Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe
-
Size
432KB
-
MD5
f949ef2edb50ace80fb306e966c492d4
-
SHA1
555f337c9533b9eaddf20c397cc997b67f879e71
-
SHA256
3a8c911cc974ea0bc820f87c9c82cf24f9968ab7b15982ef394b124b3f83fe17
-
SHA512
a2d7efe99ed95f83789915fe661ef22f1a0412a92ead4b1031207eecac84063eae0e12703d5b724cd498a2a580ecb5323d62b99b196ae909340141c6e1e14d36
-
SSDEEP
6144:ScRE7xHKHSspiQgST6HFFhEyncDNIyYVC63RSu29lavMmWl5PGxNCK5SHSC03oAi:9qxLHS+HF9cD6C68TSwmN9SyCdjm6
Malware Config
Extracted
cybergate
v1.07.5
Cyber
50butt.no-ip.info:100
5US28W0157VE86
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4HGFA87F-QD4P-85U8-H673-G42OA516Y64I} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4HGFA87F-QD4P-85U8-H673-G42OA516Y64I}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4HGFA87F-QD4P-85U8-H673-G42OA516Y64I} f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4HGFA87F-QD4P-85U8-H673-G42OA516Y64I}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1728 Svchost.exe 1328 Svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2268 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 2268 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinDir\ f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2188 set thread context of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 1728 set thread context of 1328 1728 Svchost.exe 35 -
resource yara_rule behavioral1/memory/1452-535-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2268-867-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1452-895-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2268-896-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1452 explorer.exe Token: SeRestorePrivilege 1452 explorer.exe Token: SeBackupPrivilege 2268 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Token: SeRestorePrivilege 2268 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Token: SeDebugPrivilege 2268 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe Token: SeDebugPrivilege 2268 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 1728 Svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2188 wrote to memory of 2376 2188 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 30 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21 PID 2376 wrote to memory of 1232 2376 f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f949ef2edb50ace80fb306e966c492d4_JaffaCakes118.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Windows\SysWOW64\WinDir\Svchost.exeC:\Windows\SysWOW64\WinDir\Svchost.exe6⤵
- Executes dropped EXE
PID:1328
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD53de56d7aca7f817b04e0566e2ac33ac4
SHA1304b8d62dc5222b24e837af5e1e64f415dd68ade
SHA25693277433f5881dee1f73b2d44fc2d1f78322a60b51cd76b56734a6ab0e1cc7ed
SHA51261f856df933d34ee77cfbadf17bcd4cc21f5b8d6193082b091ecdc59cecde59d8138ef1499495cfc0efad9fe8d1d23f06a70116e1289501a7b4d1ae1cad9a178
-
Filesize
8B
MD51fff71b2b39840522327175ea1dd2b8a
SHA1be6d7c33772bb6d436d8551afe099333717af4ce
SHA2560a1b3eaeab25966b5d5dd9de5e0eb5c4ba9ab2aea1e15d9ef15356cd01cb58aa
SHA51253b8e8cc338a3e320edc29cd3b57a9a2e3b224f11f9bf52d14ca2b55628548d97f70432f230ff1c6ab4beabe76fa9e2630c7c3c47f64e7444edc5afa9db1aa24
-
Filesize
8B
MD5c94cc729dd2adeecb1938c7435a42c11
SHA131fc758e485b2655737dbb1726d9fc092c50d15a
SHA2560c16f1055ebb25c1c42b7b147137d947903a1ef9606bbb220e9ed73a826d0d8a
SHA512559ed1c93c9a27ede0b29f345b07fc1ce3c6933bd277895ea653654d7e31eaf3e95f9c914dd268ba5412b3b10f66e2aa5dd3ce6d25c0c0b61dbfe64a618cf1b1
-
Filesize
8B
MD558ea8540368badd9a125fa0a13b2077d
SHA1f6c7d6246f463d87cfb5e654b2f5ad50566a8ea8
SHA25651a24ebdfdbbdf5e9895d1d55f239e7846d459e1a9e552d6d77a872c5bfe2b1c
SHA512ab9cb521ea5e09b0475801560367b58d346eb4791034995f763698e375204225aac4565bba9fcebe0cbbecdd4c309801d209cc127c5e5ace4733a1cdfcdc889c
-
Filesize
8B
MD5caa2e8af1e671331537e951795eb6d83
SHA1d8f4a5fdaeeb2924abbfdaf525133d5cf5f058e9
SHA2569474c181875e54531f3eba253c8a65710d5154db71a0469eaeae01f29be3419b
SHA512c879bd78d56456daf8e2c71a4137bfbcfb0a6d5606b719f4351308d097e33ca3dfdd9c994e7dcf0595aafc06accf9e1da53d1c5e55e5d328026a7967756b4c1f
-
Filesize
8B
MD59f9db63082a71b65c7731541f23fc970
SHA1b305488c6182e5196ca877353b2bad1cba63ef71
SHA256a304ba25adcc044d57a413c9cd505205963a01ae26f5e58abd4ec901be36a9e6
SHA51229b0220a696e24d300bc6f12c7caca38583fb2733392cd5c2ec591b4c7ac1437d0deb06d6779fcd2edb735f5eb25eb035c3cf5ba43f38faed5c6eb464e802ef1
-
Filesize
8B
MD5b80179be3ca4790bcfee216941504024
SHA184aeab08760e92507db71210e41aad46d498925d
SHA25682019cc0e7b9281e8ad0302f4c3191277e6f46614e77751687a89e7e9476681b
SHA512eb0ee3783eb8ed27db8b7a5c86b14ad3eb037c9e88f1b387e0793de907dfda7d325ca1cf0d4b366ae63e63d8b76d3ce697ad6e421e25e07014a3c4638343d11a
-
Filesize
8B
MD5f64f387df7195288fd9889d7d86fb889
SHA1b60f1fcfe4f21d2a796da202c546d4ab537f6e59
SHA256f3f1b8a6c4f263064ad893a6ca50a757dd76a30c5b3c6e299c700c4e10f903b3
SHA512f23d689a1119d4d37125ac85dfdd7ec0cd48eeff10178fc4a7b16003682343af1b0f2df607d58b2a3a3cab05f88b2f75c67c7750b819cf71aeb57426d6f3a7f7
-
Filesize
8B
MD59ce0e03af9d832e981c944bddef637c9
SHA17504d08195688b5ba58bc9c37eca951c0595faa9
SHA256cae299b781bbcb32ee806abfb3b24c5cfe8992bbc640bff7c581079018c5412c
SHA512ddf5ff8b9655040928249959557fcfbd0aef7cccd25f50057edce556694d9bae33ef10a4f01104aa012230b2aee2b77e3fc1f2e56762e9523ea7b9e04a932761
-
Filesize
8B
MD5ed886d02fd9cafdaa6847f8e86aabce0
SHA1c26946d02a629652152d4fd7f9d32bc1c79a9099
SHA256e4bc6015cff8b8239dab84d3ac463c68f6e997c7ef12859c5cca3a3a72f30527
SHA512e89a80913bb8815ab90f927a670aa25967226557baa91e814d188f9c83e81bcf5649ddb7b7ba9454ff57e57e4ccdcc067f7f68bbdcb05378563c308b82392e08
-
Filesize
8B
MD56111d6c90fc0e21da0741104451c2a2d
SHA1d39e32668f22afa5657135a66f4c93ca23829696
SHA256d3fcc464dd9b65b239a5090a22dee94d9069429e8f8c34f9a4af74fbf0f215a5
SHA512015bd55c23306b24b5c39b1d2a5c4a6eb57b78c82afce5d60682b4f47728702709f6e38d61ca69ba87cf2218dae62448408f7b1a16cfe44376fa84349f13e3d4
-
Filesize
8B
MD5c0902f4868920abf30dfb62e48e74abd
SHA15938f079b4db219b1fcca9fe4b483d811db93621
SHA2569c12b34874c77fd40e4b6f39af59d1f4ad439a6dce51b35b484ddb9b25b783d8
SHA51210e68620505602665f94d34cef5e94d6b0a2c8b4ea914b25a5a9bcab8992c995ee536f2fed7b8e483f93d5412b38ee577d5c0326c801dc4bd917cdc337bce152
-
Filesize
8B
MD554b0229700f136d81da41cb3cce6a7ca
SHA11eaef410a486f20ed1ae26095f0eb76d7f8e64b7
SHA256d27fab039a56ba3f55b3a42bce3804ae165134f14d8d30ca7a3e91418926ea31
SHA51294f23c61aee47ca89f88e505f0667a6e7ab563a3e2e477ac1a1c43cded49277777a351f7060160e4523142672cbfc03ad1122a21277e20d4ab3ecb08ea759404
-
Filesize
8B
MD5ec2568452482229b47fd58d81947b751
SHA1c3e6a7980290aa81e9dd8f54e74625d266090811
SHA256f0499df534d7eddc6b97e8daa7e839c9876f9db4f0d2d576f7e0c60dbb5a7737
SHA512a433c6eea4923c0b0e4469e9e50d0f543025469481f699a59775c64aabb959b6dca0e2e25824147f05da0b011bb203882f66d564f3b0154184a97fcea810d171
-
Filesize
8B
MD5ed6781fed390917391432c728a6fce62
SHA1fc8d3a6c4f8d899d83a722023d83acd79e328e3c
SHA25690ceb3e240f39e023a4fe5acf5be477f9dbffaba80861cadd6b83548f9877d2c
SHA512bca2f8c3e7e7a0dc42056a8842081de1ca5a9e7fcd52ee26a385b2f7158aca99901bb42f6ccbc4373cb2230b3e32ab3877885a0412cbad0e62a0080c6ef14caf
-
Filesize
8B
MD5d9e7bc3867e65e35a9b30a3bd42d3956
SHA16bec1785fe9ca66431a160ae0bfada00d23eb515
SHA256bd02cdbfef8c06abdb539b38bb3d764c1f9ca66bcc7d08b2accbdfeba70b0208
SHA5126217ef102a992b5e7bb9255fcc6cec50ebcd4a11e543d45c6fd1489399050cd52aa0e31ba02311b637a38a35988084d04966f835340c14c794a169c5e0604768
-
Filesize
8B
MD5fb39cec0a030646962922c0b461880e7
SHA17d815e5307d1dd33f6b281ee929fd88bc2517892
SHA256e38cc1b092b98b5266e5ea8b445253c1452ee7657b97004bcf42351f048066bf
SHA5129eee48425378dc0a06993456d7835cb9fe44091dd1e5fba71b4590589b3646af2247df7f04a31b42d334a6573300ec7d69ba6111317f3efdae5eec09e557497b
-
Filesize
8B
MD52ce9f1ad79b39fc9cbe5824250cf1267
SHA17117f4a9201d5392683a0a6698805d3dbf587bac
SHA2562f0ea9cdadda1c77c3f46090ca991efd218fb291d3a54e63f438d4877a4b0d0b
SHA512db0798b241aeba8cc469ca6fd5ef6a358453c3fa51322c087d2a2c394a433717e89168437810869ace84dddd5c89d40f6ddfa56e3f5888a2c45248f4d3457a54
-
Filesize
8B
MD5c4360f7dac8bfb71c092ce2992718e4c
SHA185282a8f34b846b015b477dd65197f5321085a47
SHA2569a94a58c8b5d9525191b61f7939ce823884dc2a04b742911a61dd74fe7db74e4
SHA51272ed5bc4ecf87c483bb4d5d84e2d8d3feee89377bd0100160917d66a904098f7fc6aeca4f81482f7d9c020b3f27d76ff04651a3ce2ba98a9705d32125ac2e944
-
Filesize
8B
MD555ca3e0a6bdeee96c5211de8a3d7c03d
SHA11ea0c7f0d985c6f172583c8224292240ae313394
SHA256159c07a1dfb0b78368b4e5ad2fc6047c7ae985874f64f912d7205d4301baeab5
SHA512c35e98856f47e748940be2c396add08c46f74da8fa31e6e01d9f60501631e58256e2d0952a5affde3cc4249c3af6a2015d35035bf552b06c0c72e57d745633ab
-
Filesize
8B
MD548e1900942a4437668cc131f7337ddf6
SHA1d7bb6eaa18edd40374515165da4a1e5f8cccc3e2
SHA2566a318044c8ff13c264844862c181052d35da4a0f793a7da0f9a75bc30171fb49
SHA51254268ccf9cbd1455b64d0127bdee9ad93af44a3c592b3821b41b53ad56cb0266783f1ba9a56548045ced55899102377764cba8b6ca055c813bfc0022f249987f
-
Filesize
8B
MD533f0ce98f97418e159007c0d9b4fca1a
SHA13f236d0e9574314fddfde79c94c9823a989a2f34
SHA256c8c2e4ef8ad144c20af7be97f9da67717f8f088e91e42b88b873ceea9bc94f82
SHA512ed179a1c188583147c178b32ac0f5a7af66f72a21f2963d9318a809ea69d37cfac0a7b017a06197b8ba0534669464d3b0f484334e42cf079dbffe493d86eae13
-
Filesize
8B
MD5017169c2d1c4463e3812ebc02ddb54c3
SHA1734d5e927f23ab0d9f4c30f8661129462dab7ea4
SHA256edfecea573ab6430176533845c6ace0a1b896753f0cf686177a464fe401424cb
SHA51275cfff9e07ad583104f2881637fe470fd0058f27c5bc15c5ede5e317aca8f8f33581423c986f9f30c8c026a2a36fa3f09e83770ccaa29035ab61e7a1d6917a7d
-
Filesize
8B
MD59070447a248c48fae2a2894ef06ed68f
SHA1f8da70e3df747601b0f9320b4fb7a9dddb1509c5
SHA256e49e2814da135d7fc7ed54f1c64ba69c5580519aac70c9b7e8664d12e02e6f94
SHA512c762aebc0e0b65e9436f776caa673c7d7f209c16891795b2a86d379832fea4beb59f40cfb8100899fc7d20bab653b567cdd391f82ab510c0caf27be657b56c76
-
Filesize
8B
MD5c30439c7e2d1b15b93861a5d8a9d02ac
SHA1a24f161af58ad914c508d6b115674b5ba6c10b1e
SHA256311ead20202960ef8f1ae01ede1e7c27dda9ebf968523ed92adff3d58afc4220
SHA512e27b0f75d2ad314b403671776789f572b767b9ac05e6dd15f9ec0642eee4b1f3dc9f39f210515a918d4d1f078aa6c9b3c5d36c0dd6c7ca1ec9c17f9ff2703e8e
-
Filesize
8B
MD5e34f708517ce8b9e75420bbeb72edd0f
SHA1fbbb68c5fa586120ee95bb73599f8e33716baa94
SHA256b0fa483b3e4314cd20ed8df565e51ad4243788cdb380582ceeb63ae119dd9e62
SHA512202a8266be4b01ef27c273e47a7c012f05cd08804524eae51f089811561c4eb25e21f1608ce10fc74fd65ef95e5aa72d9f31b34c58ba00e3de5846e7878c4c53
-
Filesize
8B
MD5db10332b587e2d3ce3a7a9a7f7ca13ce
SHA1f7c3d1643558a86f7679967368e43a5bfe21974a
SHA2567b8b1ab37a5f4922720afd2048782af05ec56fe115fc326ef22ced8be33a85f3
SHA51263b0264e922f517d653e92bb56e3b528c31504ba97e7d50e9085c4b74e12a73a4d9c78e5ab29710f16e83074999f0719b06d3a60efc6777ea246db786f2f8794
-
Filesize
8B
MD5faa3a8414b113369b9d24c265c188041
SHA17cfad9fd4e9105c264b9fada1534f2cff202cb25
SHA2567adf57a317f32a24c463cd493c9bd1810930dffb9450f48a73138293515ee4e3
SHA512a3fd959ac35ad8d3b59cf223eee97f792b72800461129e8b3c95f539d27a8e77f984a73b7431d2b92a9fe45b2d3efd49a0033b5430f83de294b207b000b1478e
-
Filesize
8B
MD5ae823d353fe269ca5fea0534bd99b0df
SHA1b91ad55a1b635ab44cb756fe07d37124613c3b2b
SHA2567154a99cd34404d8faf3ffdaa42ef84baaf0c0ea011ef566fa5193c9c559cc8c
SHA5120a7d6d06e84bfcab51288e2da97236473bc539455169bba10b15f27985c8c91f3616a939ffbc23ec1441e1a03fd3d822c79b9f839560328aeea1834bf87b2cbe
-
Filesize
8B
MD591af1c2d95ebe60cc7a011ae5014b682
SHA15bc868d42248b7a585b1e3cb735e13bd77da1b42
SHA25651d0257641adac52015fd7f464e6f432783547c3c8a689178c4146d56296e27c
SHA51265063d1ec568cd711bbe17daa78ce6ec2ff9d369430b4c700ed3c80d12971bbae0b04ac266bc60e1d31e425da5d1eb05c0bc638a0cecf9f519a175f9d39101d1
-
Filesize
8B
MD5c664a20cbd00638d811b50893074d872
SHA127ad06b831219926b9a359a1c864c82323e0b478
SHA25667719ff45580304cbc9c56e6454b3648e401500c523880179ddaebe7226a6f66
SHA51251c1fdf2edf611ea6eb04352b5f489e99d4211b9e6564cf2690a750c1b919c748b5f46a625d372f63d237697f568f960be66b5e094e4c8bd6e3f67d451aff386
-
Filesize
8B
MD5ce5caf253d76553353bca950534784ee
SHA11f878161fb4d9c8f32a76c1c8e0e6e339773ba73
SHA25631ebbbf3c19195132aa416ee853d65575f6583b2b27f810895f0db6a272ed333
SHA51246021d3da1b9d1fbe92e3a2896d991e6f82f1c6d16e00482d87cabefff533c3a940f9c33fd320dcce7dc7c4406acd2d5681c15a5aba684d7594befe85a5e355e
-
Filesize
8B
MD5e49cf1fc4641b66cc4d0015f15a3359e
SHA15c7325078df194dd1de51648a55083e38b54a905
SHA25629ece92cc9a313f6dee44608f6100a32dde752f5cab9a4e5cf61509cbddb8ba9
SHA51295a74f1bbc71c8c9a4d4f79c83cd97e2bd39af3f00b63829daed6e14064fca69d7ab6200320c15316c494d42ab6f4eb8a678ba491b0ca012691f837c5e0e1578
-
Filesize
8B
MD5b94e62cc3f165d2d443985dec833343a
SHA19170ff435de947803c6198a3e237490bfb82b945
SHA2563e01cf66cb0ddee293442c7509c1a1e1994a1bb19ab365397340616ef69fe9ea
SHA512ed8db6d5b16598d005c20f130115eb2eac992a804e14d9b9e72c436f13bf998d3c9962f92fd540a670a25a418608cc8b85139ec423ec00ac6ffa85544c4aa0b6
-
Filesize
8B
MD5ec69a72fb55044664932dc1e1e555631
SHA1cce830c304b26414107f1a285840e4d3d9d96129
SHA256c036855917bfc752c5ef08340a5983e55b2ebf120e6290bff2860ca0c31a0f32
SHA5128d4a3955deaaff617e865702c583e27df593fe903947450af43548c2ccdfd61370ee2149382403838d725f8f88d363f802cf14f44a5dd31aa1dc89f7baf68354
-
Filesize
8B
MD52f4244e5de483c5d5204a697bf74a268
SHA197e3e41c64ab674d7f4a42f3810cb3bb5da81089
SHA25641156e4f119c9f61f5946d3c4778bf24b71403ef545f72aef8bd6374ab12668c
SHA5121d3d93ef5afd0348af76331f69b1e974ed52931c5edd95a338234ecf8505c083b4c513abe00170f91014aeb1ed5044441328e6cccd88ac2c424d04725db77384
-
Filesize
8B
MD51bf0ba8241355b2fda46635c46cdeac1
SHA1143e348e9d67cd1b8cbaf2a80a461677a78e7cce
SHA2566187b5f4820bead44580992063401a1df0301dac3afa85fd83238acb67ef435b
SHA512b3e72ac2b972690124ec56523aa3314dbce6ef2b7bd3bd183d3beb41918b6ead68fe2adbcf39864ac9a7dc496189fb9a3bf6dd2e112a210929ef77d0fe5fecb1
-
Filesize
8B
MD5292766fb8ccf49c6b46c549db0671acd
SHA185352a68d2b420ec75e25941a073efec1bf4a664
SHA256ef7ae17f707c9b45a01f8f903c979073cb89258ef23faed5ecb36d1dd27c3724
SHA51274cd2f0f2e7890f20a8c053157683210919c3625c008791369825112eec2986a8498830fcab772fe72de8baf2d1d1f86dd3e0cf3cef78f0ffe07b293efb2a879
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
432KB
MD5f949ef2edb50ace80fb306e966c492d4
SHA1555f337c9533b9eaddf20c397cc997b67f879e71
SHA2563a8c911cc974ea0bc820f87c9c82cf24f9968ab7b15982ef394b124b3f83fe17
SHA512a2d7efe99ed95f83789915fe661ef22f1a0412a92ead4b1031207eecac84063eae0e12703d5b724cd498a2a580ecb5323d62b99b196ae909340141c6e1e14d36