Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
f3081789276e612fe1be31893ef97670_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f3081789276e612fe1be31893ef97670_JaffaCakes118.exe
-
Size
428KB
-
MD5
f3081789276e612fe1be31893ef97670
-
SHA1
6fe24da86139379f3425264c3b99e652efba3ad3
-
SHA256
90403cfca4bbbb8845101fad657ed47dce656aa2f3d332284e03f69325e950f8
-
SHA512
c3d9aa6df7a815e2323b6f774e6f36d583a52b7c59f98d958863551c5e58cdeec7cd748dd8f2d0d4d087928187ff9964bdd706ceca8d18f4c093a8b61ef03a61
-
SSDEEP
12288:gDEwAQkxvEFI5wkYCoJoAQ48l4ewCN3EMF:gDEQwvyd7JtV8yehUMF
Malware Config
Extracted
cybergate
v1.07.5
TAKESHY
takeshy007.no-ip.biz:91
76H3DV0FS0D315
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
driver
-
install_file
win.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
hamza
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\driver\\win.exe" explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\driver\\win.exe" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S}\StubPath = "C:\\Windows\\system32\\driver\\win.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S} f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S}\StubPath = "C:\\Windows\\system32\\driver\\win.exe Restart" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 win.exe -
Loads dropped DLL 2 IoCs
pid Process 448 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 448 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\driver\\win.exe" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\driver\\win.exe" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\driver\win.exe f3081789276e612fe1be31893ef97670_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\driver\win.exe f3081789276e612fe1be31893ef97670_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\driver\win.exe f3081789276e612fe1be31893ef97670_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\driver\ f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2136-560-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2136-918-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 448 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2136 explorer.exe Token: SeRestorePrivilege 2136 explorer.exe Token: SeBackupPrivilege 448 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Token: SeRestorePrivilege 448 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Token: SeDebugPrivilege 448 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Token: SeDebugPrivilege 448 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21 PID 816 wrote to memory of 1188 816 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:448 -
C:\Windows\SysWOW64\driver\win.exe"C:\Windows\system32\driver\win.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2480
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD50caa32c9ce34abf6aa23675ea1ce61a5
SHA167775e8ecc4d61ce8199e7515ec9465075b7a4c4
SHA256f7b0f68b794c6ca4fd48c2a1eca952ef7ef35b1f0250027fcdb0f6d7ed7f6b31
SHA5121318f43d61e9340ad13cc1e29d390594d3d469999b7249cbb988053f8f47ef445173502d9b9d519eef173aabdb0a23072d17d74687b473b634612cf52d825008
-
Filesize
8B
MD555a7533bf3d86a2b5e4ddfcb48944e0f
SHA10d073a4c248319815a6c4cdab1e6db892f030eec
SHA25606b58354ee1c2e7d0639b9fc3b88c5390110b2e5c69e0b4ecf13fff769e6ad18
SHA512a17232ae71060fbf56e61bf25b5f1bb4bc379a6455942064a99bc8aeffd5e2ccfb7c66a8c2336c9a022a0a4a56da7648b959bd6418a8bbe4870f07a0c5bb978b
-
Filesize
8B
MD5bff3ae253c68e6eae3437f5cdf15ef45
SHA161f3a6dfe4912a6c69093c9df813674b080d21ea
SHA2569cc5343320332a0c4f0df9d8a6b54672773853559d6b8fcbd2ec0d1d0f12a3b5
SHA512d5bdc96dd1db39c53173e2cd6416448ff9b352cae57798de189205b8aec6214cafa68ba6136e356e8f813bcd04abb5e27821de36b9cea82b9a84ab5848fee68e
-
Filesize
8B
MD5099a0e4de7265ff0ffde9264dfef84c4
SHA1f8aa961359aa2e0affa48aa30eebebaf414bf03b
SHA256ba1a361d1bd42c00eeaee5ab815a22c2873eb6c0b3d9bc8cb705d5abdc8cba56
SHA5123830a120ee88abc31dd937ac89a49e95820e23e8101354cc68f5283e201ac9a088b45b264cac84b7c0ff75a346d4927c83cc1b784f847e86d41dc16d4bbd05fb
-
Filesize
8B
MD513c647173965da51a6df4fd82179ad16
SHA13877ee21726b55d7a712f2d2fc1b8b41b695e752
SHA256f5393333c5071d9dfcad953813fd3d39d1b38579bad5356cb2a6fdd8e141ad6d
SHA512d90c49ac8a85abf3a512dcb6ce90c6763ca249f0416430323d704a4b314626423540055401bb7b7389dae1561177da6eff483074e56ae083a5c5e09fb83bda18
-
Filesize
8B
MD5d6acfd2b4613d4f83864e9c59afb3102
SHA101e3dcfe249817e9e046c4e6197444419e59b2f7
SHA256f0f23758e7fb2231ab12965774ecc5b1a6cac6fe8995812c15e8bf052b8b2a0c
SHA5121d224233decdfa24b1cdc5020e182a9b1cdd2eb6793ca752a3d94bb229802827f75c0349512f5218eb6250e80785cbd1383718c371865812cc9bd2c58418695b
-
Filesize
8B
MD595fc2373d1871c2b913604a4ddabd14d
SHA187b76b9afb311277e5357bc647f45eb9aaf6c98d
SHA256c9f152775c23d82e011111c1f2a029d60c9e3fc08131b1f4b07b496b5e231ea4
SHA5124e85effdddcfd63add948c8dd9d8d4c55e01246e09d2073593f8d02e6c9d4a9116ffced07b9f522c2b6029944813aef9c06e3f82b946006d3eef52cfb13f0838
-
Filesize
8B
MD5541ba29aeac8399d77b1770714c78ff0
SHA19ebc92d78a7bfd5c8d231da3d7fc81636f81828f
SHA2561cceca230348d1253abf68d6d2c527c03d4573b6e34cdf2a644b27d7ec18fab4
SHA5125f52629bf7eca28c7ab2d50d498f2198bc2da9e38e1ec53423cdf8f37e82d852d3f73658cb3ee72fc0639049047aecebcf0968a835449d368f2c72f9ee068ee4
-
Filesize
8B
MD5c3582c011c4fb3afd8c23d11ee3d3537
SHA1c5435a706232e94d2c6236944ce24f550c958f8f
SHA256bf182e38013f78634a215ea6e7810bfbcbc4ec9081c2949dece98d8b6de37b6c
SHA51299e030726dfc660a5af80ad0417150a44e651ddd3917c55a624eb08dd30664e96cabc1e12d307e3eb905a3617699bcbec1cf3f3abdadb8629f692a608a6503db
-
Filesize
8B
MD52d6306754925943ef75a0115f7b92f8c
SHA19c630520b4efb887cc9eef7b7123d6af43c15fc0
SHA25625cd87405c74284a77460923f8e77159e5ec0ce158f84a30f83b90476caaf510
SHA5129917e4d09c20d9a620962ff6bd173d0093d539f25d5530c9b80dc6e2d4d5a28d0c2aff5351b0398d83f21739764e04db2e2bb008eea0611782729fefcc0ed8e4
-
Filesize
8B
MD5e73b82d28c68e6385452bfbf94d11134
SHA1d48d3848eff86e8f2dfc3889533b1e47c3e72feb
SHA256aeb5c263631f64f9d894261a6daa945cf0f3f3c43505ce837c0b77156ab0dfdd
SHA5120f8dbdbc4fe4d9994d14ff6f89e12011f05c85b55d40acd876aca3cb2a0551c16378997ea01ffb066f3c145ab9ef6cfa9b17dccfdb3b0029437e2337a9bd5932
-
Filesize
8B
MD541e78c5ba30b1ba03edf8c1afcc9b1e3
SHA1fa5ca9afa5c3f97b9bb8fbca5ec896b0a97de003
SHA256db8d5454399560cb8ac7ac88f6e47d1a86e563d8d2f2ae68bde54a9da202e819
SHA512ae1e68653506de8c1d5c6fa3bd1c5d34cfe61e35d87a70bd0f87c6b2cef393b2c9ad0f6de6e818c71f08fd271330ff0dc37b158e407a63f73b9fbad6d262017f
-
Filesize
8B
MD5f89e32297a3b927270b16e35610e1d9f
SHA168b3568703d35cc0336db89112cec671e45f8e19
SHA256c43b63e16b932a67e15611135eef39c60b6e71504aa3270ee824533852825d81
SHA512b640f5a519eb9b4734724a9825d4fb838740292cb41daca26d9be368633dbe80c721ffdbbf9089f31421f12b6abc172d313f9e88e0005a1a3e8d50dc7bccb5c5
-
Filesize
8B
MD52ed1462b6a930d6efd03608d0ddde00d
SHA13555382a6aaa9c3b09ca3b2fd1b589f6bcbe34ce
SHA25680ff00d53f28aa9e1b9dc08de28d47aaab57151877b5c49c8634fb73c587de80
SHA512fd69a7bcb7023ab2e58b670421eb117c70fdbd5a7dffda861fada631624d4e9fe0733e9a4724138bf9235b89ee2f8727c11c7311430e759db3de1d3fe7ec221b
-
Filesize
8B
MD5f1458758c32bcab50347bb73e5524f32
SHA15a0ecdc8a123662bff4fcb21fa119ac16babe92e
SHA2565735080a77000cc62c5ea8347460ce48cb81684529b61c82f5efe2e8944af231
SHA51216aad5d47052fcefa0aa2987cdaec4a8c55427684b3fe9d535dc40f626e75442d8c9d12b95d5e9502f0800d4f9ec38bef698fd0a5e82ce3afab9f43a53102439
-
Filesize
8B
MD517b5267894b85631d194e00834a92b44
SHA142fffd648a65c0b753f3e67afc3f7c50c615e29b
SHA256a6f14eb677b10bdc5ba825b534df8dbd8845c3a3b8208f95d3b3b668e82fbd84
SHA51296c5bbccdfddbc6b776b9c8c33a703a05076bd7f9d91f4ede3507b4794a5c34279574a099a0a8650f904c61f78e2e409cef3cc7dc56ad2f64fcd8ae84730ccf0
-
Filesize
8B
MD596dc682f6d7b58580ca318b9fbefc0c0
SHA19c44535a65f9758eeabd96ec5560f1aa7cb627fa
SHA25620e029ab283365a3993ea1dc45ae8bb0475a0b46776aadab8c429acdeab065d7
SHA512b313fe35bb442b29a17af1288baccb3c46a0f8956a65ffc140e55e7a18a54f8e7623d921596969fe6061266b346b15cbcc90dac4d75791df96cd74221513837e
-
Filesize
8B
MD566dc44970613d9c4cd72077e68fe99b8
SHA10f6ec813cf7e63a43faadd37d1ef4d8fde837e69
SHA256718f3b24124319c16f6ef64c17a13e74a551cc7baeaab7857ba56db4d42215cb
SHA51217ca67f491b7f196025e87aa2863c680ec346aae38045e20ef2cb024c1a3ec7b374befaadae3fad6a9541ec8bed5f11a41b20d98652b65366df43f20b50ef19c
-
Filesize
8B
MD5a44a32ef8b8361dbfc3aae5fa0d0f387
SHA1736c769df0b67fdc65d704c57b814233c5b748c9
SHA256924d2cbcb4410d7d7defb9ee8f74586bc0dc909ffd4572dc88b42745f37a5fb0
SHA51284aa769bd4d9ec0bd47151ff5acfa1221e4f79f29ceadd66bb2244481b3468764d26f4c0c6bf1e7a98a701cd70d3996b26add38c1fb575f5983787689ee9cb3d
-
Filesize
8B
MD584c77648273bc77e7186fc009769a453
SHA1e662b0eeb17549a87fa200c98b7b71e6ce12440f
SHA256f94818016d427d21c750f07daf7e1fb570cde75190daa958a2ccf01c39ea3439
SHA512887dd93b2e6a847266cc0c7c7b39ca1200c070dbb4554f6b480231bbbc10a9e5980a5e7fa3eb356f2ea6556477e16ad83e95e7e81be4e941cbee51d806fd2c61
-
Filesize
8B
MD5d125daf48262124bfd4a46e86c900a73
SHA1885ed1e409de4a222abfe012991ea40c0fa0fa01
SHA2565cec9ac0fe3c6fa3541d9d0adf2226d6fc33af11bbed6383a9b169ea18419579
SHA512dc1ff5f084c80835d4620618be0d662a87478af81bfa340239f89c4ebe090eaa6e73b32ca891e14610d117f17bba4561570de7fe422b0a918b4d92192cc96ca6
-
Filesize
8B
MD5e8c3282aa7b7477eaddc02964fba766f
SHA1a0cde785022b870837fca7d0286af122c4801669
SHA2567cacd432cb6a3e92783bbe127bd840e5e12d08a749710f50cf77f0f83b70829c
SHA51264a048c6d57b7d82a14a2d20e94442f1e106b11c6f822c9a2b2edadf9f7f3411513278ed475d629f158a628652bb8372243bdb358185397713a52f678ec252be
-
Filesize
8B
MD5fae779afb354673654fccb0b6d8473a5
SHA1068cb2b2e47aa451b65dc0bac2b8170dba583cef
SHA25649009c76d5082ac719a530d26d541bb7d04c0bfe685d02008ca8c304a2f3cca4
SHA5120f0e159862538919a92adda495932a03d5d70fd36231084e26314a7af9939ea2e00d256a552955536ce326572370d53591081b05584488e96ac7d17eecfeccb1
-
Filesize
8B
MD5be0d4aae9cf740b96e3679fb5b305844
SHA1de7813a48b811e2b20ce31dcd4f5b29e552a35a7
SHA256e0f386c8206469f5aff0fd03e4c2d58de8fe3284934f103270e47eb8ea017093
SHA512616b1283c4dee371a62aef9ea6fadea1418b30642f56eff9d64f5b404b31724dbebc9f75162ff1286ef46c15c1eaf6eff6b8de7bc3abde3381034131e259ccb3
-
Filesize
8B
MD5ad5c7eb7f0d32267cfd2017fb3ad2a4d
SHA1d11c076dbda3e9e23a676989bb7363e459c76415
SHA256ca5360e63d90c6b16c57adad88c4c8e44d1adb99af075adde406899d62679665
SHA51218ba24fbe6c1b0efb19a789895a2e5269a075dc52075283d3df661d8d318c82e4ba1e8579d222768bbb598f3ea620cf532ce4efa340119e0091137820966abf7
-
Filesize
8B
MD54f15639bbef423afd4b565b27ffa375d
SHA1b725b33c087a2ddc8a7badfa7308acd899ff177a
SHA25610c90d9ad95fe6903207021e82c2757a7c6b5248d6896de0a1ed5c09e5311867
SHA512597b731b5974006a694ec5df997eb81983d2fa2f284d987ffb0b6065ca76b5f91296e4cdfa9d5057c71fc3f12ac8593ff5d84dd3caada2f36c64cbe2dd6784a8
-
Filesize
8B
MD536c412896acf7f84d3d00b35a3bcb4e2
SHA1b62328186a83f752b10b8f071022650f9810a92b
SHA2566d362dc903d151fdd4e98757ba066f175dcd53a2a689f7f5ae1636f77cbcdb2c
SHA51284e348d2e2a40923cd540fbc1c64677f35cb7785033dc4a1f1d7f0e118cd586fbdec286312fa0d1d1475a9500b130b3d8ced295de815aa30eba61226503cb6d0
-
Filesize
8B
MD5c65017da70e2d44367a4db0b89b1a551
SHA1db61c0fd733b4ceed2576bdb18d151d2ab282d25
SHA256274c91722379c6914a5d06cb957d5b5547a7606a774f4689d8c925922536e2ac
SHA512816465a488e94640999c2284ffc6a917c32e05f496e83edb81f52bfaee48053c856c6b702d28d5b51d6a864e2c386da3e9658c254cf30450ace9d1fa8b2bc0aa
-
Filesize
8B
MD5fa056995d112221fbfc9c2bd4a41b93f
SHA130d4875287f7f307d55d2754ba8836288562ec07
SHA256caf13a7824e351718bae4e6a9e2d34b9eed4b7b1d3060a4fe307b938964596dc
SHA5124b857335d21403ec3188ebfd4ac2f53d907ed4bba4f03380efdba7b0404fce60df161a19893daffed20c254c34ad830a189f63332c73938ec397cfbc72a35205
-
Filesize
8B
MD5ade02688fec58ae6a054339f89fd7c9a
SHA15443a98f30e95fab3c21d05dc988bd3b75643f5c
SHA2560e0c2d171bdfbb12ef31a2af66cc55a3dee15d101fe0701f845ad8a66e703370
SHA512ba6ab2d1265f431ccfac2828a00d25fc7e09ac4ffb15c359ccd3ff4581eccf4d220c99cd6a5f7c7d6a324fea1cdbdf46628beac43a4f0ed5a98ff0addcdd58d0
-
Filesize
8B
MD5d55832f066336bed36c18e031587aca8
SHA14db65bd3a8baa539953624978bb9ebf119d67602
SHA256f64ca20db18216d0000aecca673bd7b81888e47aab89aab2893c66bc9601f913
SHA512a318e608a6c63e041112ea501afbe6df5ce0b135c1a3d11ea40579ce502008d91d68563862826e927c535cc250317683e9941e3b369835266936977f93d47453
-
Filesize
8B
MD5a715ae35769a11f63f1ca574edb0c37d
SHA1ef7c604f3ac292fab1e65822dc53727d878c32fb
SHA2560dcf743b63ce1cf0a7766a28e2a3f97b6c40cf5a14df95d3a362883e841a931d
SHA5129e0cc6a72b31e27ed0b923835dfbd84c3667d5686afae81965c3e57cd7d139845884248e4fa17b8e5e16eec213c686a2bc3b777c236b426cd1a95bf60b8ec789
-
Filesize
8B
MD56c9ea3fa3c2085451f51adbdfcdd8800
SHA1eaef1dceeea014bb3372e4f33432730ddaf7fe38
SHA2565bd0d25c984145924b5723f9b2b7c978ec70a367dda66f1c8c295b1bc5abc2ff
SHA51285e459d997ccd4976654a47385cbb8971c47815a4085a0303f0c600635bf45adc03f651ede9b6a2280c5f649967cf490916fd61311c72791758bb73f66f9995c
-
Filesize
8B
MD5b2fb4e89aabf530bfe1d5d88c9e9fb0d
SHA1ac3bf2e69967a249d1c5a8479ebb2ec72b01d2a7
SHA256981171bd3820fb91d08ec85e062c1a5ce3c211f68d6fca95d48176a264df7892
SHA512716c5477c38263e8f90039c0d93c71b65478934e71764de55f0ea1e560dab50f506177a0a1b05ab9291cccad5bd290874237360ef775c1fe47af7da2e71b281d
-
Filesize
8B
MD574dd39c50170e0dd38dfe4ab42b10b0e
SHA1b4acf297b3d1a53dc55fc3d3ed6624c3917f1112
SHA256e31d716d9f44ce0c4e19cba921862b50372bc78bc368fd2c13595e195d95f388
SHA5127df7c3d02c5c73f6f48f5dccecc31395529e8f61a0134df499e63def4c49b35caa812b3951fe82166889101bca21b1835f7b264b5e23340754998a957f16a7b6
-
Filesize
8B
MD5be0669eb57e704f4d8cd1c840e27e4c6
SHA148b4a692c93898063ea3ba50b1ebd63c4da53169
SHA25603d69a79f792e9ec7eb5dd918e00a72fed4a0286bcd9416a1232853f3c0c8bc1
SHA512052874ffc3a5ea06c52e54e1b672f11d88065a0c506fbda7ebce51af16a2b67a559410c75085986c019c499241ef5d016605918858be225ca92a811565ab024f
-
Filesize
8B
MD5ebd8bf86fb0b2cd42b3fb121db208f76
SHA1dbd7a918f0e0c09352ab1778ab9afa03a56166be
SHA256aa3a1d72d10686bfd06806b007626856a891eb22f2bcf35175d1e688163528d3
SHA5129fa2e6be8df8e1898b43229a81625bed9f70790b86ebf12f771b2db86700ecedd31b007a5efbd917c5e866c4dcd3115d03ac1ab05c37250bc1a74ebea286e2eb
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
428KB
MD5f3081789276e612fe1be31893ef97670
SHA16fe24da86139379f3425264c3b99e652efba3ad3
SHA25690403cfca4bbbb8845101fad657ed47dce656aa2f3d332284e03f69325e950f8
SHA512c3d9aa6df7a815e2323b6f774e6f36d583a52b7c59f98d958863551c5e58cdeec7cd748dd8f2d0d4d087928187ff9964bdd706ceca8d18f4c093a8b61ef03a61