fa62131cf415aef73cb0d51e3cfb4954cc140f6700f267d4fee805114596aaeac12780e07138de18f9c7ea8fa8
-
Filesize
8B
MD586d511b0d248cb0970a0dbb592154e85
SHA186f582da9f2f40e9870185fa2b1a99d1891a0c89
SHA256e647ebb586c42813e625d04407bdabd3a2210a4643bc3d46f79e5a2e50c85437
SHA51259d87f0b82d55a5c954e37ed3b07a204919e1923570f408b93d49f8f99b612071f5d49d559a4f1d55d47853d72b096485b5927f35cce2afc80d9b3447e69c0f1
-
Filesize
8B
MD5ef8327083ea79356741ddc5bdf9c4e33
SHA103e3bd642b3e1a1f14473ba709aa63c48dd2a8dd
SHA256bc497c845bb70cb6abc08a2e6c39c18d6f5f723c0d9d27c6369f87f89593cbab
SHA512e035bbb4bc6b2cd6abc71b06bc3258b8a64f5d073d8b815d71f0422651049d35840f5959c18acf7b03d7b115d51850cfbd87d90b010a2454769690cc3dff2ab6
-
Filesize
8B
MD51d399b5bc2ee0e67950e047451d719fe
SHA12f9e3a47ce776137e04491e1dce3946a429fc67c
SHA25682832c1d20e755f053c05d5420ae0241677e8c9ec7b0aefe3ebb6328103e91c7
SHA512b96266176c58a17b980e2ea2782c9e40b9ab4108584fdcd7c8ddf29e99e894d396b652ae5b366213444722cf387e1113b1c895eeacb94ca8e41fb70e9073fa86
-
Filesize
8B
MD5ca59ea8f6fe0708611f630dd5beeef8e
SHA18eacbbb8a811d3fda1763b08a75aad61dfeaebff
SHA25692488d6c31eb83eefba96b6f5a0ba7db8757ae967f72b9967eb961b272fcb0ff
SHA5126cc40a6a443fa28abdde2bb3342cf29174386c9453dca9f58cf5de0f0878ec70342470c74336b67b89800023e58f18daf3098ff9dcee3fbf8f50915dfb7f656e
-
Filesize
8B
MD59bae76ad67c9b1b0f6e3eb428284df0d
SHA1938b74935902eee8adb6f7309b495c920741246e
SHA2563672bcc4fabdb4d9782a5cf325c9cbb25d3b410e5a9a84e6eda2057b192e805a
SHA512e98d0da20f90797845f40ae930b264a54100e7d5a918269a0d86feba7ff92a7c8d12b0ea26911ee2b8ce014bd859936105b75ed8f54cd13d1587814726775809
-
Filesize
8B
MD5ea36f74fca14d41811e14924b52067dd
SHA1a9c63b87866be07758a1ff9e3ae3d3c31308f5d2
SHA256dcb72310b84e190c6e5fe6ab6686da48bcef191ef5de90a47be47d24f93d8460
SHA5124d215d9c2996ec1df08e6b7e48cd6d04e67c3c5f8e7eca57c365520afcc45169762284ae06ed220d43438503b99fdd41c3be1783592de036c747b18c09f8e893
-
Filesize
8B
MD580b585dbed94f86edba8e997ee2b89bb
SHA14f995144bd2c7b3c477230988f6999a06805a2c7
SHA256d6c4c4d40b05bdf890fbc70ba3df1495876e198b2fcf7fad30389e76bd2f9daf
SHA512c28e221f3f76f3d987edd3fb14421a7712de175641aa65c6411534b93ac1ae90fa813ac4236035d53dfe5988f098f4f22a4bc5007e49c2ec96a7df9cb846ff01
-
Filesize
8B
MD5c7f5f1c4292a54f91a60def94afb19df
SHA166229f69df765154b50d50de850456d0aef8ad85
SHA2563726eb7c4acc365bec18f0be7bd7050b68af22abf2b48db7c203540d3f71f628
SHA512ca8a1eeaa955c7eaea36d1eefaacb8cac6bd82739a014acdc72d076e2a947febee2bacd78e53bf6cd888c54d31dd913d04ec5dd4bcfcb02de0920a75bffd8dbe
-
Filesize
8B
MD5b4c5a0b76b6172a6fdd61e0ef2612962
SHA165d5e3503934261d5bb242788d7ee0b0542f68e4
SHA25601c149890dad4985904f8fbc066dec91e355d15119a3c508a29a90f4a4215039
SHA5129897bda4ae93c37d035895d78c957eba1515784599d0b5d82138ca28529eda44889b5346a515a5f6bb145b856e76321972e074f73fa9fe8c273dad9c08866c23
-
Filesize
8B
MD508eb7f1b5650fd4af886dc2442583a83
SHA1bbd76646e80774026216b45313c6b7e0ba45df97
SHA256c4d3bb4ea3c78b52e24f3a21a2e50973f7ddd63f7d8415cc3cde680687a7d63e
SHA512512895c2cbb6f01ff147a02a562e953fa80f85a9954aa359637fa580c7435a9978c6febc4df8e58f613ee3ea313d7da160b9d721df5042ac39821be28af004c3
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
Filesize
332KB
MD56d4ad652eb1006c39863ad878bb56e29
SHA1eb2acc6e3eadd2252e6dcb422ab3965b6b2ed5e6
SHA256df127cb1436ca391992997fa0375c19c33bf140f67e7391a6488cc13080865d9
SHA512bfc17908c15a2bf62b0cd640d636b07720102cc6ce15420568358acdd96425f275123cb9d4e88d15ea625e77ce688507d04ea9a181f65654ad532cece8751cd5