Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 19:58
Behavioral task
behavioral1
Sample
JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe
-
Size
296KB
-
MD5
67ead342877af1bfa06c52f8d3e64d4d
-
SHA1
1710e6de674994428d33e8f88d4e4d1346c3463e
-
SHA256
63bb2cef2565f78c41e6529db1308b3a716f6c0dcb8e0e2e020623155cd9ee94
-
SHA512
ce34d1a03bd676afe81202794a107b3ecc78ba1c95bbf240b3ae68883539f62c132d136c3c91ef5e0f3dd5d4b75ac4af2ee1c20c9ac6e6e2d2341a96ef1efff6
-
SSDEEP
6144:POpslFlqGhdBCkWYxuukP1pjSKSNVkq/MVJb6:PwslpTBd47GLRMTb6
Malware Config
Extracted
cybergate
v1.07.5
Cyber
tadija.no-ip.biz:100
DJ7S646DX46JV5
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4535BGD4-8R2I-05GK-8W53-5TA8JPGV56H8} JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4535BGD4-8R2I-05GK-8W53-5TA8JPGV56H8}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{4535BGD4-8R2I-05GK-8W53-5TA8JPGV56H8} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4535BGD4-8R2I-05GK-8W53-5TA8JPGV56H8}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Executes dropped EXE 1 IoCs
pid Process 1044 Svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe File opened for modification C:\Windows\SysWOW64\WinDir\ JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
resource yara_rule behavioral2/memory/4696-2-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/4696-6-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4696-63-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3988-68-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3216-138-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/3988-158-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/3216-160-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2372 1044 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3216 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 3988 explorer.exe Token: SeRestorePrivilege 3988 explorer.exe Token: SeBackupPrivilege 3216 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Token: SeRestorePrivilege 3216 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Token: SeDebugPrivilege 3216 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe Token: SeDebugPrivilege 3216 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56 PID 4696 wrote to memory of 3440 4696 JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_67ead342877af1bfa06c52f8d3e64d4d.exe"3⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3216 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1044 -s 5885⤵
- Program crash
PID:2372
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1044 -ip 10441⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d7bf25aaf4c8506ff8629f37f6f4c31f
SHA1cc6a79fd4b7ee45410bd4014b7c77c2f4f3b420e
SHA256581fa493c975995e22f1517aedfb50f1fc35048f20ad6fd3c1e2ecd3f87db428
SHA51299b3d899443e1d4e75379a6cd41e35c51bbcd1c995d3d7a9995eca5cf137ce7a879c636f453b6bdf331637088cc801b0b44fe305f791f94f8107f3bcb368e7d5
-
Filesize
8B
MD5ae807172aa09a94cb19993313b9ded7b
SHA1be321f83d700fd13b1e099d2bfc9eb93e65f66ac
SHA256c911d546f825b95fda489cb5b1b382ef2bfe25b05e7d9de50fb0052ee77425aa
SHA5120f0ed2e81808dddee3f66cf3bbf44c61d1775198ec3d8e1a28653f4503e55aa409e75a52520fc7eafbd1315f1cf72ec05379545bef9f46d359c86ad0ecceedc6
-
Filesize
8B
MD528c696ff5eb728fe67db0ce72eb6056b
SHA1abaf1154cad94efbc3f801a3053ad24f640b77e3
SHA2565853dfc45a375c3f0f8fbb1cbca992ca9b9c72b5f6eff58a3e652094b20a67ec
SHA512250baec64f766a75a70fa7a79dceb6e56beffec4df885b74f56e94af27f5ab30a76c7aa2f6570e3b6a1059b51cfdb0568c065da9a597b66a1e25deab8a900dd6
-
Filesize
8B
MD5a15aa21f59e3f2da22853756cddb586f
SHA12de5d7657e933785e2ef58663d8634feb16d8c63
SHA25604cc646e7423948d58ac342546fa6e75da47135c6d89094b384ee814e2933b34
SHA512346a8938248072492351d066bfb56f562418a71d3fb7bb9e7ba7cc78bec56534c50b7c958ca134f66db7d012667388140436f3744f2bba570edcb6d8b67a6c0c
-
Filesize
8B
MD576a6a08c8aa7bb0d1217f9faaf586b33
SHA10366b1c9ffc1f1805b46e8f5a361744776cb36dc
SHA256c6469d5d0a498c1b0a00a4e90c0017e3669d634f81b54470f88bec60f5b6fb40
SHA51216c91a852fc3053b6664942569c02a576f2c3203525f5a019086c7a39458230c511ff393e5fcbbaf4d6b552ef3e0dfa3f90377aa0ba6b2fff6f9771a58b7fc4a
-
Filesize
8B
MD55046b7e13a645d73f05c79dd25985fcb
SHA16a0215c6c99030272952681897709915fded87d5
SHA2562b851f32650a8f86e764d265c41d46398bf1eeec196ca3310ea1f0839d562a7b
SHA5126f69e6c4d4f87e43e2fddd64c188ade37d0876081de2ac9536da1f7d3a1e8eb49b6ee7c1fd94bd3b22329c55738f2a2814a5d8388326fee0dbb5a04228cd007a
-
Filesize
8B
MD525cf926a5eded3f1c2cf8090bc0e173e
SHA1382489935289c43d4c923b30268b38ad53ca96eb
SHA2563ef8898cd6f78dc462bda1fdad37737f6b7c74fd942830ce339a662cb3041c07
SHA512fdb6ee6c4b0fbed41c28808896e92b42529f61be1d4029a3ab78b862ca02bcbaafb11253915fbb55cf3087f529d51027458851fedf2290853fa3f37b0dd82584
-
Filesize
8B
MD51ec110c34d55a7a78de752b30e9c0c57
SHA1e905e8aa3a58b99f4a71ac805f660147a54636de
SHA256130b15b4cb9661107fc2d617c57a4eabcc0f0b5d921ea7a1dc6cabb879a060f7
SHA51294eec73771667e35b8e5bf9e893d43e3bd29677dde946bbd3973feb0ea5b3b4042b322c352fdfd23b55f648f6b6f0f1403a2b574a8bed5a153ef73c231fd7b76
-
Filesize
8B
MD53b26093030e8b32b4d475346644854a6
SHA151dc46b55e8f292cf1d11afb04d4c70395b41314
SHA256f4ddb612cc4d62a4c93705f61219a20e1edbdc2918cb6f11aa44e2afe01388d0
SHA5121fbead627ed9a46094a51aca117453568ce37cdaeba726dd7a3078284ea563f0b30223003e95e81775f7c789ea729515338069917ba76c3ee711cf29549e3257
-
Filesize
8B
MD5954710881c5ebc1a987955eaa4c53591
SHA1df35874ae67d22d088593ce8fa5c06bc23d4f650
SHA256b149364c1e4eea53826de52f9cc68479143204d965d14325f56b3000d568dea4
SHA51201f0104c2ca22970964c9e2157469a479ab7fdfe898dceac8dea2c7ce3fe09e444bd508ae1759c253a3d8950cba9fca59d5d0809bf641fd88be2f375d3d7dbee
-
Filesize
8B
MD53eea3d2f9ab71a9ee44943a833c5d2b0
SHA1480a6ea333242b0a04ebeef37946380957e614cc
SHA256835fb67492abf71a760ad38c3cbc7c93e7ceb14aaf45beee533d41e980881e7f
SHA512e57f8e0bf5823ef9f674875a83a0dc0d195027eab0da7fdcc6f9c3e504aa37c4f3ebb0cfa9b476c5e57f17bf3cf9fe716354b342b71b48569b0e4dc59861f97c
-
Filesize
8B
MD5507f094e6db4826df43363423019e64b
SHA162d2ab5fac5647b4d64d44a45e732ed20a3a4d49
SHA256e81df6d5186394fb05013bae1a45e478676aedde87c3bf4c7837421ac2a34872
SHA512b495977cc49d25800b01c4345a8c9c5f830fcb1d17a3376b5b98eb190c29366f6b314a613c0029b19edbfafc0395011c5a63cb8e4ca17e93f48bbefbc0a262a7
-
Filesize
8B
MD5c4104335ac708489c664d989d930b4d2
SHA109259de1f8d6dcbd593c31de406d03fc608a4d1d
SHA256d4a773b7dedca92966a583314144ca0ca326c31240a054630508556554f5e1d8
SHA512b4ae70e4f04dd691dc3b8744d3731028849f3c3127e7685b384f2e01f1ce56b7f184d4b5986389cc9a92d462292fd8c653b9d24e3bacaf80d04b81824b8b0512
-
Filesize
8B
MD5e57dfb3ff5ceded74ae9f0b3a4d93996
SHA14a445111ddb73817a2224aec86f8a3e9f08acb83
SHA256b70e88fb2788250893dfdc66bb9bef2a4f512607aa9f2a1d9f55cd1b1b51d3e6
SHA5128c2ad2ff464a8468c024ba1691666e521044be7a4b3e15b82a44fe996a8e22510dc8609cce312ad5c75e3d3f91609fc0f56bd9ee81c13f60184b66eb0eaf629d
-
Filesize
8B
MD5cb39f176812163fd88f07ee341e00eb2
SHA11f6d21200ae020625e8a1910c1b670cacb43bd77
SHA256c7a27894655ae7f9233a030c4c6400d1e97f418db37523f29908d9b34c17fc07
SHA5124d074f36f32af45bfe732e6b7822ed41505e13fab1e2c05cb372f28abb6e823bc3a1e02d0eae9944b8633f0a90df73e52393cb24c43b948f261f2e0876be6887
-
Filesize
8B
MD5b09fe8642d0483b2800a9a4100cd47b6
SHA15170740e3e92e467739fc1e4e19d79caee81e358
SHA2560c1455e11a2955d4f8c57744ebf88e5f09564dbe3c2486ca83952961bb07f7fa
SHA51270212888b192da9d0b5807979a4967fef4e9d049edd67acee1505c9d8a310168af962a14372c71fee96b1edcb2e0c81fc481f935294ed82681df9a9c7f3b806b
-
Filesize
8B
MD5816ead14192e10538ee2a1d44a6060f8
SHA12accc8de70f82c1d659d3bd04753c91488c68113
SHA2565ea2f268840bcba39b5774c8e35300d7e4bdf3f98e3c09cc2dfa21d745cdb268
SHA512651a92d80e11785e9de1149786c772f93c2159b7fe7cf9231cd64caabae533ce5e26c6d5d09ed44dc1b38d96ec24df79d74475d6238caa77baaf0f80c535a5fd
-
Filesize
8B
MD5c5acfb64dff4e0c66d154fbdf0054938
SHA1731a9e2168f3a55350d568a9e32574b910b87d94
SHA256d840894ee186966e603c95c3fab23a94c1da5463f83bd2c3813bb53a5972460d
SHA5123d2d68beeb1556ab7987781be1259f2233f5607f979d2286c73dd3b75c0b599c9d1fc1cffe90bb97e6908c337cb160db84bccce6ba24d74894d9e156c48fc65c
-
Filesize
8B
MD5502384de9be0f61f32e81378fcbffdda
SHA1e71f115f234953ff5d34027308f8a72bcb72ba55
SHA25660c0eb459a0e338c379186b22830383544b1bd0a497e1587055b8d3fcdfed429
SHA512e689dff09ab3a65fb17c31686571f8aeea36f14cdb5c83452027b8da1987bf88f6831be341ba5c3b285ab10cfbf26105b3964b2bfd0900621212c38b2bbd85bf
-
Filesize
8B
MD536c54eeef4731a1befe0acdb93ce55c2
SHA1ecd4f0c4378a4a2018a4e81b3e428afa20ae25ed
SHA2569343c95c9d42b9b34fd3d2c17afa7ad8fbd62948af3c1a5887ce1fc951692873
SHA512d799bb66bb351efe5d364515472231b47d93dc31d458d0e2df5618d7349edea17a26793995aa5f5ab44f1d20414839c53bd511d5415f53a059be35c02d3b9484
-
Filesize
8B
MD51ed4f04dd117a92acadd6f86e3c5c629
SHA163ffc00b38b7b227d77b49c135ba14f8d06d3096
SHA2561e6a21a86fc4102b2b220ac448275676dcd21ddc91911c6991bcf894b907ec79
SHA512016c83cfed5e32ce865c12a8780952343f06014d9eb76f985ae730ad29b57da9982c4f29f1d05809d01447c779d3c3496fd5b998f92a3984f21aa0ec01fe478d
-
Filesize
8B
MD5fcda5aacd79327ed8683a28a8a708f8d
SHA1b1eb3887dc57ca2ee51a92946633b6991f683d72
SHA256a09d385cc4c4851278ae8f0398432922fdadabba96ec488cf6b1c87b15ff6fee
SHA51241de6ffdadc0369b7fc12b171d97775c06e9e342c5cec0a29166bd54b8855bcb15221c365f65ae57f4d68ec181cb1e3d49903e6696cd644ba4db8de6ee710350
-
Filesize
8B
MD5d76c087a845485b35a3cf14e55f31a02
SHA139e02ae13209719a95ae0137f177c63b18090ced
SHA25678b6dc820910e2d74af4cc7aac1d08633404c3b9786c78bd56fd680d77fab523
SHA512a63a4592d74785f0d04775ab372ce4727c820e5869374820933b8e6a1927a8bf45eae3d1c81bd114f3f4267cd631ac674c9abb9718e227d3cdd50a01f6ff2b76
-
Filesize
8B
MD5cdbe13a55b5798bff3346f151ca2528a
SHA107c076965587029ad6945e311be8c5f8414f4c8f
SHA256d55d42c92473715c2d11f2d4c32a3fb54a6aca2d709658590f85ef924ad7f202
SHA512807df622f3ef683f009f9fb6e59bf81e963f4573791774417041aa04bce2f44e33c3dc23d82d5c81feb65259555a8b287b65c83fb761f71d5205559f6b00dd3b
-
Filesize
8B
MD54b414d64e690c87a006b73f5d55ca630
SHA1d5d6d92d358cf6e8daaa106cbd7cde2f3a696744
SHA256350af8b9a8c1229a0f1a5575e1b3bbe32d9fe0ec6c674d2fead882d973823b4a
SHA5126797da5ceae4fa5dd36be57247708739e449a775ece978da6f1331f471b4955535dd9d10c7eab1a01f31b2c5e7dbc0556bfa8548dab9ad5ba35b81d7839052a6
-
Filesize
8B
MD5c9f3f76db7cd9082cd330687f37b3c02
SHA1e806bceff8ead3ca8b92f8d69404da5a414d6dc8
SHA256f1ed3c157988e7fdb99ac67d26aed32158e3eb790ddfc0c7b1087e65acc96e24
SHA512175dfea81bc4c527ca9c4170295de44043daa397c97b849885e4bc87b4d99c84722923d863e05171419052b908c132fc021cfef6134ffd153d5cf12f4593276c
-
Filesize
8B
MD5da573b4d846708fb9efa197f69a45741
SHA1e3ecc9c4fcd77e2eaf7d1047d1dd1c760d6b5ba3
SHA2560cd16a3d6eec4f5ebf486b6ca2e837a767ab0ee55036d9adc967ba28dd8c458e
SHA512b0c83b25fa50d73fcd092f84a7eb8770b824be924d42b12ae85e441c4c0a196dee4fe7eafc7e443dc1c77317a991e04f8c19bc3988ca625c5d052a30a94557cc
-
Filesize
8B
MD567e443faede3cfe67bcbb9fd93618fd5
SHA167754bb74cc25859f34c24d3ed9847bf96e0eac6
SHA25601f8b7e95008e2d86e2c54b600eb5c6788c6518bed5eae0f0e8b03f4da278602
SHA512a492d493ecc566b5394c10d89285aac32fa455119adc173d1bed14931d0acb63edbfa16de77417c0bfb641498c8bed173777563ccb6c476ae41f337cf9dcecd7
-
Filesize
8B
MD5d5771c8c2d9202b67789d92665b32fdf
SHA1f4cff8f1e02d6fe18e10e5b9dc0513e39c0d8cf6
SHA2561c082666d8890b054f458e27ec2c644f39c71238993007d03a100f781594218c
SHA512e877a3bd632d682555b154c9f9ae4e2d726ae8e5b619313df45f3e09fd173bdec9da44cd6c2adf40319042dc4853a3a432b04d2d5ad63c7d6531bd1992242dca
-
Filesize
8B
MD5e527cfb91b116f94b7abc0d44f4c94d0
SHA13e40bdd2745f0c1bef14ba7acc8b3211c85bbe48
SHA25650081392a1a8fb144d6b24c29801826951ff99ce132e950c6a3657d940ea05a1
SHA512d14d8036c5e0e8c8dcafa7a9fb1dd113527d1950f257658cb2ea69b531083a2aebe836947570896750931beaeecd5c3827f508c024e46c595e1e64a82fa05252
-
Filesize
8B
MD52b66680bf68b2280210c62265e682880
SHA1dcb48684657ea635c792369981be57058ff23c38
SHA25616072093d550f5bda661f9da89fdf3ee3438d813a750deeea759188b60928aea
SHA51219eee998f56949afb4ca4a1abeb4700ae9f4ae0e216afdba5a56ba7abec43a2d973ebd66cd9675c460d0d13bf81504597604d9df6eccdf5d0d8a4e67a69407b2
-
Filesize
8B
MD5c09acae27e1289dd10e1ca1f4b6441a0
SHA1686fc577f2d0e50ffa9a83396905dba6919851a4
SHA256d84d6d898ffc9ddc51db536ccb93a234a3a7b7cda31a4b46a7c570d95f067661
SHA5126b66c5ff21c0e13ed0be83ef2d2d14674f099c5282742d2f2fce70382c6c6dbb96c1b7f778c07e687d727dbc8ab2d8a691195b3838235771b611e1069de7f241
-
Filesize
8B
MD5c33d01ce06e6736d103381fab8b4f70d
SHA109b053d9f7e37b38843f6f85d19eadb7cfcaedb8
SHA256f6a9cadff6856e26f7fe171f2632cafd08747d3d935fae27c0de06207fbb6b22
SHA512b9f01ab51880662bb22cba8c162d049c46008e7cac88e72cc9c296fbe8dd4f34bc77910a1bcb77e7d21b86342a9d25a6780d60680f872cb1935bc32f27d99b44
-
Filesize
8B
MD5444ac26096acb3fa41b906ec41f0fa5a
SHA17c2915460992d2f91234f182530633355da69dc9
SHA256a0b4843c73ab0dc15a26be80c285207dd2531c5f7c939e580cca47fb9da1a5cb
SHA5120618ddc9c7d04a28a6537bcbfc6c3f208afc2835a2a45b2e6107431cabce00b31e2db7610c7dde2e43f17f122126650c5ad9a2b04e731ade3b6ee60fd677baba
-
Filesize
8B
MD5c3f09657215b5937ce7ee99a09242749
SHA1dea1a3f3b77e45d41c221cf74cef105f8a6e4a7d
SHA256216dac02edd6d87b979affa4c86c56d71fc853839f454cd1168f8696d0183a9c
SHA512713833b7f0a6de01cb40566c0f722f44d2fb0818dd467099177f77134d98c7b854d43c39961bd4edbb8e6880782b823fa2e0e33d3e7e83cb30ae21ec97566ff2
-
Filesize
8B
MD5a1bd552fc482e63f4475ca65c21cd2cf
SHA1aaecccc08f7d3e2a99afe1dfddb211434045aae5
SHA256db60fb723a64b9f87caa39e991b2c2765f2daf51c313936c88fce4d013118550
SHA512ae51f69d709fc1f9d901ccc778ec8bb0198dec65e186027092e134e4abcfed314c3a2384b9fcf0027c7ae991058d854bc38b19c6c3ceeb935f80de3abee283fa
-
Filesize
8B
MD596924c9d2c3e36e4c3b94e11e2fdf6a6
SHA18c357c69667f50377ecf9150a6d1e0a2e2c6ab98
SHA2567e2cea1c68d9b200b0095dada5a6d7125cfc04e09d98b80b623a173905b8f8e6
SHA512ae72674f5d7ef8e27ac6e013125b1bcfd729cc40ec1f2fb2e9b5611fe02e7828be859f9c5ef82f6d229b81075dbfbbd21a62c37cc935e09bc09ff9a25ceca448
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
296KB
MD567ead342877af1bfa06c52f8d3e64d4d
SHA11710e6de674994428d33e8f88d4e4d1346c3463e
SHA25663bb2cef2565f78c41e6529db1308b3a716f6c0dcb8e0e2e020623155cd9ee94
SHA512ce34d1a03bd676afe81202794a107b3ecc78ba1c95bbf240b3ae68883539f62c132d136c3c91ef5e0f3dd5d4b75ac4af2ee1c20c9ac6e6e2d2341a96ef1efff6