Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 20:47
Behavioral task
behavioral1
Sample
JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe
-
Size
296KB
-
MD5
6093495b7bca80693e2b52c8c60e3f65
-
SHA1
6001c88acc2e1661676d62c31130755f53494bcd
-
SHA256
d1e8597baccb50b8b909b53eea17fd79df6bf05a662d0e5d178108f34aa84969
-
SHA512
e513e230a784b44f0dec2a1c5fc862694119d40d529207326fe123d055296ee90c5b530a547ffe7fbf16806110cab5f2ac7c0ad1615c4724f3211559be03c804
-
SSDEEP
6144:/OpslFlqrhdBCkWYxuukP1pjSKSNVkq/MVJb6:/wslQTBd47GLRMTb6
Malware Config
Extracted
cybergate
v1.07.5
Cyber
petryca-pc.No-ip.biz:100
W7VJ07F0R2Q3CY
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A533S0U7-U0CC-HA72-1R06-MG5300YBL06N} JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A533S0U7-U0CC-HA72-1R06-MG5300YBL06N}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A533S0U7-U0CC-HA72-1R06-MG5300YBL06N} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A533S0U7-U0CC-HA72-1R06-MG5300YBL06N}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1328 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2396 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 2396 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe File created C:\Windows\SysWOW64\install\server.exe JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
resource yara_rule behavioral1/memory/2348-538-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2348-891-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2396 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2348 explorer.exe Token: SeRestorePrivilege 2348 explorer.exe Token: SeBackupPrivilege 2396 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Token: SeRestorePrivilege 2396 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Token: SeDebugPrivilege 2396 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe Token: SeDebugPrivilege 2396 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21 PID 2372 wrote to memory of 1204 2372 JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1964
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6093495b7bca80693e2b52c8c60e3f65.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
PID:1328
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD508569a4089f94dd1be076320a7835d85
SHA1c880b138def2ba7e93349b783e510f9a7e3ca2e9
SHA25609fb3f2a52a3e609759286f14719b18e6c797ac4699fd6562cfd318c5363affb
SHA512229dfe06484b776c208290f2ba8e566370eccc5b7fa9b87f6bfe31901c7eddf160854c34671e71d3362d8ecc0ff86c165290ad5798dc38cb951f67d89d6afe41
-
Filesize
8B
MD5eb4fa8d3ee386bf2b301f2f9d0ab4451
SHA1dfab4d9abe4e78a7acc48cfebee4e0129c5e18a3
SHA256bcb939abc354c1b9db3e47a384313c237b92458907e64d4abc38e8d15bc69e81
SHA5128636ad76acfb8ab94f82f5c0dd59226746d7cb72f6e592563cbfb478379bb28259787e0fd1274f6f4509c7f38ada8d86e5d40620d78ecf8de68e50888aba1fe1
-
Filesize
8B
MD58dd48060dafaeea85c00bc13bcd8769f
SHA1e7e46c15b53221c1d9d76b32f1a82002cc669cb2
SHA2565081379fa03acb5bf9860b6a22f5604cdee9dcb9a9133a7547ae1b32c143fec1
SHA512bfe783189c665ba1f03d1f47ca7865d7ee687836fb8bd7b24fd537b141783ac670c17973a4cf2fd1860430edd808175b8333758aac277be35410d6fc4f8ea19f
-
Filesize
8B
MD593fc65fb419252c127dbeeedd96edbb1
SHA147976edc8e11e67c1b672fd127fc7f573a2156c9
SHA256ce3d66aaa3f1f9ae05c27eada120ab39827503db668a2c84abb256c6e6d0057f
SHA51234a18774e906a0d05365a51af908060edfbd94350c971de7a91d0208b2f901e54a2dc5dc58ee16224eb7c6659216988795fb3b235aa49e452a221b2b67169b85
-
Filesize
8B
MD58574ecd6f27faaa97ba924471baa3df2
SHA17fd91f52ec9f19b81465ff0661dfd80e04f365fa
SHA2566ec196169baa5d724bc3d35e179e73c2dd2f3ae3b5662abd82daccd1a370be7b
SHA512e5bca20a4938b0afab918d6885989d2c99620197a6d35751da302f4d0146f8bc6f1ebccf7706655e3bbd6915f04edffe29f0fd2100d4f504495c2a2a6fd3bab5
-
Filesize
8B
MD51a444c51287e9403f2f7ac67d43a34a6
SHA1f6ea8306913869d6058b3d00f39e6d10e23f784f
SHA25616d479495948afeaf3bfc396ee595be5995163d380ead01ae2f6da4485333435
SHA51248f8e7fa6de4eccc5e7467a30203a79b461d3e34e159abfda732a434262142b882f8d11da5a60c2c1172c6fe833386469aaa92721595b20387638093880718d6
-
Filesize
8B
MD52bba3a556e2745c9311b90fe3b49f9c3
SHA166ce329c29a6741ac77dff46a524c73d4a07c3bd
SHA256ed5806185104528f6299fe3427e0abb0e39571261c2876d2fd279861a89cf1ad
SHA512e3f50bcdb61444406561f7a554677387849539e73be05f7cd4a603be31c9b898cb16bbd71e9cceffec6c87380c741718760fcbeb9a64fee9ce67eb429a362c9a
-
Filesize
8B
MD520fa6f651c8006a72348ab8dc714a066
SHA1f31b93f40e5bd2bc97f44a438e963ad96fd9836a
SHA25651f75fc1be6dd6960fac2a7f6acae5c2667bf1e6032e3865e8efbb2f20523d0c
SHA512a3fc2ebcb52cff97d5278fa828b5399f9ace99a84e911399609f9b9f6f169ef9a37210408c03064c39e5dbec8bf0c791eb062fe7583f1dc63317847f82d856fb
-
Filesize
8B
MD5d82fe961ffb26313c31be09d26507c64
SHA1dd072814140c8e690e3dcbcc1d27753e9ffb4907
SHA256d69160cd7114c2984b20b82201993e438d1bc89227dbe39e0d17e8c8e8294466
SHA5127b26d59505aacd0fce8df630a32ffe4461f56756e787f9368b075fe8e8768ed7e1d54f70d79256238b44ad3c7e78d179b6b69349a2b8a7b5ff948cda8d075fc0
-
Filesize
8B
MD52fea77777ded5e5cc47d9fe19a9c265d
SHA128caf38830a11f79fa7d79abdd243e44ef691437
SHA2566af2d19cce139bc94fbe47796d4101cbca8ac9913a0df6ec5fa4ceb79ffa3a44
SHA51226e854431541ec8e131900642fe9da5dce61f9b020d6ae7018bdaf2941151a72598df45df4fc4dcbd1c1b5d69c2d244f4d4e96e10f5e9ff901f883c6b1e2216d
-
Filesize
8B
MD5ef7de0d097444b4c53771ee9e4a6a3ce
SHA1cbfc51bd75fe4bda979660a9069f78491b3f2452
SHA256b505ba9b9237121e1c1fb9fa6aeaaefa2ed1127b9313064c5d1097adcb6379d2
SHA512a86a38a5a5047d1e57fe54338fd33168d57dae6e3f53832d29dd81f560cc5e4693764f6ac572cc1640685c36ec667f4a209833b8b2438f6a9a8e350f133225d9
-
Filesize
8B
MD594df15a78e234ff7c81eafbcbe946bc7
SHA17e30231e3e4e7d94e4a07c4a00fd439592e4d3f0
SHA2560814330daacebd25be20ce249790d9198db599a3e8ef3b4a679a523789b6ccb6
SHA512f9ffe1a1cd51e53b95fdcbdedbf39bd41126d061153279367705ef0fb010eb21279004df30ff8a19353a12dd123f689cdba17882e920fe871c3365fb756cec53
-
Filesize
8B
MD5fe14bf636d31aedc8d0d9ce16840676f
SHA1e7a09e26546e8aeba5111f0daaafa8cbead214b1
SHA2568834f77b9b1fa1523208c07906fa2ddc1bd9096a352058018c93c03a18357a17
SHA5127eec11b970e2a96efe971b9043458511479a7492f47bedc0df57d24f2f4560775314ae3fb9bef0fcf7a1388323017677db12e245c39b06c72fbdf4f4e3db1f38
-
Filesize
8B
MD5c4ac39c77b55f81774bbfe8e0b71037c
SHA1e6d585e7273b336d922849852b2055b53db100e7
SHA2567f26bda09ec24521219e49ebd652d59d0940d469b7fe276093ec3d1b45b6cc86
SHA512a402f9f989b06a687a572bb82a17f4e57590f0f47ef2993c6b41d6bb479f0fbb92d54db840274f95a59ce0be43909ebcb281c88f732c08d0df0cbd907d2d91bd
-
Filesize
8B
MD5414342d37c67ec1f278cd84402893bc1
SHA10b9771c8c9aa03004888df95c3b97fb9a89f8db7
SHA2569715fae12496ca937ef42f77f398c7e3bcd6cf3a2db1d352cf94cd8626843ccb
SHA5127f8358224d2ea1cbfb73d50d77e4beb8e2b7d7d7032a71b4b9dc4e3c6f84198e8989d3ca3c292ed23e1f903f05fa7ca4a5078db42afb201a0d85a73f5c62a0e3
-
Filesize
8B
MD516308fde9eebf1f98f2b3b5e572ee97a
SHA1af9323c52927570010039218707003b34715842c
SHA2566d5e2820e17899f952d1e850a6ef5f98134d99136aa654f28f1b8c645d34ba58
SHA512d508ad2e71710341f0c9453fbc9b8ec7fb384617cae4fca904a9d5e3f2030b98804a4100e2f0e956433eb2295b37fbf11c4fe8e427b2302e98cd2b7461ab2df8
-
Filesize
8B
MD54fc1d5dbe20422a59851f108f800e57a
SHA1c7386638c9be4094b3cbdebb8abf08ad8001ab6f
SHA2568d6d9881853d57457d09a9572d29be436b3fd54f240134adff2dc7ebc40dd721
SHA512452de3bc511f144c44ea870dcc90c544e5c9f8d19da679efe10f6cb41be3cbe72ca788517dddf9a0b9bb7b018ec61f1e2abb029491900c6fb939b7ad674bbbbf
-
Filesize
8B
MD5993f9b3995713f1e938dc1ee9c7ef4c9
SHA10fba81e5b3b7fcbf1d61fa85e7ffc6d9b0ac9da6
SHA256a8e6cff2f7f18ae7ab92f16ce5937605ee4ee6da4f0927ef71a0471fad5a87d6
SHA512acd7aa1794fa71972a25d638356501f1b490490d00e5dbefb908e209b8c51bae4f596f2d26033dd5b306482fc3018e7a44da0bc64123402db9452dbc7efccafa
-
Filesize
8B
MD57f26e96ae4b8a327781f0d197cfde4b9
SHA125b572a600c38b4771a17d39e58d30e2593f16a1
SHA2563ab5b325055f47b9fbb4ed106102e423a2cdee8b4b6a4bad2b4ffed621a41f06
SHA5122104bf610db7b41380569ebb7cd9c06f974150ba65f50a9a3384bb2cc0afb2be6d1c0edf18fa05e6e2c6f7340c502ce8c3e63d6f286441aa317c50dabb1609c0
-
Filesize
8B
MD594dff9f066450f7359ebd6e96aab0dd8
SHA1ef022024435c4589d447d26822d35eb5fa1e87a8
SHA25622afba5608604e33353ec0764059a59d539b991002fb581cb957b5a81b154a5b
SHA51250470b237b3c22a6f27f8b8177ae1844367ab4a14ef1e2b1af26b0e5e4808fe53cc8738d49e62c3d50422da4af546359bb6efca9eea69c45d9b8e47efdff45c0
-
Filesize
8B
MD58ca0c1e8c6faf4c78027493a922e392a
SHA10818fb9d655c3f43dff6f922fe720a97422f218f
SHA25648174d889361b5eb67a4ef2d9b9980efab31e8ec871788081d152371ea38f0ff
SHA512a441075281faac7380a4c05e72a5b4174ac7588efaa16db22b3ef6fba9bb1a86f6a9b27e8abb080283c7fbbcdc489bcdcf0eeb71caeb6f005b3d12f468f8302e
-
Filesize
8B
MD57d26f733e82389c4bfcf2daf4b427194
SHA1f8b73d6f6e46a3a6ea07e0c16d9561ba4810535c
SHA2560c91364e48a134e527902437e6e5583d9c778f92001e4640564972ab789aaca0
SHA5128c3c6b907f6ef01d80cd43369a1c9de5da79408dc1532c88694b788c79a0ca211aa098b518b96347ea3aed5cb69870f70a61a1f1e175d0725706a3dcb48f79fe
-
Filesize
8B
MD5cbd48e98c3e52642549192fb0f575e83
SHA1d9ceb172c4689284a0e4dc62bb62b99dbd6114f2
SHA2563941a6bfd4aa2dc7727afdbce82d96921f3a8190f4414caa694e8071a51e1dd3
SHA5120fac11257c20fe1f2692c93590b89a56d23fd8b95bf949514894224813566e823a4056084bc06e48e7d1955e9b40dea106fd77918231c9e4ae14a44ca9fea1ab
-
Filesize
8B
MD530f9e81ac3b3169cedbe3aa10c777dc0
SHA13753d732cd6b41f0ff501b38374a35a8ed94b691
SHA25624811148622cd34ae3fc3153dc714e4aaf0afea16fe43cec43921cc5934ed4d2
SHA5129bf7801aa3c346330eb855eac845a4a2086e112949e47fbc2ad14bd2b513aae349439eb4cd035147a6866f6741a8af76e9e2b0ff71a73f080fe898d226ddc76f
-
Filesize
8B
MD55c7bd79d0aa9e8ebec8f1dd8f4ef2eb2
SHA1e5d6da7c1fe174eb9b2420c913503ae3bdc9b751
SHA256a32fdc75a25d22d3409251cdb6ea8ee9a8d5f82f40b5f118e5c68cbbd4089bda
SHA51295da90ee49706534722a456f553fe34b66fb9fa64788faa698b80f9432d5af0f92a7dacd65434ea3733b46d451d69573cd859725bc43bc524a57811ecf16e36c
-
Filesize
8B
MD527370278ffb99de8f92343fe8e3aac72
SHA1deba5aaedf9e4657b80151a017c871c46fcae39c
SHA256d7ebf993bfb38272120ee397b67e8bfd2bb9f14f4f097f20d3d4efb5e1822c6e
SHA512e7e8a6ad029f3a62aa84f4b8f382cec3a3f3757c6bf32ebd2085298541898551cd98fd3e3c264cf94111579e0e434fcc05f077a0ffa81f73717549b4de8ab568
-
Filesize
8B
MD5c8630112ca4e1fbf812f19fe7957db16
SHA1a7f0e5183af258abfe70c1888d8a5b858efa3d8a
SHA2569ed4796dd83c10d2b9b4caebaf5342e940f4dd24513b5c2ab2b96695b4ae9473
SHA512b4e13c1d3112ccfa4cd3a06ded89bd39b8c6376d62976c5290cf92b492114666a909045d60f78f5335d3c58c0fda5e28f9dce2dfe1eface3d723ac17f56dfe77
-
Filesize
8B
MD50b36a5ddb3705f9139c3fa0deb5f75b4
SHA1f97bede2b8a1d2cb4561b1b63bf0438c4f684623
SHA256167db2c5f611646577736a65a45fd95be88cfcec41f077d6c8621efba356e818
SHA512891574ff1d11601e1656d545c4b5dd5e97fe607d30f33242b00227ff5f266c3682a2f8ee5ad81c18b3308ec26665ade2c0a0dcf5a05360c118a5bb127261fcbe
-
Filesize
8B
MD5fb2a24a1d0dd238649989d1237e8f3ab
SHA167cb087e05304d9a6fe9a5cdb25c6b5903baa93d
SHA2560e1e880da9ac8b39509c088161beb336d5d9a94b4213065328c9083ac092c948
SHA5124eb573eb29fdb5b98cb0f11af9570de9f656af57e944b93c21b407e908e93946719a9dc1a875a5af79c9d03d33334943f58d9d7a190a05adeea45ba95318b2c0
-
Filesize
8B
MD50cd57ac12eca9cb8556c3a102234dbb6
SHA137cb7837210c71b2eba712cae2099e63f1e4e51f
SHA256ad7e598534ce485b5ffed66e6874389b2db6300ff6c504849a45dc594ca014b0
SHA512a1889abf14e3a20a0f92e6c4bafaacc5df96c2d1c64875ea85db98ed426d086b774256c5beb36ad55d332e5d2725c1689ed0b4965d3d695722a72ba5e0cf34be
-
Filesize
8B
MD5015849a61a6c768abbe48d4f3ccad4ce
SHA1883110ae585049464641af9c9c905f66d4e94cca
SHA2563c47d13c959027c5d465aae891813ae8c8847b1fecb053cb7384058cd2ac0e07
SHA5127295a1d13396266fcd4556e896249af307233ae8c166983e51764c8ee0ff29011aae0a1d8d1d005794c201fe0d4c00e18a0d4d579cb28e86647f04c53c5e4625
-
Filesize
8B
MD547f1bdf7b5265c2a6cc15d87d914b355
SHA1fc62bb9075e682df500e6e93d04ddf1cfc91ac1e
SHA256afed77a4fe0dea7f4964bc69fb368d6e41738de6daf643bb4f7d59894b39ab3f
SHA512b92315a14b904b067f9f381cd11bd21cc2c2c7d79171c715894471ce00d61d17c8545f5722f2788900c5a6449219ecc51094e5941e5f8711927f4803a3243495
-
Filesize
8B
MD59c02aeeb155c7987d53be9fac9ab99cd
SHA108f3780f41bf20d7db628ed31e58e0fc31aed152
SHA2567869bbb3e1187f7bf2b70e85cad8d7a97cd40b45591994df41654ab1fbd95ba4
SHA512ac148303a24f5c3256ce399bfe5c67086327032cb61326b91961d04c1fd5bc900795231f2ffcc961bfd9cd1e1e62f09973c21b9417421584b23b3f680106f84c
-
Filesize
8B
MD595c8d1fa88cfdb912038e50d52e15018
SHA1ada38e82ec49e4bb7067e3811fe76b5c5c16cbd2
SHA2567946cfab2a903f4763715ba54e73097aff56444cfc2fb8f0a8caa381a995f7f3
SHA5127ae3a6b8549d1b7e8cf203ec8d7705cbd79d21cbca85e105f8b70f8db3463acc8dce200d775395ee8d100e715cb62cdade5145f0476fc8e785b1007d9dfed67c
-
Filesize
8B
MD5b07687f5d2cad9c2291010e0c26733f0
SHA10e3262ab1d53ede875a2013d6932f367a52faa73
SHA2565f03d9b5360b045d957513f699e14aa46a0b80cbdbfcd0684538a04d731c3b39
SHA5124e06c562eb9a559879397fcd157fa539e34cc05ab9e688726268df49a818ae246b14a453f477d163b801bdf89585409c586256177a8e1bde0fd8b9bdac0bb706
-
Filesize
8B
MD5b79b077fff4740518b518b534caf6186
SHA1256949c8ccccbc03bd5f3d7bb6f3bcca2f1a5384
SHA256d147724075000ff872851bbc5a397a9cf9c925ebd3d6ba728c5017ed9ff21434
SHA512987bacec4080849db5279335fd9e7d9b5da8abe691b6757e2ccf33397a0a9be714867b53a8aca63c2eee672a0750fcd0edcdf070c79aa3fc763e2e52b84097b2
-
Filesize
8B
MD56eddbe45d3b37a22ac5f3663e644735e
SHA1b1b29ab22982383bb9af4dcc0f118e10d3225079
SHA256fd21e48182846b7af4650bac36587f6d2342177eb4bb7f390af0239d753fa71c
SHA5123cc734017875f8db84bad2928128738ae0328890857628a2ec2faa0923b60b57b7e1b2629e67ca3276e86542415879c7203c8e7c0142b4609e4696a482f90a0c
-
Filesize
8B
MD599a0f851f3c0a3c6b37376395d237ed1
SHA10f7e608b0f0de058175af4a833ab263caf6d9c03
SHA256903539f373acf9aba216d7f241e72da070b8a1086cfa1e5871254dcb429b6e6a
SHA512516dd36f5117fdc6b7738f586568fdf95efcd76221c0f01b5a042255a6a8eb504b7b4a930c0837dc33d5d4ac79322d3e77547c4a1326c277b2741ab88d33deca
-
Filesize
8B
MD57389f4d94541964d4c45d437cd3a8a8e
SHA1870e88b8583f79ed3d4ed4e4c7e24817c9f7f756
SHA256356e84997a333492fc298526b760d289beef65fb9cb17f4f6f48d7d52aea5855
SHA512a125a21ff4bc6329bb74cc407236231e1839773e45694dd0a8b0a83ef929c26032a991f1dd8d183d37cfdd2c095ff25e05b0391f3fb5046d616d5807ae7f3f8f
-
Filesize
8B
MD51e39fa962e74e35888ca16af0a29aca0
SHA1b3401ef34efe9fcfb3fa7a16656ce814e4232e8b
SHA256c08d981a573d5fc02b115b7659e7069308bb4a1a6fcd44833d1f2c79a057a506
SHA512b53a2502d7dcb337f98e7ad1d4a1331233ad6a618c31bcbc1e15236939f96a7df76c8478abe7958b50a3b24bd0ea0d9c21d6b184aee0940d24134a27ac168c68
-
Filesize
8B
MD53fb99694b9794e6c18f6ad0963a02663
SHA1b0cf88c566d48c1e24cc854db19c329339bf7678
SHA256f138a379da2f644e801be7348a635f1bcf5bc564c34dc1cd5ce4604316a801de
SHA5129de9677861bc8df8575800952f67fe8a2f5e30d83f51927724a8f6b4aa03e961641b9839e84dde611af73122bcf61b7203b90fcf5c89495bffe76961f2def3cb
-
Filesize
8B
MD544f22c7c8d42c8b0b5b5ae1a461b1f99
SHA17b93308a4bdd756657b713177ebb26dfa22a8813
SHA256b731ab020e51a822c78456e929f199cdd146fae28b0207f5fe93e7b83ab9f630
SHA512e4d227a94afcad323e0c65de6e9ffb575e5d857872a22e0fbde5b60bf028c66fe6a9399e19993a146148c3469ff5fede4ffc8a1499ab92255feb19f78e751189
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
296KB
MD56093495b7bca80693e2b52c8c60e3f65
SHA16001c88acc2e1661676d62c31130755f53494bcd
SHA256d1e8597baccb50b8b909b53eea17fd79df6bf05a662d0e5d178108f34aa84969
SHA512e513e230a784b44f0dec2a1c5fc862694119d40d529207326fe123d055296ee90c5b530a547ffe7fbf16806110cab5f2ac7c0ad1615c4724f3211559be03c804