Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
c6594d13734462e327a75eb803c1e583
-
SHA1
a37788d357fe854b4862338e43f2468e80ca216e
-
SHA256
6b67f7c1bfe6dc5060a40c534ed1aaf0c4a39690ef28347b004c777bb5f48263
-
SHA512
5060fc6a29baa20964fc9460a6d2a3b89de430150ec3cbf088d9a253df99f9a131f20cea7652fe2a1d1430a29ead679e65f4b7446e3633d4e244dec04c0f0316
-
SSDEEP
24576:B+qCQdxc25pNzyLXxNDumIbcEsWXy9d0FAv1s:zCQdS25Lyr1uc5WC9d0FAS
Malware Config
Extracted
cybergate
2.6
Novo
lostbox.mine.nu:587
alivecard.no-ip.org:587
***windows***
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Update Microsoft
-
install_file
windows update.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
texto da mensagem
-
message_box_title
tÃtulo da mensagem
-
password
abcd1234
Signatures
-
Cybergate family
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe" windows dark.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windupdt\\winupdate.exe,C:\\Windupdt\\winupdate.exe" windows dark.exe -
Modifies firewall policy service 3 TTPs 16 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" winupdate.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winupdate.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" winupdate.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe:*:Enabled:@xpsp2res.dll,-22019" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile winupdate.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Update Microsoft\windows update.exe = "C:\\Windows\\Update Microsoft\\windows update.exe:*:Enabled:@xpsp2res.dll,-22019" windows update.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" winupdate.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" winupdate.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List windows update.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winupdate.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" winupdate.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" windows update.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" windows update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Update Microsoft\\windows update.exe" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\Update Microsoft\\windows update.exe" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{VEXRY7J4-3YR0-WVRY-43SQ-6P751C1V24D7} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{VEXRY7J4-3YR0-WVRY-43SQ-6P751C1V24D7}\StubPath = "C:\\Windows\\Update Microsoft\\windows update.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{VEXRY7J4-3YR0-WVRY-43SQ-6P751C1V24D7} c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{VEXRY7J4-3YR0-WVRY-43SQ-6P751C1V24D7}\StubPath = "C:\\Windows\\Update Microsoft\\windows update.exe Restart" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe -
Executes dropped EXE 7 IoCs
pid Process 928 windows dark.exe 3948 winupdate.exe 7308 windows update.exe 14832 windows update.exe 11916 windows dark.exe 3068 winupdate.exe 336 windows update.exe -
Loads dropped DLL 27 IoCs
pid Process 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 928 windows dark.exe 3948 winupdate.exe 3948 winupdate.exe 3948 winupdate.exe 6624 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 14832 windows update.exe 14832 windows update.exe 14832 windows update.exe 14832 windows update.exe 14832 windows update.exe 11916 windows dark.exe 11916 windows dark.exe 11916 windows dark.exe 11916 windows dark.exe 14832 windows update.exe 3068 winupdate.exe 3068 winupdate.exe 3068 winupdate.exe 336 windows update.exe 336 windows update.exe 336 windows update.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winupdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" windows update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winupdate.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" windows dark.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" windows dark.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windupdt\\winupdate.exe" notepad.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" windows update.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 windows update.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2260 set thread context of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 11536 set thread context of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 928 set thread context of 3796 928 windows dark.exe 34 PID 7308 set thread context of 14832 7308 windows update.exe 40 PID 11916 set thread context of 2724 11916 windows dark.exe 43 PID 14832 set thread context of 336 14832 windows update.exe 45 -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Update Microsoft\windows update.exe c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe File opened for modification C:\Windows\Update Microsoft\windows update.exe c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe File opened for modification C:\Windows\Update Microsoft\windows update.exe c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe File opened for modification C:\Windows\Update Microsoft\ c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe File opened for modification C:\Windows\Update Microsoft\windows update.exe windows update.exe File opened for modification C:\Windows\Update Microsoft\windows update.exe windows update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows dark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows dark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier windows dark.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 windows dark.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier windows dark.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe 7308 windows update.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3796 explorer.exe 6624 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeBackupPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeAssignPrimaryTokenPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeAuditPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeBackupPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeCreatePermanentPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeCreateTokenPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeLoadDriverPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeLockMemoryPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeMachineAccountPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeRestorePrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeSecurityPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeShutdownPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeSystemProfilePrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeSystemtimePrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeTcbPrivilege 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 928 windows dark.exe Token: SeSecurityPrivilege 928 windows dark.exe Token: SeTakeOwnershipPrivilege 928 windows dark.exe Token: SeLoadDriverPrivilege 928 windows dark.exe Token: SeSystemProfilePrivilege 928 windows dark.exe Token: SeSystemtimePrivilege 928 windows dark.exe Token: SeProfSingleProcessPrivilege 928 windows dark.exe Token: SeIncBasePriorityPrivilege 928 windows dark.exe Token: SeCreatePagefilePrivilege 928 windows dark.exe Token: SeBackupPrivilege 928 windows dark.exe Token: SeRestorePrivilege 928 windows dark.exe Token: SeShutdownPrivilege 928 windows dark.exe Token: SeDebugPrivilege 928 windows dark.exe Token: SeSystemEnvironmentPrivilege 928 windows dark.exe Token: SeChangeNotifyPrivilege 928 windows dark.exe Token: SeRemoteShutdownPrivilege 928 windows dark.exe Token: SeUndockPrivilege 928 windows dark.exe Token: SeManageVolumePrivilege 928 windows dark.exe Token: SeImpersonatePrivilege 928 windows dark.exe Token: SeCreateGlobalPrivilege 928 windows dark.exe Token: 33 928 windows dark.exe Token: 34 928 windows dark.exe Token: 35 928 windows dark.exe Token: SeIncreaseQuotaPrivilege 3796 explorer.exe Token: SeSecurityPrivilege 3796 explorer.exe Token: SeTakeOwnershipPrivilege 3796 explorer.exe Token: SeLoadDriverPrivilege 3796 explorer.exe Token: SeSystemProfilePrivilege 3796 explorer.exe Token: SeSystemtimePrivilege 3796 explorer.exe Token: SeProfSingleProcessPrivilege 3796 explorer.exe Token: SeIncBasePriorityPrivilege 3796 explorer.exe Token: SeCreatePagefilePrivilege 3796 explorer.exe Token: SeBackupPrivilege 3796 explorer.exe Token: SeRestorePrivilege 3796 explorer.exe Token: SeShutdownPrivilege 3796 explorer.exe Token: SeDebugPrivilege 3796 explorer.exe Token: SeSystemEnvironmentPrivilege 3796 explorer.exe Token: SeChangeNotifyPrivilege 3796 explorer.exe Token: SeRemoteShutdownPrivilege 3796 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 3796 explorer.exe 7308 windows update.exe 14832 windows update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 2260 wrote to memory of 11536 2260 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 30 PID 11536 wrote to memory of 928 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 31 PID 11536 wrote to memory of 928 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 31 PID 11536 wrote to memory of 928 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 31 PID 11536 wrote to memory of 928 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 31 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 11536 wrote to memory of 2704 11536 c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe 32 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3148 928 windows dark.exe 33 PID 928 wrote to memory of 3796 928 windows dark.exe 34 PID 928 wrote to memory of 3796 928 windows dark.exe 34 PID 928 wrote to memory of 3796 928 windows dark.exe 34 PID 928 wrote to memory of 3796 928 windows dark.exe 34 PID 928 wrote to memory of 3796 928 windows dark.exe 34 PID 928 wrote to memory of 3796 928 windows dark.exe 34 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 PID 3796 wrote to memory of 3964 3796 explorer.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" windows update.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:11536 -
C:\Users\Admin\AppData\Local\Temp\windows dark.exe"C:\Users\Admin\AppData\Local\Temp\windows dark.exe"4⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\notepad.exenotepad5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe6⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe4⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2704 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c6594d13734462e327a75eb803c1e583_JaffaCakes118.exe"5⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:6624 -
C:\Windows\Update Microsoft\windows update.exe"C:\Windows\Update Microsoft\windows update.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:7308 -
C:\Windows\Update Microsoft\windows update.exe"C:\Windows\Update Microsoft\windows update.exe"7⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:14832 -
C:\Users\Admin\AppData\Local\Temp\windows dark.exe"C:\Users\Admin\AppData\Local\Temp\windows dark.exe"8⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:11916 -
C:\Windows\SysWOW64\notepad.exenotepad9⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11340
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"9⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:2724
-
-
C:\Windupdt\winupdate.exe"C:\Windupdt\winupdate.exe"9⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
PID:3068
-
-
-
C:\Windows\Update Microsoft\windows update.exe"C:\Windows\Update Microsoft\windows update.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:336
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
10Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD58bba2d411281f7b44c801a8679d7f38a
SHA1cc8dfedb8a67a71718d0e2fad957f3504a73e7f7
SHA256fd05981e2d423c5ee649020b522b4b7e1ecfb2e8b6afcb9dbbe2a7fa6f8e7f83
SHA5122a1cdd819c6a4d20826075b7118b232884f5628261feda5bd825013dd7df5aecc67e060b37ce55bfc8930d12df9cc93cc7dc572ae195ed16b67eb299272b14fd
-
Filesize
8B
MD5623481b019e34f91724abecd22f4b8f6
SHA11c455366e1159e57cc82960cd1b7bf23da72c860
SHA256dc8b79613e1ad29a6bab74468b4574fa9f65a3f33d8688b5cf960447892c5677
SHA512c2b1dd32ce0f0579a95f4e213e06ba9936731d8e3f8b8d01265199c596fe23f2d0d2097b5e4b6efee2d9f2a80d75b01e620e781f89ba0d5289ff46ac08e56dd8
-
Filesize
8B
MD58fdd02d617216ebadc214782a54b08c0
SHA1c1428eef4fd72aa2db21af6477259f47b8b413cc
SHA256e679f38b78464a7d0140b256a85c70b5deabbdd19618741aff6de63eb368cd07
SHA5129b9ad549e0ae39870b04ff350af9a54d96104f3a11323a6a118f7d1fa9a3f36c08676b0b559d18b1ebf4a4d3a428a952919b45aa6ee5fa498f4ff398e6aff0e0
-
Filesize
8B
MD5ab3cf35ac66e8546fface7370d90d368
SHA1bb24cdf4c12bca1564f800198b28c7e51d796b66
SHA2561e44c7abfb7a40399c162fbea80f70c7f5591a2a5a965a5c8c40cb193455931c
SHA5124069d422dcae7559ade557e8bf232e37ecdf663a56b421d56a4c08a7ec4dec5862ff056e31f3ad8a4c7984374ff763f78231a2d54d3ff945b3fb6456a1a998f7
-
Filesize
8B
MD5ded2b64fbc801461d590852dba7c31b5
SHA11ae5fdf49d6cc06d7d5e2536f5eb436bc9add6a1
SHA25633293e9f143e8296fde03088f57d79e11b9ba1c8d64c2c19b3f2962cf86b7863
SHA5124aa19e6ded6a03c232cff1efab97fd3e4ac87ceb03b0fe43f7bb062a3cd949b271599915fe0ca9c9d42a5aa0058241c9ee6a7682abc3954d705fe5a44f94f52f
-
Filesize
8B
MD583a41b6776e9ed11a728c272eba806ec
SHA1b862c1c7e7e0e4737da37ab797a70b94e3d50e88
SHA256eef961563c6a2616bde29d0a610ddc61cbcb33ea5f471356a12cbc0ced5dddcf
SHA512afe5b0a986cc14fa7093c8c507594991a836f8bc1bc8251c6b43e730f2d8937a09629f8816c12bb18421abd91daae9fcfa6d90df6a21ce516e98c56f63f06232
-
Filesize
8B
MD51508981311e8110d5b70e7f2adf40b65
SHA16c8d5848d633d1c8f1c28df1b3aac0ad91192966
SHA256051e7b7223b229f389c234ea20a9fb5666336cffdc0f5ef235323edb4e6594b1
SHA51230c28cab271da2582f4db25abf6a7fdd440de7d4cb3cae70a3e5debe850e70dacacb8929c833a2afd97f4f22e65d710f0f7778e22d5084a220369388643c1ca0
-
Filesize
8B
MD52f743674a2fb9228dc18b3dd20afda05
SHA1da14dbb0fd71df156a3eff458c9d378a2b2b2123
SHA2563aef2392f065750fc91a565ec0409e63cbd98b81f2968e154090b7a14dce9c2f
SHA512f34d657b82d769c18cf07c42fafabd037555bee9cd7b8dcff642f9d1ba9fa5552898a32f9ab4beb36d1a5f9899833c0b3b09825a48563a991225596848ff7f11
-
Filesize
8B
MD5e8f4e468e3d627257fdcd08f112643f0
SHA1ac927d82f46673961eb201528a7133cbfb617d40
SHA256c7a7166c85d6a4ca660781143097b6ca60c7bbe7e052ddc43c6a90050d0e8607
SHA5121fd84168641285f548c682b6faaf12aef986b4f824f0dd77e8a28cfa3feebf0859d87a27f4eaf6bbf1ce7c6509f5107f2b2eeea6f408d615b5db32bed2f1c0d8
-
Filesize
8B
MD580cf4196b3ca09de73c1a347445958c7
SHA13ec0db4bee3648731c72e8658bfad2ce37dca1da
SHA256ddc18cf83136f4c37df04e59ee50d625339eb88bba0f3d928facf63fcfc79c43
SHA512cdc275118f5828e43614dc7c125775e4b18f1a579ac55f5330ad55c007e3685bbd460a8fbe766a81438c5b8f1d79fcb1e5a0abfa92db422ce857ccbcf942e100
-
Filesize
8B
MD54831fc2738f2de53c06813f2409519ce
SHA1dcb94144388c3e6f5017801c51dc8952d9196028
SHA256211dba2a584cea2e431eb7a2741eb6b281554d3de2e2719d31a4c6403ea53af1
SHA512c510e4efeb9117fb5c2d33ab2e95db646eca4e3869d82cc8563ef8f1d960631417c547dc26149db502054e2257aa72070345ffa5fb592ce002186002d0a7651a
-
Filesize
8B
MD55b42f958ab05feae439970902edaa8a2
SHA13796d1e209abf3183bc42bf225448eeb3e7e536d
SHA256f098a8e5fea46e4605cff9612e90f988a9b1c34ca35aa6fbf4dad1ac12952f00
SHA5128f783b431eef1fff82a7a5ada9686f028588e745b0819722bf2623654462e97801fd050ef23d7aa96ea8995f29774dd7f56937776627f9d38170b8dd8a7c42d5
-
Filesize
8B
MD52d0ff5c63d961469de8ac55fd55e7ab8
SHA184d00aebba02ca5f424a6cac2ebb9822c321acba
SHA25607f2738701d98443ca9c73bca981b4ab036c337e28f0d0b9e1e8e3d0ea6602e8
SHA512aea44ca67314edbd69b8df9a8bdea361e9ed4ed030b4fa09aca70db7a8eea55541d3e3cd376722c9920c2464343ed017f3b55ff81bb16243649e8fc964e36578
-
Filesize
8B
MD5beb4191a64e4572b77a786d45f1a80d1
SHA1164376da470baa543bf7eb65ad89c696e38caa2a
SHA25673348f329483d42882c497c824b248d696f25e849a810d51d73c40563df004a4
SHA512a1dff5d24d0886bfdbfcbcdff4bd944978d0b25ebc617f610e9b9b802069a181947c755214d5d514421090b57ed2b15befaaec717bc17f5bfc6f528050c0fb64
-
Filesize
8B
MD57084dd36fe2e30eb063c14facb1fb837
SHA137944f880004b508c27503835be0b76cb1a97670
SHA2569fe63e4ed1e1695efb71bc19ca0b53abaa8d5e410ae414aa57d477118b75b9ee
SHA5124084d26920227171ca25086e61221e5a445183d553b3849451ce8b1cc955a958bea440e6428074aad5b5a3a930ba7d4de31737b633095c21f2050f0d5ea1701e
-
Filesize
8B
MD5b467ef052bc0325708103a84b2f01959
SHA13406701f6230339b8e19ae7d070e5a4ff673fee2
SHA256689014b0a070fcd7e203fce30fd0d871aa157dc4b5af8353abf4c8498444b4c8
SHA512a4b9575bd47f313b17747d7fb46e6e70f913d8529fb29f5127235ad1405a57249e9a1baaee7d2b069764f0f3b494713360e1c8a6a2b796a1b2888c73c4390484
-
Filesize
8B
MD57f5a99657bf6c1dea9a98f62aee218d3
SHA1a90c9cd34db0e793b5dd39d13439e281fabf74dd
SHA25682f1aceea5b0adb8137550fff8f6af7d802f64d1d2d896c482be5acf85682ee5
SHA512fdb4eac41851115a5174502beab61f8f089197fc74f32e1abad291782e1f19846e757a1740b6789931bdb927e449f6fd5426edcde73ffa2193e5d135bb52f13a
-
Filesize
8B
MD5ecd652de23fc17fda107c8897c297b05
SHA1bf559fa6633c60bd27e4c8064cffac7c5e07818e
SHA256775f97489a7f95a0daf3302416f7da343cff8ad310545bacdb7cb12f073a3b5a
SHA51273aaeff951265f96c5fe8012c21a483d886b7d0f3d4d7dd84f8dc82bc080a2a4187bdb42d110903ec6a1f6a41bd58d91402968947aee74ad35ddd3ab75a08666
-
Filesize
8B
MD57b367a3c1074b83c495991f02ed89fe4
SHA1a304e87593a238df4ff0cf1925de2905a2307961
SHA256ff5d5ee3e83ac6099ec98bfde7fef96eeb4db1c3aec8790106acbb5dcec433ec
SHA51290770469226e9b44d9304a691aa9e7526b9cd48f522b08314a693f0e2d607c30def5e3e4d5d1aa948baef1d1130a6e5a0534089046eca350c2ebb13652630330
-
Filesize
8B
MD510fd9c368fb0ccdc158ab92fbb05d06c
SHA1854c708c373ca1e4915741ede0e92f608db95495
SHA2565e0b2351c809e5daaa62a1c39543babfa100eb47629bc9f6f4808247f9ac9eef
SHA512844118c5e06309cfe3efe21b26ff86ac0887a3fd805966d1756132464d8a6ee728cd3ba585d63141c20d93321c88149bb4afc933eaf5f2792000f66ad64256ee
-
Filesize
8B
MD501750f9b9a2005c87b29f65bcc50e1b8
SHA19b4903d0f2ba1cec0791b0601b7fc3bb95a8e0ae
SHA25697806e36bb11c2124b5178210d4fb979f29e87091a6a844be557c7e7b718c293
SHA512e2316c8a78e128938b34075bfc5c6ad2840de9d569908d29dcfc1375156b821a92c5636b05a83e48c2d4d0d886fe4a83c62acedffe4b9494914f0cd9cf624854
-
Filesize
8B
MD50d0b98ffd534a0db07e7a1e6f1cf303c
SHA1cdd5c03c4338c1f1e1cddd51a6180f9b4aa97978
SHA2569348af45cd0301aaadd3ba2db1458a3ebc9e4f2b8745efc8c2a96eb8ffc41dd6
SHA51282b8eec09856a0abb7391b3fd1579691ff2aebe571ba55d07e3e1808350cff422c874bb2c86e65f231f3b0e7e640101ba203f7c34c6562061085c6be964fef8e
-
Filesize
8B
MD58ccbff0b311f7fe2517dd82c5c43fc1a
SHA17bc07227e05f0e05282dabcd6b3a9d121b272e47
SHA2561d141dd8912d1ea99dd201bf5fcc34228a1e1cf9520efdd4be45ee883837706d
SHA5121f5aea38ba2b353eb4c3ff6af0127d478f70c64d36d532baf62b67dff5c2684d8a62e2997a5179c8c0239d78693f64d351c10d9e5a593537c716e1720141c31a
-
Filesize
8B
MD5c76ca23ab8f0c7b44c3f99374efc98d7
SHA13cf8bda98cba6562ed0500ffce2630a7ab65cca4
SHA25663f86b3acf56cddc3c64a5ec2b38cb27781e3b0e2ef7c58fbb452a0c1def7d07
SHA5129c6265cd223a7f26cb67ec82755bd182c6245b66240ff50563f0dc08da1f6508b68b3b3d64f70968262a5104587f2d19f970344931eaf1b90b81a55692732bbd
-
Filesize
8B
MD5a057fea349f39e7cfb09c8af5fd656d6
SHA18ddd260b3a2b848fdf6cf5dae4f8ce0f19be90e2
SHA256feafd6ae8996291a006a66728c9d0cad4e16d33ad43620903cf3d27008bfae27
SHA5123ebc53341de43a43f8e4bbd04bbae95a77addc1dc9dc6c1c2611b35b422a56e05bf798f032927089f5d3109a01af743bdcc30f471777443f0ef2c503b343947e
-
Filesize
8B
MD5949a12068f9dbf1feb97cd051c35a346
SHA16cc75e619d00efea1d96a84deb964334e6b58a85
SHA2560c1303919170399d40ef10649c79ed2a8d098a168fdf2c4ddc39ce70419714f9
SHA512a5583848479886fadfa0fa449692420e14ec7b1796fc9adb0c626b668a5d3c06ffa5ab5364d9e41f7dd88838072572babe4726c54ef7b86f9e39523a71102dbc
-
Filesize
8B
MD5d11ca06986d3329443e4d781d5c6b851
SHA142060fa037aaab2b1c0d53accd214bcd3b06e7db
SHA2561ccd64b9ac5b69e8332944dce68a5aad34b905d13a3ace727eb12e5a55711b3e
SHA5127b42a1d5043c8364373a74fe5a57a2bed776e9cffeb0853c484b82021b726688648b23cce27d7a6a3a61c3457c546b8d5095c10f5fe8c64fc3227aaf8de558c6
-
Filesize
8B
MD5bdcc691e08a886d773fbf0ce2fa653bf
SHA1d08ee15bca76b8f7fb621bbb9e20826f2c7786be
SHA25683c6e2da4e119b7e2275368dd049d78f1532ae026d95c6524d6fe4c24c40411c
SHA51228939f1baadad47390ba65b305b2efaf196d850efe288aa6985c6be82280439a1507a26e01caa3c3912e2ea8c9b4f684addccca71bcbefcdc3c5dae776de374e
-
Filesize
8B
MD50a6dc0965d40720056505b6f9b40d21c
SHA10376e6eb9f1de04790e67b0c33d454f310964d80
SHA256b239d0819878596f63c6a0c9303b79653cb6d66fece48c2448c3305bc85816dd
SHA5125c4b0f8fa7412038996ea71d70dd6d2b996156e8046bdb514f1bafb80ee9e70b08a98fcf37fe78792a8ed43dbff96dd31734cdc15d02c984e7c8065da150d8d1
-
Filesize
8B
MD5deecf1597bcb1b1d26d037ec7fafd0a9
SHA12b226652774279f8d1e42c126cf148ffd78a29bf
SHA2562bbaf1385c5ea9f0fac967b5f3644d3bcccbadf08ffe81e2c48e9ab310f23906
SHA5127e51b852f6653ee0d24063ead87b9d1360f0c963c6922dde4cf76256a886f4bef5613cd9b9f253348b956da79aa52464bafdf9a106a488fa73bcd223faad2e8c
-
Filesize
8B
MD5069053ce4e7a8fdc6c69b39e39bb8786
SHA12492bd9c94abe3152b56d3a92646f908d28686ab
SHA25699605bad528a69c176fa904f8ac946f34e7c04303d2e73e59c04d01ab2ad4641
SHA5128e2f6b3f1affd2f89fec563d80bf2a44753e021564658e659849536021aa472b78ac75f97c8aac9932a8b69813801a8335d7a230d4a9ac70ec686a76990a08d1
-
Filesize
8B
MD582bed58f37bf440a571653ee4791b165
SHA1f9f7a69c9ce2ab351b06c222a90a95406449b9fc
SHA2569ac2b5d6d6b0bcdb09603fbbacdd3b470ad1ff1ab244bf518b13aff7a7c0b479
SHA51244b86f4cda7d0b044ef94efdf8c7142a2ba73c76d85e73a39d085421937a3b1743aa1dc5f36039f7b834b2630a2d2566fb003a3318464fb077b1249e02a9c0f4
-
Filesize
8B
MD53720e66789c3a9a15262ba71006400b1
SHA1f28cb4ec39b3300b0b34733d6328b3e836db3fe6
SHA2566cb395d6d1f718427ce91168d7c75f25a0ecceaebe1073d6c3ff8338911534a9
SHA5126da13b49c34b6bfcee81bb4efa026a2e80c14a9bda321df470a786793041e6a47b658627b39de0e3f42eff2ac170228e3407f776c9afc75bd83c039e86650822
-
Filesize
8B
MD50267e8d7564d909ba62a8cb21d9c2ec8
SHA17ba943be30632591828355f572545a1a9bb1ddb8
SHA2560f40c0ddfc00322ee7362691040a3322c4e9e9567ffd8828e10b5f63bef4ada4
SHA512da180387459a4742ad619fd7582ec281e6cdfc133fe820f9cb83023a0a47f0e70e47f0e8ffe31b491b25cba11deb216e41d2a0c6c89584e13ad8accc4a8ad239
-
Filesize
8B
MD5e821afcbbe7a279af770bf34a3efa319
SHA1dde8c33941f0812114c08ac70f647c9d2706ea8d
SHA256382fddf6ad11631f9161c78fd14118793cd4f0835f7667c7e0ed660c20779084
SHA512030109581b23faa7ac29fb7fefe4818f2f820e29874d0c441fcc50523b66f80ea4710cca866ce94c656d8859e2c57293d5e6cd7d60633924c28c3566188695e5
-
Filesize
8B
MD5cf227fc21547c0c6fca215e8507aaef4
SHA14c2836907f016c03d871f854a4d260cd4c497f0b
SHA25658f63a4c75885014006f454dc73be56449759032fb9731336868a53e160d700d
SHA512141778c2eb2e0aa3aaaf43c6e11ddc395adf8f436fdfd29a0fa65981a924a5f26b4007d0c8ac8f18e8eccaebdcd7f27961f87155df5498238facea36cee0c2a8
-
Filesize
8B
MD5e5f6eb1503e24410657bab1005a679a2
SHA1596e7f8bbb03e6865d792c0cf2201fcee63baa22
SHA256eb97fba37efe3bf10b39fafbba072bce92b850702de5365faceab9b27eef7a8e
SHA51289ab82e9f276cfcdfbf0097316c9264f6d37fc963d1b720acc4348a311909ffdb0ba6d98039f70b4fdeffe8274deb4ec09c3c77e06ef7470dd2125e2714d067c
-
Filesize
8B
MD599b026d647049730008b67e6ff7e59e3
SHA1ba8eebb133110a7798173882811fd3f7f7f0d7a4
SHA2560f9e5ecebb7f2c0ab384194e03592cba89a755056b323722287315e80a658f27
SHA51211fb05600c335d6bb03efeb8ad67d8f858fd9ddd6cf3946dd71304a95d0c9015b61f24c8c23bb4d3d5bea5704a7c2b13b0f5e30c50d545ba0b66a74bc9283b3f
-
Filesize
8B
MD5babf8ed91a24bab2101b3f0134e27a6a
SHA1342660d127524ed4e38b63a7319618ef0b8653bc
SHA2564ecea1df39891070dc2177d6eb4fb754280a2c46f048cba94d30f8fd7209250a
SHA512a7acdf78ff43b39c334f95fc49ab9be7dbd020b68dd78568be76132d66075f705d56b9e1d32eb057396b9692b83ad8f30d5d7cc7be6971544b636940e018b001
-
Filesize
8B
MD5775b045c0c7fd1db31a4e51f3975060a
SHA18e2ee5964a235cd398a9bd77244c66eae59aa4cc
SHA2561c54ec682336d2be49582571da9a585f0776e2f14ae16d4c5fa33c1925f27f36
SHA512bd0fbc0bd6733c24be3f7a73a3dd538e9db2f2799e550b84107794a7e30ee62e69c2ee4e5e6d064bc27f0fe5ff39d30751c4cd9c420a25806ff39e7c0d01fd73
-
Filesize
8B
MD56502ea4ca82eb020ea4979f6d75ca15a
SHA143960ed41a3e834a2e3ba035bc0d845006d2a401
SHA256000ccb172002c19cf1ffa759630a5682214ebcefb8eaedfd7d2086f8a62075a2
SHA512c2ac9404ebe9071ed576725266f9e6cac276832fc8e03a4feadc7bc68bf23d86a24741917d690a996f77f136156a3ed440dcbc79f5c3075aa505de5bd395f3e4
-
Filesize
8B
MD52ec79f8c4ce8b3a87d7eaadd03bf2f80
SHA1e05598d48bca84555b4d17401a4312847a51c3ef
SHA256cf3ab78d3ace0e7544dd8da53c6eec0a9d5872341f73e1b66aca11da8cd2730f
SHA512df260b1746fd1ae154f550d64d1c07e94124f97e2220a98e06d1f68a9042387efd89385d2506d79b005813aebe59dacaa347f478f0dad5d3bfbab7c3db0d9569
-
Filesize
8B
MD5fa0f1449ee84c7ffed66c7f0f02c6908
SHA16990f8eb57bd0e8e132da0d5766bf996527152a9
SHA256e6f39787836abe46bb835a3eaf32e90b1caecb4b7ae950d09d266aa40205c10c
SHA5120d0b4a61363c71ede2ba50759c52b47b16786f989a1709c7ebf22970a4d60c3f589fa044c40534eeb186c286e8b79611a9b6c1df5974fdbb03112206b9af45cd
-
Filesize
8B
MD5b945b64a27d45067b9431c73c4199007
SHA196e74ba3efb6ef42a43a75aad2ceb77584bf637a
SHA256db4afb1b5d0d5c6d538f01702289e8b95129aa67f9941c5d0994c5d93ea9e6c9
SHA512505b312136d072bd897408615299a74b9b413a5726d310c3b700d4eec3db24137520fa3cbe822d97aae63858c54b839c5bfdece6d6ab907dc5bba8b172029b32
-
Filesize
8B
MD52b7cdc0b8f2e1eba1dfbed0c15b61645
SHA11c33c69480a8b6ad3f1a6eb8d048f11f317fae9f
SHA2569a6c4c4daf9f142394ee04d9d24d5c6fa699212e439d4184620ff52c40574239
SHA512d764c7cea89a6dd9d74ba4a5b5d178094ff2041d3a5a2f196d54aacbabf65d9127ed8187d650c7b2641cefef89f4d8356edbaa5de44056985dfbd1e21618463b
-
Filesize
8B
MD5384659c2e6f1282d0dc3970391ebfa32
SHA1bfa44309c92dbbcd8866c5054edf62253ce9a4bc
SHA256c11eff93f943f30355fd699853d94ee4def896011cb6df25cefe5682980fc14c
SHA512937fe21cd545d3b8986e69ef991329a0dcbe57b9cc7e434b42d927ce43a931a7b8ae71685e6c2fdf7d0588404e146f9fa0aa4200976b77a98fb8574731b1c5a3
-
Filesize
8B
MD56143db2bfede952af4a3ce2cedfdb17a
SHA11df6a65e3380fd8d33bd4388c1c8461fe397615e
SHA256c9692f396314b95eed4c8eb7b1dca7e27aad446f5dc1ffcf75fb8956db94e63b
SHA51200dfa903c3dc722e3e003fb0d2fabb5ae63150e26352e29a62f6721477a5528f00706e2c5c0d94ef4cbad4288425882d35b8715f7beffd518306a67698c0b1fc
-
Filesize
8B
MD594da1204ba32e7fa3c8cbfe81e604fec
SHA196d8ffcc48bc0ee71308efdad246f73d60498d1c
SHA2565410d29e7c3715d6338247eb104346e496ecd4c410a94d45084ffe10cfb6c0b1
SHA512eb31804fac231e575b8b7f9a4cc212e0b585867cb3e5565210d3e08892502dbf85a17fcda1d0df73ca87e12ac2793670bc8283b207f5f0be1d72361078f1471b
-
Filesize
8B
MD52c218d3951b2ddc61bcfdf3ad811e276
SHA1bcf543742a70bb2086b4bff8b6be3e918da52e61
SHA25666ddb2e531322fa15e4a44e8f91b445eb6ab1c29a7bbbac12d3f10af8afdb047
SHA51274e313fdd87d7fa99d9194c0fda65977ec774203621ee1719d16ce52eadbcf85f2f0a31932e392404d7dcdf900d9866e5acd37fa1c194eab658a08becdcb2f6f
-
Filesize
8B
MD5e5e93db0e8bd79092169dc81916716f7
SHA16e09f3adfb98b9ab620069f09669d9ca9e949d1f
SHA2562b49b041dde353dfdbdfc52e27ed5206a0e68ef5c3f46eef7d682512397889a0
SHA512f2ffd37868d2157aeb4b27960be058904122ae98981e8a3580d850ace0b7433f34726a337c33a828d40f6f413bc5357fa924de05ba20f41a8579fa5d20e3e645
-
Filesize
8B
MD5c7c7a875c191d1b81f7015440e653c64
SHA1fec49432282e808f24e4ad1b337615f7c7fe6b55
SHA2565e96bf2a1eafb45115124a80c4356452ce9d6a4fd7648e6163b65aa80fe43b48
SHA5122b04a767d143d03129b3b374ca97101d121b3d05bfb1aca101c02120dfb4e1ed9bac1cc55baeef2da453f96882285cabf9c5c038a7813518f19043761d53f8f7
-
Filesize
8B
MD5cc78aba1b83c2ee448b32d9732dcef35
SHA1cfe8473037e8b005fe1f068d72ab432ec0c053ed
SHA256b253c3f7e2938f5b462e196a9168bee15acca4b955173ef9c9cba8a1f576b453
SHA512631735dba1c332fdf0c19394fd570bf953fdc717250e3213484ab083c8c896e9df596df2fe02edc30ba995b933fd77e74e8fa66810ea9c3e4a9fdb1049f8d659
-
Filesize
8B
MD5724876427c0ec64dc36e2bab44b17882
SHA1c45c18669fd362f67ed27d95a25e81c182fe0561
SHA256a333e6a2029239f5895ea1bf4c258313c086e9efbc1a56b30b393a66be0434f7
SHA51293b14fc079f0f102fec5f1de8225ea1f9e4aed7e9b3911897a4c4319b583f0f0dae4487d05faa2cfc63367f7d5c6dab056c4f565669a74f6fd171b0193253f33
-
Filesize
8B
MD522e95e3d0315c0c752b50664c3a8df1e
SHA19025b20fb9f1b5dea1672470fec439c7ed4744f7
SHA25606d266c8d8898169f9dadcfee482ad7bd8be8cc313aadc1e6283c09e0beeff2c
SHA512861c52f524e09b260ec46e8cddd9ffaf95c765449eba9287a37a4beff6357a89e10c74d566fc570837675eb6769aadd862d56ace7a892813738783226f1de262
-
Filesize
8B
MD58b0ae8a2896c749ac4ca135f20b0f39c
SHA113ecf381443fb501b50d27035d4f2c4d6ee89506
SHA256200ae5a45759b179373676eaefefb88aacf3b4a0f529771f930b9b4f6d2a55c8
SHA512961e502fba8abbc410335ff857c77bde9938f969947e9e643de03f9763c8b775b341d94735186d1661285da106cf485e705deec86a0d2a24b9d4faf4582077ee
-
Filesize
8B
MD54ac9785649a6ee56f45976d38861045d
SHA1d9cb598c8a39c879b9b50c4b21c65144759fb247
SHA256c823c32725f3abfe9d7f30533618d4c77e5691b3374d01e8baa391c4d5e0d4fa
SHA512c392b999448f215e7ee9b05f5911e1092eff27a8d4bd7ef4caebdef63c43d0523032f55516c14f3ae7f7d5e2084baa114bb0a1d4515c2891544c57800780f437
-
Filesize
8B
MD576fca732dfe7d56c70f32dbeb2373456
SHA100f5ad4a50c6669dd30245b5649246a021d7a851
SHA256c271873e9cb08913bb22e75f1a0b9eff540a07b3e25016682a862e6b0fb3814a
SHA51237ffc40c2c7bdda1a887a23bc5c29e5c0e07cbc996e79361be23da05966ce4da96e0d9ebd4a596ae608940f57a9944b03cba3f676e0786137d43a3239af22fc4
-
Filesize
8B
MD531735d04bcb17fcd47e1f95ea4f8eed7
SHA15446935403103f9f797b9a2fbc092ca2695db55e
SHA2569f6736ea690981ed35e72b695ac7d0f6249306baf233bbe40e7f4ce7f7ead418
SHA512c04cec3d79e0697c33b426f9cab5be69efa5dbb54491bd1bad0d8f1b9ca656057aa89e74c57e27b74f87435f606bd5a772944696c6e24ec433fc6aebac80ffac
-
Filesize
8B
MD59ad7371f4d7e69543235c0dbfd7b8b07
SHA1d87c41f15f91e815656e79b2e7c29963bc56a69b
SHA256b4a2d5b18036a2c71c7fe13fe15d79b8096b8a87186329ad3eba7232d79d0858
SHA51285483e97b28e81ad9dbab844e71df3cf1327fb1dab465637fadc4f8c5e869983763e570e6d43bfced4666379e3d98365d1338a56916f5056354f1f71dd45f84a
-
Filesize
8B
MD52af3986041301ae5e0b6c65efcdbbfe9
SHA17751dbbe6712d9c8fec04498cc2353e8c5573a1a
SHA2560602384bbd06e6a8b48c0ddd6c07c8699103bc98e4ada4c7672318f27b8879b3
SHA5120fa23f5eaaefb397afe86b8ebb4fdf1684f96709925519756ef549e83712ae5c508ff2bcf9bf8fbd507c866170bd2daae109e496fcedae69290d419d5abfbb4d
-
Filesize
8B
MD5c7152367b41a3c33b59d577b886fb00b
SHA1d8c9d84382089f9365bd58c2c78bd39e4b0d1bbd
SHA2569e7d0cd0052ca6b4f9525b2f14dd447bb8ea92ad2617624817f49e4f67485661
SHA51298f6334a6aa28c320ca507c2b642f89712c71d158134d696cea9dbc3a6407f9502ad2c7ec3aa8d6b0bd8cdfda4d0affe10592a7fd54ca469dd4c80cb020fb6a8
-
Filesize
8B
MD5f496ecee9435905aedf4340ce05b93d7
SHA1bcaaadb63f12703f896bc381c592e15c6f1b6f74
SHA2561997299124a8e5cf2f00c088ad1c3d1a4b133b80e9457fcb6fb47b69baa89e81
SHA512dbcd342833d6b65c36dde53ebeec5cb1b7a1e470f9c631964b45049f6e03a0157099be568d0de3332a5dd5136d01a49f0af58bd15f31f469c2f7e5e6951e5fb8
-
Filesize
8B
MD54f40f25036cad6c7c4cbce1141097b23
SHA1fbe5e01c59d819c855a6aa0c7c65baec2789cbd3
SHA256e0d2b5e67801f8930fe974a821829324c2644c418fbf96d0a91a55bd8c45b2ff
SHA512f7a6d2dd30b2a497135a3139dcbc9571932e090cb1d0575caf4d2a2c0bd41b87b5ae853866634a2584c6c12ca7367e0d7f70af0766241af00ecaef03feb28779
-
Filesize
8B
MD50ad3a78b76bc966208223675e0e00074
SHA1ccf65c3f2762e49389e3dab77f2b0a40f7a7e561
SHA25666671314e538cf26c1b9d14a93116ccb8e6f961bc0e87a99f80141ba739095a5
SHA512763dcc64a31d653d43fa0c4dd572152dfc60ceb83fe7ba5705031dfc09ac74f052bc826393a941e4901710e9a08d3374f1e0630d09b2f2fee7ff61a13840509a
-
Filesize
8B
MD518e9d67779f4b7b11eda7994a1cfcf18
SHA10ce5f372201261c47ab2e76f5a3eff521dea7d8e
SHA2561b258ad95008c5a0307e79a9d7264f740df3441b773913eeb5b423d25c63c0d8
SHA51298d27d964e4b28965b9de1c5d80d7bddb2a84db92ff366a214ba43aac3e2238f876468fdca700f8e83ec9bef8f7dd59557c97f54977338f2214d10d359d3a788
-
Filesize
8B
MD5bb93509737b30913d0d795ec9779379d
SHA1d05db3478f354646e6fba16690b03fbb79d3596c
SHA256031014a3e2faf8eedce555f3e93ec27cc2d76265bf6de36feb57c4f614101d3c
SHA51214bd09a4ad623acae631a1f98dc41ed1b495acb36f5e25857a0dfeb9b8c8171a46eff1155457a9b4fe4270e0a571c54387b7a86be113fb1934d3091be198bc4f
-
Filesize
8B
MD546d5702b015a4489ffe757f0e531155d
SHA193bb35f3cea8f002fd6b325225be8e52caa32cb9
SHA256e9184bbcb02eaf595a9398748d49068809ef0fe76eadccecf94718aa2c4f91a0
SHA512793b97cc8528a90f56d417db0a44884e73944d994fb72917a08d874d473b36f1427c4703206eb3b0e3d41abed8da36d366f44c7f9ff0e81c2656783a02da159e
-
Filesize
8B
MD513580cdf28c0f9920afa71127475a9f0
SHA129374d21fc2fe870797bba2dc0ddbda960863617
SHA2565f90125bf536e124911727457ae0f5af4643e0c9f15e723934664ff39827626a
SHA512668b78a8851f6ae3c73a74e09165ca834a0bfb2262fdcbe3a5593ddeb1384c0a4e98899e70d611ba4ce2ffc52401a630afef09310cd322045387811249b07941
-
Filesize
8B
MD51d460d8d2c8a6d865dff8cc75be7c6e7
SHA1a76351299674f4c9a29f00996ad0cd9f58935a92
SHA25673124764be534189cc532219de45f64ff1ce111a82cd380162a67b24707b10dc
SHA5125d152a3bc244c65bae8eb1387920250cbe9d0d7fbdb128ced05cf7d558b4b31dbbca94e37008678491b4663be5a9a40b1f80ce3797be42484105cba296c383e7
-
Filesize
8B
MD563449168a0699f4fe31acba7bd1f7387
SHA1f65784e51b6b8395033a96ac9e1416adf15c11b6
SHA256a6fe2efacd7cd60460a88a26f6d08fcdf7bfff6f3124f62431906f13f145f627
SHA512021d924aeba5495141d0616c6ec847b6d3f4bde024c34ab2e564c3f547cbe7fa38b0a10942a32f54bbf53bd178bfa56dca7020eb7dc877e0c06294e1ddaf3b53
-
Filesize
8B
MD517677faf91847d67b48e05e524a36049
SHA19b3bc211865081636cc490533af658b56a711282
SHA256c0ffd11b47a0549af61afaa63c0780d29f755039c11746cd189a6da94d049ad0
SHA512a7f02597aa0223ff9a9e241b85930ae8ec2811a8cc3bf021ee1c0123a6bd4645b09ce9658900eb01b6ab58668a999c493aa183c76e997da49900ba329061a0af
-
Filesize
8B
MD5aeb30dd3f95ecc5d63560fcd511ab16d
SHA17afe50e5c2138a2c5def9e3e7342f683ff664d22
SHA256fb32e2dfb8a4cb8fa439112685a24b039260374af1e4f597126294e22366db8f
SHA51269505d0adb4136a28cc28e2105a0f786a93019d0f0bd17be243b5598b96c5ea9709e5f9cc696a92a32c5ca783752a07c8d86956ac6369009baee522630a2a07e
-
Filesize
8B
MD5fe0aee527b217f75daf63d5f2278ec76
SHA1e5cde156fb3564f65f10c6668a2003c51b95353a
SHA2564f0c47a29b31679d3b5c3ac679e62d51272370b750a50b929741070f9ad8d431
SHA51258dbe8a891c53272aeb98d954f008c97b39668e2b6742b94aba86919582ef644704061f500a45d0ac3208ba4567f9de6028576d9b05ad9a5c3f17ef989f4c96c
-
Filesize
8B
MD5042726f0699f26d7bcc60dbc52e526dd
SHA14aa8b487a3bf4b6090aea4e7428b504c7504179e
SHA2561292bbb8f2d8ebc47189c79c78e12ae6f2f421591218189713ee99940d217893
SHA5126014b8dec934c9f713e840c0929747a089a6b6ce4a8a45b1871ebdf289e21903e3959363bd4fd426f6800c89772fde02d330fc33b4f9e1b10ec13c50dcbff13b
-
Filesize
8B
MD510db9b54eef739fe41debe600b1ad4e6
SHA177d7879504d5dcf61dc2c36621605ade0458a2c3
SHA256fb814929b0d280ed46689fe0afeea6333447e930a2a740ec8740532fadbf39f9
SHA512f15e925bb8b5f03e6c75520f67d28597016285593dce0c99c93c17d728681a9b73fa2d3a6bb1c2c2360d7688d9323cfaa8d29048c26f2ce008540ae96989d344
-
Filesize
8B
MD5d0edfccfc32fe68cf43c2bd5a99fb291
SHA1058243ff956e30a3b902fe5030051f023c4f26bd
SHA256869851eee81151a43b5900b602115674be9a4e3201ff001f0d5f93bfb846bbd7
SHA512ad118ac08585e95e99cd3898f789513683242ed336ccb301e7184c4fbc6d8594dd9872b56f8151069e99c2099c82eced6f04b44ff8f7fa4eab8503c99f6e4a95
-
Filesize
8B
MD5a3882f440da2f6d69a9ea9ec75ef57eb
SHA193f6c05b564c9861da4f725670d89ab08aa3f687
SHA256b01ec75827e0c238a88d00207c1d9f80ea7c649180daeece344f8f0cd3981e5c
SHA5121363a4253792728ba53c528fd4e01c7951efec35eef25190fa3c69ea82816640698d99d6e5aa5903cc8b1776f93f38b7b95306eca2fbec298ad950d8f4cc33a8
-
Filesize
8B
MD5a16e37e00db994000711149a7af0ee2f
SHA10555caa62148fc134abb5a676405b20d49446a05
SHA2560a8488c96fd672ceadda01078ec81e56baf2d554a6bf853947a0cc67f9b6b185
SHA512f92140876431178000dcd04d4a34cdefe41e963948dfe3fb640e910b0d8bd1d097e2e4c6cea7e0c0f758bb969b92d9d335343ea49a91c4be1ad9025f5ce5ed6b
-
Filesize
8B
MD50bd3c8bcb684ade1d94a06665ee20692
SHA1e246e9415273bbd44225878ddae07129ff704d0e
SHA256c439c2dacaccc6ae46f871da29ef7f5479c0b2c7d1c64f96136ebc216866fe58
SHA512daf03d95376c53cb4df3133994729d089cadb315aaa6ee671ed468601a8172023949938182e4f3c0b1417e49c031acb69e191cde3c80123b56a277eb6ce5ee89
-
Filesize
8B
MD58e4935d2018521f04c8ef8a4e7a6bf61
SHA149629ba9036b6f1e0827272b46cd3f2f107d88c3
SHA256b6117bfcd31dfe97589e74f4568d35fa177340b62f699893a96cbb439b077186
SHA512ac62b65d0ca2888e37f2a4df9476dc1d189309d241172838e6a9887958d60df92ad7d41d23ac0a9b5abe461d75fd59990eb801e907e1a7fde74e41b321e352aa
-
Filesize
8B
MD54625fed39b800f68837e70a7e202b426
SHA190c30b9336fa4751e48908b9ff61cb124577556e
SHA256b40cfefd8d3f2c20781613e25f252c38d159c6fec9124deb17df6fbd24538330
SHA512254515079a8c52fba60bec2c4aea7aab9a45081aac6d9fdb85fb631f946c373c4ba21e87367167c779dbe91d5acb7dc3eb850f88d86a5a6b3a10dcd49704cd7e
-
Filesize
8B
MD56db156df58242404af55b4e746010b2b
SHA1cb77a6d76857be96a969c719a9c1b17848c92837
SHA25674c3d2f3c7c17549b3cf412d5a1e3b38efc198385b34b0b38a4e23aad2089036
SHA512585d61ac7d21bd62315657ef9af7493d4449d0714a5dc138e63f481b4dee7b14f62df937cb6f23a8f8edc3c2898300f71cb0798acfef18b4b3df892a7ffe0cc6
-
Filesize
8B
MD56706d2762583d8521b21ccafbb98a888
SHA135a42cd8f14d4ffcbefbb6a98c52c1aeac27a8eb
SHA256aade111e6b88a802b5800f75ccb41e2e53fff21c0029335ed1abb0c16cf4016c
SHA51236f76e105a516136c16f7e338ddb8679001c848bc0b06c6c2343230db39f76e7c19fb12f871dad180fd6f67e72366d2a1b1c93289993ec6972a82a418aca5638
-
Filesize
8B
MD59c4119b5690cfab8848322d52ed4b1ae
SHA1985333a401e26af763578c3347e151fd059f5156
SHA2561df10dd02f56d1f8678418fa5ce37ad15e5320544c1d06bc04c4dcfc3da380f1
SHA51221f1594298b77fc6a9aa1520f5dbfc4a599b1fc0ac3ddf98cc1b21692469f26db2a04bf6f6f471a03983032b0779695977b462f51d094ac6093f40b413a219ab
-
Filesize
8B
MD5e8f89903734994f1d33b44941da9722b
SHA14ce63c5f8af675b2bedc99b144c39fde6df83426
SHA25600583173706a70b333c238a30889566ea40ce40af5cc7e337e9dfe2ee4bf9312
SHA512193e2363b89460e323af143d38802527cc128a0e980790ce1540d1134f7c96c5f6fbc9bf0f42b1960193974e02911fa84b5e4aa096ec8fdbf2afc89c51de92df
-
Filesize
8B
MD5209691644a537f940d16bca83775d57f
SHA145c958bafdab0c1647c856d8ee8cb57530dcb262
SHA256f41f5deb1ab9e4d30bd397ecdc8ca9ce87929bff5574af21113e80248c5066d6
SHA5127db6ba4b746c666d8a7dd5ed28ae74c62b1aa8f6e8ce72a9c80d16ccaec672ffc604eac231212e0096a19444c89f1face66587bb1f84f4d2d046ef7cbc308005
-
Filesize
8B
MD5b3e650b02da530f11970ae2dc84b2e48
SHA1437ded68e6bc5639656997abb9c68b6bf91fdd00
SHA256195c9bfdfeb8a72a342b9ddcf910d020583e2679262722ac63237823b10f2300
SHA512959c9f97a2ca3ede5de8df92970f7645d2d09f4192b414dc8d21a70ec33db79683c2c9fcec0d5483607575c74257fd108620731744d17d07f284608f975f398a
-
Filesize
8B
MD5bb089edf7889a0f7613720876705e81c
SHA12a450328acb5a8d9e16e5621c7f5d2a482731eb2
SHA256caf3cfdcd466a980ab65f820f596c58b75fb2677a0d17d7b7bc2249b451cde09
SHA512adee7ee4d7e0aa3dd3b4e850f9db381d965c852039b910cece97ea2499fcdd58b325438b0fee98d293e5136160fd5175ba69f444348768ac74eed417f0351678
-
Filesize
8B
MD574949a4d1e9eb74bbbc541b6092cdce4
SHA1cbc3d167b824016b787043dc497f08c88d8c7c1b
SHA256fb618b5efe07d9660675cc159924056d5e1fac9610518d5763bc09adf97f369b
SHA5124f0092e5f96b5c9a2d48d94563cc171edb3db3a62e442fd48e0190cab1317be1823b8abe28dd075a7d198b5be306d3d84dc68422b5b365ba4a2e3cfe0c594368
-
Filesize
8B
MD5ba307858b8199b1aa37b0d91e54f96ef
SHA1936dcffdb99e8372f5d32d79e3383ea48a2c99bd
SHA2564db49b27cde356476d26de7d16e8dde69a246988c2120dd037f45eb62fd289d2
SHA512f92415752eeaa9946801cbff965f5023cbd1a57f89b84f2d97ed29d5d4270cdee05a98cf01f6a558ef01a0c32ba804331a2149c5709745da43ca4bb9eacfee03
-
Filesize
8B
MD542b9aac59261f8b6603f7d9c317bdb56
SHA1d7b6c0873c61315edbaed5943f508f60b8498c1d
SHA256f42b72f7adfc369d0d89df0a674204b3b2c9522a8090a15032cf9d7d5c888e51
SHA512b6afb9451a3011420ab067d78f6f9141d7083ef69bad3b0497e98b5df08942652ec8028be825f2749ea7233cf95d815527a67a5d670d50298eeaf6e40fcd45ef
-
Filesize
8B
MD5d2bb4a8622905dc335ad09f824e75b3b
SHA1c7d0231267a5a91284558d27654ce61c300bb6eb
SHA256ec5e393bdbbfe38f4241dfaa133898688843dad32f8ae67a90f4600811fbc2d7
SHA512f60c2498fc058a01b4887c4583a6ea8d6304212218d023c07d4a42437e3c81532e2f34fe37f550c58e82bfc94eb040ba4026aaeec4a933efce541627389c577f
-
Filesize
8B
MD58ad4ce44725e0b061160b5fdd6dc8899
SHA13f3023728600eb8f03ebbb1fa76d36b63d3840a2
SHA256317bce2e580f6c6d47b86b247d73aeacdf47fa1e0779073ba43f006c885eceb9
SHA512deeb917d209adc11292268b3b999f0d32f52473a1e18f44f01f4313908b151f07931d86370cede4b39bf67ff909e56d1f1f7d4a3cd8461d12079ea7c045be96a
-
Filesize
8B
MD54c0954c4b6660b5d1ff0c9490d12fb83
SHA1576cee5c0aa285998c29d750d608348e1b8da4e7
SHA25656dc106996a7eecc0305a8d6180af3f611d084ef4f752fa95d4f734b1091b7d3
SHA51280fb98af3e939130a3b5f05ca919911bdc785080843680f0c899f4faf7bdbafbab14178951242567a25808adc24aff80d68b34695cfc4c38e7410ce5c2713ddf
-
Filesize
8B
MD54821801dc6ff157bdaee832aebbe64b5
SHA197a4024eda40fb566780458a8eefec75c8361f77
SHA256ce129f62b50d0bf39a9e8f7b152f6a2704956b1b236af17d55e3d8a124854f08
SHA51249e6524c3415fd52e54a3624b51140c4dd497b52fc5cc84d07426be64ec2a2f3c22377848d9a2c18c8f9a9b4e838e1da6f0c588438522105d67ee7aa61617751
-
Filesize
8B
MD533f1cb5f65eaf874606527c5f156bbc8
SHA1c9f74aeb820b0a80318946e5d9d2c8e42fb6414c
SHA256c424ca20f69a9be56e87f0b22b6d0a18992aa47cc7ec35cbd633319286013330
SHA5128516db2457d772a0fdb7fedf73024b54c82ac675966f88c07fc9e5b91af5aa1a5788cb7cc685d7bc04bcd00e11ca7717d951ed088f8375c5f863d2faaf15d3b9
-
Filesize
8B
MD54563d55b7bb02a8c51cd8a4ac0d665b1
SHA19879026d2314af0242732a37a5dd68393a4b9d2a
SHA256f3011ae16328a06703b55c72e70a50131f87df28e8918904d2dd6b66b3e180b5
SHA512dea44729339110c8563daf7a3f9ebb24e548e0d04fade1e59d30c150a200209bdc688b3192bcac7b2be8049a3b8995aef76f082f36f3bed68ec6a85a0082be73
-
Filesize
8B
MD5e800ca80872dd04a43be4b7eced558ea
SHA19ca18e636a829e8577caa665640ada27bdba71dd
SHA2566ebc6c48c0af7cf5d0faa6760bdb0b341660f1d83e57cee0917aed6a67b19bb4
SHA512fd351b06f3b5cce00003df233d882e918031e51e316bdaebabfca561ad593a42c0342cf55c400c7f1760e4b38fb99451f9cae1429863b48d1412c1843bc4bfa2
-
Filesize
8B
MD516f50876a0f3e7e71a23444dc95b9488
SHA1c679e7611e3bb94bd32289d7758041af932cc178
SHA256f4644c2c895f991ea08197a0c77b4ea58bb0240f0fb2096eb1baf0e16cb27af6
SHA51239fc803c50b3c19e9d7e96ba2db375404be835ab9d4ef559b1a96e99f7a8659436190123df99d73fa55a4d8635d29ffa1a1ea6f28cdba94883fac1101db92c10
-
Filesize
8B
MD5dc29dd1fa0114e150df0a8a0825c630d
SHA12850fd03ed37a2ee2451dd91b86c02a020c7db51
SHA25682f2c4ffb7dd96d0ed5c9ffb3d8b275521014da84336897e73ee4d37e150995e
SHA512965154b89d3b45c7fdd1522e41c31b91dcce37a587cddaebe569d3c5c9c9397b4f5cf04ece9db7f30b77580191d615bdcde403485ffc1843f392658a10a2f11b
-
Filesize
8B
MD549cca1777811463b048f872e94d4b717
SHA11e97e1818320f5f357924a1386faec38bdc12a14
SHA25614257fa85dfeb30684b079dc476c6af1dd99871e94641e3ef8e364b277c7569f
SHA51255dca4e6d73e3e1255d60de0a1792974c5209848e8d45a4b2ac92deedace566c78aa7ad4ff9968e51dc941d43405ffa696ad21db78fb423dbd9905cd4d07d659
-
Filesize
8B
MD5d46e7241489cbc7ff20a3470f2a91e0e
SHA19dbcb1b58336ec5305cd0172f9db43b62e3e46f9
SHA2569af93f01ad655f8f93cd849e5275cc5a32875201fafa4a74038d8284771f24ee
SHA51247d7cc93cd7bedcfd96ff6099e3a048b509c668e2b50bf1087d5d8e44757cda9fa0ec69fa18020fb6c85d40e8215660c6d9b90c9c620b3fed292e1ad93c9d938
-
Filesize
8B
MD50458d03c12897df54c0ad3dd8bb46c40
SHA195dc36f4984b839a89128ba73f8ace8c0961dac8
SHA256a84c402927f8266a8e6731d748d109916a5cd92d41baeddda1a4f1d27d1a24a4
SHA512faf2ca28476ff8860473ee28694912b913ceb8122d7b11d1a79c5a4c5e96928386dae928e67384109242da22541a45c5665bb77e79281501aa89b3ea426895e9
-
Filesize
8B
MD56b16ee0f089c642906031a63632852fb
SHA19045817b67bf1356c25fa13efb3189986cba90b1
SHA256f38f65f45f4de45e15b09191fb138efe16ba085777cc2898edb8c725de486d5a
SHA512c503b6d18878079c9a04d83c08d67fc82455000c0c04182c80dccc51c81febca5304e17769bc34389fba74a26b0baa7396393e3f947981280eda835fd67a9f7f
-
Filesize
8B
MD591c2809d96ebfc0dd1cfa8b235f4454c
SHA19976426961e3c83261a6c104bb577bd97a553694
SHA256ca00ea2a8a52f87f5d60ebdb71074938c28b96d84dc63cc653a7a26288da14b8
SHA51277fccb0e02cd98fa89ee75bc9c02b2e0a60e0390bf3d502fd8a2ae230862c68f36b683e5dce210e969939c527a935c89e61625e029deb9a7f9e016fbd04d4a94
-
Filesize
8B
MD56b317d58225d262c14fa0f567c155663
SHA19d42049e5d7a466dd3e13ac3895b9a30749e9a23
SHA25665c2ee96a53932f870e64f63848fe2fa73c4bbabb6dedaca5f2ff40626c3e0ec
SHA5122d1c3517fbddff6d4fa99202aae9618eab5d38b5607e8ed549a522c2caad66c58147dc857b1a59eee3418c7694e29b7d220f0122ea9df652b7ff5785852457fe
-
Filesize
8B
MD587651d8e579944e6839dbe82a40c5f63
SHA16f1ab21c2c4f584ec2f9353922613c5764f76768
SHA2569644bce738a2c5ab6c419c7e501c35ad9b66174df562b8c4ddd309320ef5846c
SHA51249aa1b94034d306d0c182bb2be8e66cb29e8d887248b38eb6c94ee6c287c2a45d0ba9ad8cd29dfecc6e0d762f0d3bd17a12283a83daf4153cf0d1ab5a556fdb5
-
Filesize
8B
MD507ed95306ff28f6d803747242f26633f
SHA116242384a3bb3a3fabb97ae6693b206ef529e316
SHA25694f19d6e5405c14b3984fb44411b7d8bd29436cde9089c279900274ef9c5554c
SHA512f193aa7d76beca58136402c9075007344b058034ec6af84de524c2b9dd644dd826796ab2e908e6eb9f8e739ae87abab514637180bdf8b43936f5a06570268e12
-
Filesize
8B
MD5222052736ddad301dd9d3b6496f1b320
SHA1ace099a7eb93785ec5535c201024644ba96b4d3c
SHA256eb2e6a8d4136d55d5fd732106ffca728ac07359da94a4aac5a3a7b4b7eac977c
SHA5123f7b9420de11ee92782d8fae2d14940dcb8e74767fbaf467fc47210c2bc452f275e43da42fbb64250255a215296ebd96264720df3ae7daadd82fbc9b0bbecf14
-
Filesize
8B
MD5caf40fce9e59193ccd7dbc95814d017e
SHA180b1dc134e3e7e71b09367deded547b3eab64be7
SHA256f834e7cba3bba50db3b63b2d0018f8e24a092a504981cfd63a1717e326ee578e
SHA51244d6a19789e46c6ac6ab79bf185bf2cb190d2efcc67db84c498cc30fd34bf367b18920ffac3606575916000d705ce10a18a99d1243d13af163791ef8021caebc
-
Filesize
8B
MD5ead38381404056698aaa160d4ba3a7a0
SHA1a41337a3b94f46285d3ebf6b76810e88e5b19931
SHA256542f88dc1ed4f2d7960278db4c2b7f5cd1f77fd88b5920dd77b00a3dfd357c9b
SHA512516b94d378192225a4a7dc17060a67c88c6d8c8ca19f37e359956aa4d0207e4565358d63acd6238d78e8743fa96cbca515b9dae79451ec1188a2057c24dd9c03
-
Filesize
8B
MD5fe4dbf01b888f1a70403424f3618afff
SHA1e5d8abf5821a1de9ef536d7298e3fb9da16d96d8
SHA25613f41b0e21d58fc51eea710a6556753da9d45e909b1be292ad7519298604b164
SHA51278178a9f4a643f11a349d4eeabf0fe6d4b19b5f429093364947405480ccd3289219b36c3f43d53610906b98c1791f349946b82cfc0b3117ed468f3b35fd66cde
-
Filesize
8B
MD5bf9c067c5d81e865b02c5d574a1e9647
SHA173ae4573144869a5f94bd176650c90a2b718d829
SHA256c4f74355f2484825f54e4d46f22476cdb44f07737a5ff7db48d01c60b6c5e887
SHA512458ebc45c297d6aa35a97e0794aacdafcedd79d5221bc8302c7883b299a7da92afb9f76638f3e3cb47205440376874aaa8379fc1e8382899ad83fafb45f145ea
-
Filesize
8B
MD597bc2abe657a5793a059f7d70c94680f
SHA1d45a0ad2c9258435c9e03543146d491c21cb2a9f
SHA256fc2057dab7cf773b987a3dbf043d99af2c91c4217c03465d2d4d3d40dcb22da5
SHA5127547893696b85e5efc21b160775ae505710f635958aa6143da835fbaa3f289056c7ce339efe507709b2ccd4c95ff8f42fac8707662433607a25a10f8bf253ccf
-
Filesize
8B
MD56e96d17b3faa6910b0ba127a0e4ccc3f
SHA1fc472b317297805181c2b357120cf39d74124ebd
SHA25653f8abee26bda0dd581eb1128fa1df5ec30436415389ba2d5cb9ed3732c433b4
SHA512d8fb3b8a4e39c43a56b18aca479f98e9772e622b565e8551ecf58d98b7ca6f7ed0c010e0e975083030ac9a4aa2a2db3749cad4d2214fc50760c1855af6e43b15
-
Filesize
8B
MD594e6415ff2d015f77fc7ffba813b1c5e
SHA171218d4a098126019b7694082e489e813d9ae743
SHA25665ae78ebaf952f4cbd5340bddbee758d0ee43b804c8d7b9835989e0003fe884b
SHA512e4e2ca7e3ccb0f7f91a83f286569c0467d032d98999aa206d665cb77dfab194edc7e4851783f55b3f374465a28c06a42a65749aa9d5ae6701e1b99e23d6c9e81
-
Filesize
8B
MD5391ac5d9601ee49b56a7cb36b120bafe
SHA10507ec658defb21de0287e8ca05cf521b418852f
SHA256e404358543defb391a02270d458af3b7c268c27210b2d2d941cec6bda6eec9f3
SHA512d416312badf0b4622228f5810269775d31508259aa38c23afa0c3e0ff1f6d28614cb6c88debff03e822897fb7d0a2295e0066aabe1afc1641b50466290c59bd4
-
Filesize
8B
MD58e306f042c4424c823c721e84ceee9f9
SHA1c12798977b3045dd9b871852d5f0e96744e149b0
SHA256ad9fe00da1aa94c94c16c5cf767af2320987af04aca6dde578137be14a82191e
SHA512cb0710a590fc29ec3a5da065dab0eee9af1ddec67e53344041b8209d2bce3764197cd941bd7cb926d3c1cd807a091b1b285a53f4e241ae8fd88ce96449ef4a60
-
Filesize
8B
MD56413c6a56e2f2dba48fa690ce6f9ba0b
SHA1bbd4647ed7353bd8b39ae4c44185cbb0b3b582ad
SHA256e0d6fe8e3f3c1a9230331a74802634e3734d71c398a6a0eede028c0b3f32e0ec
SHA51295c30d91460c4ee2ac9823b610728a912bbaa6698896533c06127761c52856f54afb0534755cc17e6c754c129496825f4907f4f7427b97a85a4ab50ce77ab452
-
Filesize
8B
MD556f6a8fdf7e5fe99cd5a45d6a8e7aa99
SHA1d2c61722bb489dd2a587ac890f5da72343b48178
SHA2566103798cc7139e4c4cc93ac28778952e914dd93c15fd1535a8204217314fd0f3
SHA512769c6ccf8c56506442d46504fbf472e0b51981bdb47c1c5059d9d4c3f787ef6cf3a0e8a37f02ed0b3e51aac6b09a550da7966767375933aa7ea23e98d561edcc
-
Filesize
8B
MD5841ab296c72f2ce9ad83c17ffc792623
SHA1c451a2929fb00ddb8bb3f3153ea2f2723c323309
SHA256bd5d743a8398cd45aab12855d4c8e2ac2f920828e82d3ff7c8b578c0a04c96bd
SHA512132e249c250703227f5a207a5278194f7e41a48087203c9732ed85d64f6280232fc71e488c40dde6c630f36ed18d1bf33fd4758b429c806c2be1be9acd648ee3
-
Filesize
8B
MD530910f1574e0a722f66acb57aff74b37
SHA1f013ed004ad71a7392f5ce3eb61a490bae19c3c8
SHA256464943a3b42750815764a9e87a79d32e37d1bde4643d395ef2701733c0716184
SHA5121aeb30d58ee6fd91923fc613435b1186c0ac105c6e0b81887ab5bac3718e8c4a9c301828b8550f582f7606740f226d65af97180c133b92e39025477663a4c7eb
-
Filesize
8B
MD5069cfb0e11d7ee3ee2f73427974d3b90
SHA1716ab87464716d6f331f15ef7f755d791a8c1ead
SHA256fb730e2213d002bcfa5cc3c7405f5f41e0ddbfa4e89b3e052ad9193074cb912e
SHA5122593873de4edd4ffa23a9257c342c85ec7861495af6777a4e7522c1ceae41c3c9bd676a2d7d4bc3a28df809e1d494b2b2f6c58b2a207780bb058221d35bed61f
-
Filesize
8B
MD5dd7e5c717fdd2afc771c5f41aed0e1b1
SHA110a66758ee7d57a36037cc63cca7a5343249afec
SHA25673ff8fb583fce0352cdc08fc2174b93fae5840ee4b542a942a0df069ae5d8a42
SHA512326c75f1c833dffc0bb0765858bfb062949827e68929e20cc90c127a734367bb0fd4abb718278af16cacaeef54834e58529d38ff7954c7d505878c9097e8c3aa
-
Filesize
8B
MD503a44ab7a51ebe9bb3056145f2dab702
SHA18cb7153cc375d471d60c2363e22925c77f7a0971
SHA256568d54fd955816c36787087dddb4c2d4165ad76fb74d11df3d16c11506019b9d
SHA51231890f47d52f12c6560929a50cad3881acec0a0c9d3b0a38804d9d353293c9f971b539322850bb00a33ee35febd4715ed928cb32b0d8d8fc3dfb53f02d7f9ce9
-
Filesize
8B
MD59dc6bb0ab391f89f6a38c1683f94b05b
SHA1b37680c39464a913a405ea698c378c9ac218fc7e
SHA256b2533b223c64e05dda4638abc4d5409fab44e116b2cf291e986c6ea6adc3a152
SHA512981f0db381a7904077df91f96900f8557053d70e1e749d04b6970c35bdb5120c0435ce2f20d9dc3c6b26d6312ea1ec380a8159d6dc9ad54a0fd7d74c5b36baa9
-
Filesize
8B
MD588a52cc10bc8f166dc1705f337c41535
SHA1cc9ff5f7ec20c70c09a8aca6e5fe69dd002394c4
SHA256f463c9c38706a0abfc074995c16508fcdcceac76c94c74a2d39054767c67415c
SHA512e030a303a531b50f346c5f3b3a3504a7b4ee864a7cea709a0d6348d18f8663f818d06ab31bc610e219169f7cf278083753e7254a762b6d7cf4b023e5587b99ef
-
Filesize
8B
MD5bf705cf0ec81958e8c1196baa52720f2
SHA1c206d12f21db580cd0000f9d6061d577d69502e0
SHA256924f1fc212ede58441cf16f761347b831f8063182a2d14f548b01753a508ab04
SHA512114c125716dd43eaf2b5532ecc05c32a8243f27d6b88522c6db86ea2a68d04ebb7fc6145e7db0b291e1ec4dd349676240d35074f26785d4f70ea85444883a21a
-
Filesize
8B
MD5bec0f69b9c23ce9fdf96e7cd346f7cd8
SHA1f4fa0807eb8946001983040cdb1ed616a6fa1524
SHA256d6830888286fc77d74867271c6d6edc49e7e996fd46b5655251474654a976a38
SHA51277ed07533e2c9cb4eec125a189ff03719c16a564c26c5e30f8e2b1e52896e999a835ceae70d0761a11ea77ed82919cb4af266d40405a565b9fe5e9f0652a8cce
-
Filesize
8B
MD503ee0286c1c196378a265df62412a101
SHA15482aee95167f26504b124c1e86daa6691adce55
SHA256232ed0ed41539a038d7be1f3b18e77c9537fd0666bf29f053d99ec1769a4ff50
SHA5120077fbd9a1f5e2b981b7cbed070d7d6bf6674945c12156752dd33e655bdea0388034e81a41674257ea065366ea277e35f4e1a190d4d50393b029c6da32b16b68
-
Filesize
8B
MD5f112517f0d6ffde85ca8cf9145877ede
SHA1241d6078a5253f70bd4da1f3383a44a6d0688d19
SHA2560480e48ed67e737dfb030a5a897ec9f4cb5c96d66c8f3ed889b8f99ab7949e00
SHA512dc8d353b5ff106777ed4ff5d7768e334aa2c629ecb7a1bc0800606d9c42329da91cf4ce7112b7ae7bd50cfa3cc106326d64dba4f9333c1d33d6e355c708e8838
-
Filesize
8B
MD5ffb84f83c8d7763d4337dea4106d2cfc
SHA1cee84cc3ef7f88ffd350c29582076eb32c833196
SHA256f24251bb1c33436f0f6c3c5fc84348adb5a5765b2f1ac3b179e982834f8f32c0
SHA51252f672ed6acba7003ba7d109e1dbb935813da1be8f294c37029c8eb91013b770fb90c51996d31e6d167f286322edf94383fb9beba0fb22019bde235487e13650
-
Filesize
8B
MD5c8913572527462cf289fb756596a5ca7
SHA1f265d5dd401d7e7e15c4fb71a63822566f712fc7
SHA256c6ed887339c67736db8a0c00d38a61531175b022b0b597b107e677ba12536d18
SHA5123ad699d93300fcc3cf9402b0f77d18afd45a0c28d44417c75af42f4bffcff6b2aa3a1c3f1df814c0fba1585558a7b5ca02597c27dd9dab603576464c849a24c8
-
Filesize
8B
MD54d369dbfb77094bd59e30c007d1f907c
SHA129a296cfde0c1af2ed5f3127b17e09a96a2bfafe
SHA256711e0a9f50c63d2fccc118d49ae8dfd2d21749bf0f83376d85ec05c5981021c3
SHA512b517051b478d6d2c2158ebbac05e298054e0d3d1e3f7e66cd3f7b37dfdd98fc69861ee8e2613de30fbdc3b56c22e3e6a76e319307147535ce5cb870766706125
-
Filesize
15B
MD5e21bd9604efe8ee9b59dc7605b927a2a
SHA13240ecc5ee459214344a1baac5c2a74046491104
SHA25651a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46
SHA51242052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493
-
Filesize
1.4MB
MD5c6594d13734462e327a75eb803c1e583
SHA1a37788d357fe854b4862338e43f2468e80ca216e
SHA2566b67f7c1bfe6dc5060a40c534ed1aaf0c4a39690ef28347b004c777bb5f48263
SHA5125060fc6a29baa20964fc9460a6d2a3b89de430150ec3cbf088d9a253df99f9a131f20cea7652fe2a1d1430a29ead679e65f4b7446e3633d4e244dec04c0f0316
-
Filesize
691KB
MD53c51cc385de857e6e9b365a767f8554d
SHA1b4bbbe648abbc09e530ce11b353056ffadb5448b
SHA256402d58f637b33baf593ebbf71d95131435b952060e4eecb333dad82a624921be
SHA512742edd1032378a50ffe2f910946e7c64e66ec3fcabdb1b613b9cc22d06a8317626fdc725d2693797b51b858cb02cfb11bc546103158335d36d8a45a240420369