Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 16:33
Behavioral task
behavioral1
Sample
JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe
-
Size
341KB
-
MD5
66823636aaef5573715b80821a8c5ee7
-
SHA1
91978423e613da4db8f8e36c5b54dd881a587709
-
SHA256
e59ac9e8d01fe3f1dbfd0472145bfec08b905c3e18adb59502e069226439cfc7
-
SHA512
f151f64f6d3f7e7536939dc1ce94342fc9c13c475ceaa6a764aea03fe625cf7729a3a22ccf9931fc584afea03aaf3856851f7ea20d499f3c71a39800d992e347
-
SSDEEP
6144:OOpslFlqJthpxthpphdBCkWYxuukP1pjSKSNVkq/MVJbz:OwslStjxtjpTBd47GLRMTbz
Malware Config
Extracted
cybergate
v1.07.5
Cyber
ramdomshit.no-ip.biz:100
DW0ATWUIQ4WMIJ
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
svchost.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{80YXS537-4304-KI0I-4236-23QVAOUS5RKO} JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80YXS537-4304-KI0I-4236-23QVAOUS5RKO}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{80YXS537-4304-KI0I-4236-23QVAOUS5RKO} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{80YXS537-4304-KI0I-4236-23QVAOUS5RKO}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 server.exe -
Loads dropped DLL 2 IoCs
pid Process 1820 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 1820 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
resource yara_rule behavioral1/memory/2680-2-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/2416-532-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2416-885-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1820 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2416 explorer.exe Token: SeRestorePrivilege 2416 explorer.exe Token: SeBackupPrivilege 1820 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Token: SeRestorePrivilege 1820 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Token: SeDebugPrivilege 1820 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe Token: SeDebugPrivilege 1820 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21 PID 2680 wrote to memory of 1236 2680 JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66823636aaef5573715b80821a8c5ee7.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
PID:2280
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5689f1848fa798d61816be2213421b3b7
SHA13ce61045f7e2f4dc721b96506cad0086be444760
SHA2561d8eca962dd60f83371916d6fdc8d4338376bb24ef834de4022da416ba0d17cf
SHA512940afa598f032ac9fdfe38794fd298e3f64b36f216532a23acbc1976045eef172d47156c00ae1fb2a258ca766eba21dbf381caac4d4d525f9bd316d8c5671da6
-
Filesize
8B
MD5b7e12973c6d0142428a61208a50078f2
SHA1b4de1653f2ba2dd1357b3361e4d654ec11c75d72
SHA2565dca2ce6e1f5ed6adeec8a6a9449460153078538f49e5b90d32ff8910a74bea5
SHA512ad2aeab9e549c15441a9c994efee6554a70d7d09401550ee663a5dc9f0b187988ddc4ee7dc395d0ad49997f7863c99fbb73b9ebfdebdbd5c3641c1c4f1700996
-
Filesize
8B
MD5468f33eacb854f10895a11031e583789
SHA12bae2675d2ed92c20358704c9f2aed5936dc24cd
SHA25608b33f64fb4d253d11f121c3aeb7dbb594092eefda5115bb20207c21d29577f8
SHA512f1d05eeb7d04ca8d15348d500adce69e40426823363539175603296fba190050b0673f4b9764a83aa568d5bb60e413b0788234330fce55b3a2f48c70fed467c9
-
Filesize
8B
MD56b0d5beaadffbf16db85507891988bf6
SHA1bba8d4e4a1ce27a356eaaef611471936618bfa9d
SHA25663e56134e5ae65bad45e9b14e47b79eb6456a78f45fbe58f0a5e63cdb02a814e
SHA512976a8f4be357b206a9e017ace278b2fd70e6db2d0550d0a16af0ef9523f5247ebd74ca9e07c576d74c301005cf7615d85ea5eb4108af704633108d0a147ee01b
-
Filesize
8B
MD5833f58f84e609f099518bb22a6d2512d
SHA13e2788ad47a98c1f37802180ead8595463d904b1
SHA25676b2c67a37834648b0325de6afd5ada5ecb01a209d809b8efcee88d775683bb4
SHA51283f00482458532985ba2d9664bd91c6de9fd23c984cc931b327fcaf45c72ddb65127bc12c40da5e60b17d7478096cdd0806b2bc4af5b5fba8a0dd8183f30f853
-
Filesize
8B
MD535020cec039612c2c4f50909adadc5a1
SHA1d3de24f6578a6ba76ab193b01b37c62f312200c2
SHA256513cbd239c95b30509be0060b74b282d6c9fa3c70ef3e8d3637a56a9391b549c
SHA5120dd79e96260e69d46d9ad1f362f3f3584aa848c45308ceef3bb8435167bd4ef5fe4fd8ad73a787c639ba3726990c14e66c11f42a3dbd14067fa667e98cc9e262
-
Filesize
8B
MD5166a802605883d046e97e0c2f03986d8
SHA156cc0c13f3382ed3c5d384f528561e7b175d9233
SHA2568bb3edf6104416d74359f7b20cf66759aa63105e8e335e2d8f03fa76388515c3
SHA512290d92cd8b13e968628f02e17339ad76fa51be606517521dd50d9c7e53ddf559bbe7ed4a1df83dc5e81ebafb3ad8b7cc481cbe4ff014d3e128bfd8e036b92f20
-
Filesize
8B
MD5e00b55007ccfd46d613a762601fbf4f3
SHA1b0c4dcb70af15e2d6405eb40458522f0666254e3
SHA256290a2a975b3782ed4f7ff38c0f9ed5bd635693c107c6afefda0b54588806b2c0
SHA512c74ebd10b9149745b492f74daf42a9016df199cf5b457f758ed9e0ad7b45605805ed0c968a03031a2b952d57ebf2b79220efb1083ad9152eef71d4de70e21c11
-
Filesize
8B
MD5b5b67f7b9837b249663982f0ca0806cc
SHA1c8fd7f2edc9a8984dd194a9685d218c18bd54310
SHA25643da6d017e282d39bf33b2661a614d2bf2a92a8575bc98e26d78f82caafd2e26
SHA5122b58bd46506196041e8064a66980c25839001f4d0cd0ea69b06763d8976b1a8d9120b1294dd8444902cecb98bed8d331438966cdd0b3722018f345172966b3c4
-
Filesize
8B
MD5f6ae5d21e8c683c96a22d8714745319b
SHA1625ef68bf6fbef44e5b836187407506de75d9cbb
SHA25614838c859871885a5dcba456b23326aca92735db532fd44611185950c25977b2
SHA5127f3474bb7c6af4fd14987c61b2c57d521b50257b94b951c853b4369125bcbd98541c62a402fabfc35d3452814b98bcde05060cf910225091648586bb227acf00
-
Filesize
8B
MD50e4b9e662be50a6718a5badefd941b70
SHA1180520a0a51a38c70351f8907cd0315a97dcaf02
SHA2563de771d2691578893b0c8ca6b9bab24a2e7ab52798d0723f66b7af11ba2c41c4
SHA5123ff7a36fa467c9f868ce5e42c89fb1dd95001d4e86e9bb32c474374e981fd36641e8f6095afa0ffbb0fce2c2fc008ea33450441ea455126541c415a842f334a2
-
Filesize
8B
MD5ebc5ec618198d44433c7f973da4f4cd6
SHA1105a7dd66e740fcf2c811a93216352e550c21c7e
SHA256965862d31607bcd11fcbf992f648ba3c765704d4a96b300ddb5a077cad05c44d
SHA5127b6095c546298a50b882c6d390e2032a6c47b23d772671b5c5690c425e5523a668656956be0c78ba7bd28f8bdaad67f2d4a4ba80555ab960e6fe37e78af98044
-
Filesize
8B
MD54cba4bafd6c23dd0582bca26472a5539
SHA1a4e18299ab2a2ddbcbeea8d8fda80139e61d9dd1
SHA2564032745d0a28b9be816da32eb4cb81691340284b96558f7b97e358374ed3dd1e
SHA5129b4ceb592638891ab9d1656d67bc087b39aba547d2ee2576738adc1f32d11d47f7f8c797d440bfa490868dc4933fd3cf4dfffdb9a49a87ccdda49c7d919b623b
-
Filesize
8B
MD5bbe493486b3a185087b0a157e2ef3c50
SHA1271fabdfe2b60c18c7c16eaf55f5f8a723445802
SHA256882bcc481f9fee8470308ec0534a1569879bdbb7c03c0e4e91fffec5ca808b96
SHA5122e850d826c1516f0cee87ed14d0fa253e6459c3addc768da6611b483ac057a4f3888a085c40f778cd3e4590cae5bd7f831dbcca7d579b12b5480e906fea81c19
-
Filesize
8B
MD53870366f5fccff4d54de6055b0a1e214
SHA16ae42029aeae60f5b69b922eb8aa56e15ad0859d
SHA2568ad6dd199fadd59082dd7acacdeb6f51803fcb2ef7e5b7e8ba8c138b102fd5cf
SHA512311e80cc8b97481106aa37bdc3a6afbaafaad4ef0bdb2e83630ea170d2720f333766b66a2097335fc45fce254a9b64372baa75ed9f8f0b6b00dd22e918cc5efa
-
Filesize
8B
MD53bdc1633e81069526e903752334d1b98
SHA165663c5566bc5ad9dcf298087c52a5d0aef10ffd
SHA2565b86c79f88aa4cede12f8c395ead879756eaf07a56bdf56d366559584985c0e5
SHA512fe7441356e8b72e77bdd53dda3cac29b53b68080bb1391375877e3d78872462d176c37bc6de93ed35deec9b1d0608553c07891a3bb5cc2633d9b9d231915e5ed
-
Filesize
8B
MD5d777996c63684ab53672acc2108c02ce
SHA1683b4e2ebbdc71a90735c6feb423737097f00be8
SHA256c2053d36c3d28c7fe0f9e718ae8b74fe2648e2ced97553360d6c5e222677e5bd
SHA51297ffcbfae45f40e3c6693bcf6b526cb87b980ed57bdf17ef3f0045c84bc2d7acee72d1db1151f4430c633b6e8db862ba3cd37ea31a5190d102376cd3980814a7
-
Filesize
8B
MD5454b62b10e0f2d168f7794e1fff92b6d
SHA1c2a0e66318cb81ea24a9e5023f68e9a07c65c8cd
SHA256b9ced35ab61747795781456ae267e19ca92579b5a5aa301bcc7c3caf6e84e632
SHA5123852fb7ab18ce2903006b17763c47f54b81a844d5c4bc2989fa07d0783f0ed73d2ad9affdca2b6987383186bdaca81316a63c6f578cb167a0902b32c42aced0a
-
Filesize
8B
MD59ce3942660685fa8c88bbc0aea8016fb
SHA1fd7b3ca7e13b2419221cb52cf21e3b1acda1b5c9
SHA256c21ce5e380f09c9094c107c7de4b91996022f1fe5819c98ca3e3442788572016
SHA5129e24d306945e57c686f6bbf5e1ac155963679a2cac1cbe290f57fd37aa1b6bec94c38f3d332a0e92dee22966aba036922b3329ad7ff7227f639d5487d9798085
-
Filesize
8B
MD5cff014b1d0228455bb23986c67152135
SHA14aaf2793c05f6c193740ab690e3ebf5fd3b4901d
SHA25681c75e90c3e878185c904f1bf0dc46da10703cd0f010d609dd9e59e9138726c3
SHA512fe8f36d2cec6329d8d726b875ff96a26862b16db1d2b72ca3f03e434bf82494addca9f6173c625f7a483d9e17db6910e5d7a66f99d1062fe5d9d816fa57d6cf6
-
Filesize
8B
MD5b9fb4b0ec3d1195a26997b99b9d766b5
SHA149ac3fbbd62fbf36cf72a818435d520943ae82cc
SHA256181903e34a2a698c2e1fe2976066e87c5eca4d565fbd0f0c67c62bcb7ab6e40d
SHA512e0cce3390896dd02cd4b283e5478017071732a528ebf2e33fdf167f38e75168f123c1842218ffa559d80b96843fada36413706e9866e1b63b3c7313b35f85357
-
Filesize
8B
MD51948443e12f100a5503536920680f8af
SHA10e37a8befc46a81942e9f6107e53db0f04bbf8f4
SHA2569af5872fc003b62854fcde3d757d68c9e707710c1c506cac4be2638e65d83691
SHA512535fa6d77a977a3f569bff5aca3e6342403add59fa6467d7ae7a06b6933f422868bfaa4a029c65ffceb08963cf6f935f761f3a1fe561a3ead544826c6cc75f1d
-
Filesize
8B
MD5fc6ab81382911e3f6dabab35579da355
SHA1f49835f9864d778dc1c7891d3186b258374863f4
SHA256233100966ce9bcb6e73e0cb329bfdf1a9e1c8340ea121096052bfa8da78e061b
SHA512be0439baf58f29969c07f8daa9d0a9ecc17adcc465bbecdabe14b9d8d61aca00508d340d3d75eb912712fabd23d39f7b08c50ceb70a2525911958cb93c542efb
-
Filesize
8B
MD569e4266ad02e9af4e887258839ea656d
SHA198fa2b1e9f41f45bf45a9a6c017e812d4b4ff679
SHA256fe77c312bd53091cc101936585d7abac343ad44d1aa2067ec4d899db5d16ba5c
SHA512c6732663c2312e82602169899c8bf09f45a548520064a6fa3d8baa0a205640cfb64d60a2ad1815bd217babd2814b8a97a996a043a9d11e274b9700a34b8ec163
-
Filesize
8B
MD593162e691083073d860b66f6a56d743c
SHA136e725e0543bc66206a949be5a7ffbf940248524
SHA2568731fe5fa28b9b954973a077042c6a18c38ae4ed89a8df922820dbc0c8fda48d
SHA5127c4a056893d0021f882c501b4970a17e1094f4c508b8269b7d6a0c301d2db0efdbc54e5339e9153f66ca29500884ce77bee0da65b17d3e247b28566aecd9aa9d
-
Filesize
8B
MD57d42943c596a6d30f2c4638b320adf98
SHA13968d4aab731e7a51aace143b8689f52958c6b1f
SHA2563ad2f868293b2baad88e937cd943ddc858d426d5a8f881099caf794cc42b9531
SHA5129fb38c015e89e303cdfe4874acfde8cc1709d5c2bd374a29876f665805a512cf87decb84c208929a3c979cf568b53cadc299a4e976188c9e06666e9f2bbd5244
-
Filesize
8B
MD5ee2ae1b4e7463423aebe3b6cd1def2cc
SHA147c0420cc182fcdefc5cafee8dc0a0d4baf9e7e6
SHA256b499156b1d454a37464643a0edf9f5c737a313f7bcbd9c28cce4bf50c9430138
SHA51291c2145b31fee0c920d2c30d1870ca7c2f63f6cf927536790dabd92710efc6e1a764901f4aec6eb6e84953eb484f99b7f59e08c1ce6e0cd5dc4dd6569c97c58d
-
Filesize
8B
MD581be6abbcaa0884c9e9d5294239816ed
SHA16e293bb16eeb3b452e231d0f84c7ed484d9933e5
SHA2568bddbae48ad57858c14532beeece83dbe45af0a33eb73f2fdfb9745f894908c3
SHA5128f17c6a11c21a317e9997a5583fbdf91ab198613feafdb768cd2d900b1293f4f6979ef56712b9a7bf91a8eb40760d2a892d7e545e304945fd679fd1ab4e45ec1
-
Filesize
8B
MD525551e0840d6e93e4bf46e53c349ee9e
SHA101b4e3004b024237210eea025f994823f78b18c0
SHA256d94924ff55eeb9761bc328c24d6a0e7d0088bb9ff273a0bcde973ad6d196fd4a
SHA512e521b9283952125b69245ae129d38923af02e08736525fdfc12f9a5ab6b1be23bf2264d5d5f2bf5e7c866f170fa57297e90aed1693576e00a9ab406971727a89
-
Filesize
8B
MD5e93f4741b2da7628bbb65b6a01d14bc2
SHA1164edd6ec1d70040378cf38f87161f5d965ed1eb
SHA25611c6479c856e863feadb07757e805ec085da32ccab5ff3ad61da67247d85187a
SHA512e14c601f52fc49ab4d09a39de0b30150b56b9d1aaa0f81bb796272c5ca147ddc1152e92d9da98814a3eac9e52445af50b6a2a75d1f420162551ffed054299ac0
-
Filesize
8B
MD57afad8138ef37168fe1709f8a0ba7706
SHA13c60ef01bebd05f1eea6a1314cbce6d3269392aa
SHA2566b50bb571446a6500a2c30168e8612df0df8c16ec6cda8ad559f7c410e9a209d
SHA512dd4ad60cf1f08bc86f7917155f8cbb183a7de355b444b74ff9ce773efa690b19797266ab3783e3bc9368ed4423932286820ba2f19a38bde0a6926146c0b6821d
-
Filesize
8B
MD54cd06101d7ee438f43a192e45401ffab
SHA184de621dec0958f2739fdb164a47a73095172bfd
SHA25699549748c0bfecf0e2e5e6ce38590ab1893a98965edd21419f91706277579c7a
SHA51252db4ff9a95b8e02f2243336770575dc084a6ff42b08e7b9ce7b5f2e1150da0d58b21d967b8c651e2c6d5449344f2f649852d015473b96b7a37f24e9af9a7361
-
Filesize
8B
MD5f550808f9b785f4c5fe634498789c014
SHA1f7b9a4140635e71a4f8e3eda8df3c833d3898b5d
SHA2563180c54a7b2ae38a498b2e1f3c4212a995baa3e4da0e3fa78fe4e7b24f247a83
SHA5121341ad933ac4c97e19c6b9f4b095cdb29bd8aef6beca863dbff6460a27cf7f0bdfb336ddc4c1f81616e330d21ca2fbf926cb94328cc6844fc83c3df7fc2da3a0
-
Filesize
8B
MD5bf2b00ddeb071d8579973be52a222d9b
SHA16067568a82c5c602cef5bb4a9bd22b4be1cd350a
SHA2563b5bfbb1ace186a8557bbe806c7774dbcd31765055c2040112438cfeefc27548
SHA5128a9f2a8aa5b9b7995ec602fd187d9bde7b62eacdf4c3d5479a7763d52a0c38eaa11889c091706f0ded4d168a6f41c7ee67bd5c912196d5a1659ee7f04bbfe803
-
Filesize
8B
MD57938c51f9eadacb3a3f526764743d0c3
SHA18eb9a38eea3bc0b848780ef6b861b65f294285c0
SHA256ad77f6389e71c02d98d217b77c0c7893591c9e6d42c0972e49a4aa1f9edc1b6f
SHA512a9b49afe6361640cb7d8543257d264b5a31be0aa9a0ae1fbc19f6cb5391f95ed3b923f91425e2a80599449f1d897aea8805c27bf0347ce331e75e30d3e18e36f
-
Filesize
8B
MD548ba6454357de3feb20270aafd9b7348
SHA1bc6214153fbcf60d9c6f1e0273d3f15ff7666a78
SHA2562369e71258bbd396f591fafbd6ec87198ee2c7a25ffe234525161176da995df3
SHA512e04f9249c7c33effc484580b3cd260f64383326bf238ca767e91ab5ed1b45cc1acd7cabbee5cfaeb52e5a0506605f96897d82e75b51c49703751a8ea1a89cdbf
-
Filesize
8B
MD514fb247b14d30f12d6cdc6fb1eedb6be
SHA15377b4b91c87e3af26fbda6178165e6d90330ad5
SHA256a08968cc1b962b8f2ba0f86e541ef363def95da03c207cd7fddb919f6d26c079
SHA512997c99bca3e18690053e43bbed50e2330973de49c52dd95f278617dc1b1ea6be87c53655a6d58d5c572ac29a379a70ebc3e996a54509cf7f478c1f3e2455e462
-
Filesize
8B
MD522096ccd35318095bd63a2435959fa20
SHA1df229e6016de09db88504024fcd11e88ab966f47
SHA2566a3927d18b2ad787076feb6a8f3fea5e3ec206b7ce8cb0738459b074b8a94440
SHA5125a9d9aa62d1424bd67c35f7ebd742719cdcf1bb46777ccbe03ad95badfd53b000233e5b2ebbf362f55ba367f079b2bd84754fbefe191cd57f1572eb3ad6364aa
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
341KB
MD566823636aaef5573715b80821a8c5ee7
SHA191978423e613da4db8f8e36c5b54dd881a587709
SHA256e59ac9e8d01fe3f1dbfd0472145bfec08b905c3e18adb59502e069226439cfc7
SHA512f151f64f6d3f7e7536939dc1ce94342fc9c13c475ceaa6a764aea03fe625cf7729a3a22ccf9931fc584afea03aaf3856851f7ea20d499f3c71a39800d992e347