Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 00:31
Behavioral task
behavioral1
Sample
JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe
-
Size
357KB
-
MD5
7698c6a326c1f37db5346bf1bd156200
-
SHA1
ca12175a923dc2348a8a9f9a25c9c6ec748b9ba8
-
SHA256
91472e4d1b1f24a2fd24a06c895aa9db2a7ebf749ccd5c323a3ebb23998d9092
-
SHA512
d3328c4f5b158b76e6b4a58117893e091b0131a3599b98a78eb18a7d0dcae8893a8340174a1442fb044d986560b65dbe3728b55c0b0dca3eb14f2de98439a91b
-
SSDEEP
6144:WOpslFlqShdBCkWYxuukP1pjSKSNVkq/MVJbUNSDyDIkFthp:WwslJTBd47GLRMTboSDyTFtj
Malware Config
Extracted
cybergate
v1.07.5
you
logicfreak.servegame.com:6000
G15DP25DTK6EX0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{732T2551-FMX0-6PE8-6KFU-ILQNMT4G6XCD} JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{732T2551-FMX0-6PE8-6KFU-ILQNMT4G6XCD}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{732T2551-FMX0-6PE8-6KFU-ILQNMT4G6XCD} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{732T2551-FMX0-6PE8-6KFU-ILQNMT4G6XCD}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2244 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 2244 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe File created C:\Windows\SysWOW64\install\server.exe JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
resource yara_rule behavioral1/memory/3032-2-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1828-526-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2244-856-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1828-878-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2244-880-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2244 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1828 explorer.exe Token: SeRestorePrivilege 1828 explorer.exe Token: SeBackupPrivilege 2244 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Token: SeRestorePrivilege 2244 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Token: SeDebugPrivilege 2244 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe Token: SeDebugPrivilege 2244 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21 PID 3032 wrote to memory of 1408 3032 JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7698c6a326c1f37db5346bf1bd156200.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
PID:1980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5ff5a7c6fe0ea63be8cd3cf6c805167f3
SHA1495f7048bd70d6489fbba8e9ba09ff4e67ff16d1
SHA256a4b499349156c97c05245ed830fe42e614b1c310748cd5faf16be3c541207e6f
SHA512b94ed696422e361a3c009d935acd4e4f528606c5915592ad9142b9b039dae6a28a9c069b0ee4379463cf1f9818f73b78dd2d58debbcdff7298d09d085e8a674c
-
Filesize
8B
MD53d39f66c9d2da17dd3647e6edf0a2b51
SHA1e1cd8fc3936ea5fc61c3d11983cb1860f683cc11
SHA256ce30b9ddea965107d174e65945e3a7df0f3cc19adc25f72f130e6832643434b2
SHA51229687a74ad51ede2e8bbfb67cbb6797854a5e4d9de3f9bb716fe4bc5d0aee01e725fa6524195e8b282b24b14bd0bab5eebe71ab7638c26ae29bc807006c324be
-
Filesize
8B
MD58e18e2c4664a3463978792cf7881aca1
SHA1becbe7461bddcf1c7de439513d4f20c4d00c25ec
SHA256621bae6a8b2572d98a85b11da5f14a32c90b98c8d4d664be0fc84632aa3de0c0
SHA5126d6dec9cc2529113b805f21369af7ce8ba49d24c09880e966220b2432dda072fb93e7192f92da2ccc22a91e6a6db9e1fcd9f19ba6355e1d33d9645e413a30025
-
Filesize
8B
MD55939eca405d8a63f3da7c5de3860aeaa
SHA1b438b77a50bff847a6773f2e567b4af1b2d363af
SHA256aea91febc3bb48a2ee9324246d83c8ee3b982be5382d3779f5e60f4d715aed9b
SHA5122f8fb04464236aa920fd38731a61a55a672fec768d837b60b43aab1646c3a41e7c7899042161151cd2efd4ddcc3690ef5ba8a1945b069b5b7495452998b8907a
-
Filesize
8B
MD5609d3852fc5c648513597272ae581287
SHA1d1c487a980cdd6ca538a0ab49bf6d2b52e66f540
SHA2562ce91335d8d82476622c758643013c53033adabfd699475bda467d8ef9c43224
SHA5126a3fbf19160b991bdecb728a4a2fe80c45407454636f2800b7d93f51befcb5a00b0f53b5985916b06bc863ba57d6be88ed94104e93174e63a58e000009b5ee1f
-
Filesize
8B
MD56b55871b0eac03f718c378a0064b4a7f
SHA1fb33adf87e524194c1fafc2493507cc289e3f1c2
SHA2569a0c493176a919d7b2776c9523e204da57ae024af4afc23409bccbfac1050774
SHA512d36d6aa7a3968821b1044b68d30d821ebaf8c8a62149b764545a493e4ac494ce4b7b13ced1994a6abbce1da2a19220ed0716d1d34ca5a0300210cee4dceadf20
-
Filesize
8B
MD52a126094099a7f91ec5cb2d85f81122b
SHA1a2d91314692b04f281677e9261d67977a2a62c70
SHA2561e5b0dc6b3613b24a02a5cd54d442de92a7ffe4a37c0385d3c6456ad96d120dd
SHA51242639f7cf9fb84f043c1f8feabdbf23d9efc3b1652efba09498cb1d89e95b7c2824dc75d95345a9b8dc7cdc766426f77c1fff0bc13b471d0a4a70b13ce2bf1b3
-
Filesize
8B
MD5e515534b408d0b84254cfd094b3f209d
SHA150b66c5af5664f9602c91f1178ba0c5ab936d44a
SHA2567300f3586a572d7cd4cae6140f894aabc50ae59a5a8ed23478b666fda7d66e5c
SHA512972bf0a874cd460e891cfccfbd29b75ba01e96ec185197a2df74bc7cd05916a9668910d367cb5ff4d842c05620c5aa7bc147a8a5143cbbef06240d50aa5be7e1
-
Filesize
8B
MD5babc34ec80edf9dc74a55fbcd7aedc13
SHA1b099dacd26d4d7c0d4d850c0a9c5b50ae86101ec
SHA256634896e673c0bcee7c13ed7b4d97c178a8e9894ee3a3136c5438418d8bc4fdfe
SHA512cef2d5573961de8fd94ac367f3cff96e6b5d5252a3d8d37d4645fbd02653c571c2a1f1d7d0d0f62010a8a004b4cb1ae8ae65eafbee4b7bba92615af61a88b9f2
-
Filesize
8B
MD52ef5f9d79814eb57da3f9b5775215622
SHA1acbabd9ba396425ec707ad0609269a0dc69a5ad9
SHA25662adcca486afa5d29508ada8a7c302a5c72ae4b27779710baf717bdf21c722b6
SHA5121844e24d04f890cd54f479fb5393fb287ad7224ce337d36f38d49eb85f01d635e11424fcc35092b2f980c13cdaef4cc72375587f7759f54c8aa542b5cea14710
-
Filesize
8B
MD57cf7d9ed8f1fe89a992547e392c7a0dc
SHA138e7e68769c7ead3d7f99a2fb8ae4a67e99c3fae
SHA2567bed8a7b6437185965123301a41a47ce524dd76cc10ec0ffb6a67cebcff563e5
SHA5128d7230e6bec3de64df95095138e6db8f04f033ee744005079d5ed589ccdcc23d612d7df083ccc276edf643156d05c6bea4f486a41e0f49e4b4bf243e0d07aa05
-
Filesize
8B
MD555e4553f087df192cb5da5c048cf7b73
SHA1ec9c176fbc475a91fb5fc05f8648cbf98b24a0f0
SHA2564b88c8e67dbbd92d430ca514b83c1c9c51c9c80bc44797825f3355270c455c19
SHA512d09b4396ae4a13896a4833fbb08fb8154cb6337c2a4f049a274e20e5cbcfb6c7b97c1e3a4596bf772ba3a7451d652e497000a898d194e18ee7141db7297292e1
-
Filesize
8B
MD534857206a02f34ee31907bc6c273fbd2
SHA18b873ef5308eb2e4f31f6ebd1709cb76781db010
SHA256a71fa6973b52e40d4bed40a39df601d7217991b06ebf13829986c7e3a20cef34
SHA5124970c7762885f269ba455b26ff65b45c825c4e209b70429d2253f971e63b27be050562d3b5f5e8d1b6947e8e74fe1cc720ed3c787eb925da43659a3484f37b02
-
Filesize
8B
MD5e3d54b9ed8577c3270391acc9677bbf9
SHA1ea4d921025a01f1887d3b944aac4cdcc61a4bdf3
SHA2563c3ae49dbdffec5935ab16413b036ab9f5ec72dfa80e3c71986507a6ccdfead9
SHA5122802ac5b4c1195c8b001c185ddd00319c10df817cdfaf81f7512646c0b5bf67441e16c3dd24edb5ddef6b972743ecd8b2ecbc96747c610dbbd0a173c11477952
-
Filesize
8B
MD53ca224a1d715be2982c00a9981f16013
SHA18276448b9c337b78cc07a8a368b437ea15335f36
SHA256e93c9c3fec9ead5750d34168d522e8a427810b38ce909e79c282a77d1a1250cf
SHA512a340d98551131d9e38bc69c5fb6f7141b83a3fed45d139632187554a1d3527505acc87e2e662513f676847353f0d6bd4cd282a7adfc510a2cf81c7bf033eb8b6
-
Filesize
8B
MD5fa7f21d5dde48259b094cdf85da2bfcf
SHA15a5edc6229182a968275a8b6ce7accf42544240a
SHA256c0428e5c704e87d012a54f3c4d7dbe48cee9daba9b9fc4add4f801e67976564d
SHA512d56fd0f141c538451ec1a9abdace3809d01cc0b0a75b717de1e0e2724fc3cc00b0b9b30591ccc26a416d60aa2e4f40dd77f4003677cdb8f39865a0f85e47eaf9
-
Filesize
8B
MD5ac7480a253dd617292a3b6f054542358
SHA106b01e6b050f7a32448c4c43e1f89b428f6d0889
SHA2565587f48deafe3713feb1fc524db3ca48942b0242c3246106f76d2998a113ccb8
SHA5126ba936f5c4f57563a572ba9d9c3a02843c531f7ad31b5d1925710d8aff9864a50e4ab5cd66396b731b84ef4929c74355585c467a93f2697501cefc2a09f42359
-
Filesize
8B
MD5a3ba41896e803d1bc5c84719afcb0478
SHA1466fdeb040cc912b081be0352fbe1efbe5969bf6
SHA2563e5a5aa13aea9ab96713930d80f3cdd18fc1937ddbab25e9bc0d67929235ae39
SHA5120f7872c6fb1602720cf3bbda8d1274fc24f2e4e8560b284f93372d512d52ebf4b602d7e43b5e36934c41190565d379827e5b45de506b8344b8abbe17960676cc
-
Filesize
8B
MD51552bd102f364a144bc59e57d8f9ada1
SHA18371665707f27da4344fad8507cea2705fd657db
SHA256d0c31ffde330fa8548f4eb664441d54a13c1222a094a7389c4aa8f509a5e38f3
SHA51246ee03ebcfdcdbc18e50ed7c456f4fd1287e470e2f5173169794d9a6502ffd418317f3b207ad08c248588a88e592c797335f2f6d9c0396ab7439559357657473
-
Filesize
8B
MD510f87f7158aad4debadef978e761436b
SHA19786565bb556e5b429e416ec32c65f93041cc0fb
SHA256723b7aa4bbbe8edfb6081db22e7646a2caa5df6553be7b69836b23c4c490b0ef
SHA512e038c2eadd3306ea023ae8547fed801f8821c0ad27a9e550d356e09996629e26433cce55d6876051403390eb5b65f6a5e932de570eb0ca79701dd2543bb194ee
-
Filesize
8B
MD5b9c72ba1691b2f54791274d59eb5965e
SHA158d80c376fa7d12a20aafeddaf87f735fb5a32e8
SHA2565a0c7f5c2eb56762e3dd4d7031991c544f4753d570078d749f1b33bff8315a4b
SHA5129163055318f7466667be96a64457976e293e36238a043c2e63f596c28230ad8e5106c622edb39d1eb4930a01ae0ce26aefc0002da1e1874dc37d810ee89243ae
-
Filesize
8B
MD5627775bbe7bef95671063e0bb8b806bb
SHA1b96a196ae7d71f54483ab09d5b019b1c11ef9e0e
SHA25665947c7412904a004def9378ac97f7b5ab9c1083e0f17011fab2f4baf42b59bb
SHA51232857ee94462018b7f3ffb0e1441d929e194325e27d18faa12273f4bfc12df4efaf5d63ac105a1f2b16fa19c608b404c2fbbd6d8f19fc22e9f5aa0cfa8724026
-
Filesize
8B
MD54d7eb0bf0b7ea6f187bdc17e859207a4
SHA1c020900b76816b2a6665ed002b7dd6847d65c68b
SHA256327fd422826f5ce1a8242b96dbbf3d8095362e859cddcc1cee2ec3bb4bc1809f
SHA5125add68dbc53c20bea8e94323685bb28ea34079390fd4923b267b14ab625302127ea45883619b7cff740e275f836bcbbea43e56cd4dccfbcad260e775cd1c7e58
-
Filesize
8B
MD59882f25cf03f6e2aa3a36d32cf0dd4eb
SHA18f4cd4660f3af24b878daebb475e8113fb7381fe
SHA256107f89993d5de4c0f17a408ed977904df1309856871966197a802b94693fb685
SHA51205ac504c18690b6f0c933ac5a8efd76ab06cdd4e93fafb319c9ef881cbb139ed30989b90323043d09ad74b336de6c3a6e2dab3c614f0592417f949f5fef4b480
-
Filesize
8B
MD5ab981aae87e770cc2b3b060d980f736c
SHA1bb171a1c6dd2a3de4cfd10328591aa7454644dd6
SHA2560b8a66c89459b87aac7c42c69601adf0e590a488a51807c354b3b23d1be32524
SHA5127fee3fb6ca514d0fbe08b84b16dc3f5fac401e30eedced4aff0a04d1d3c0c1cebce613153e9da1a4af61a5dc0972b02931b12e606bafc63794e6796ac34cda00
-
Filesize
8B
MD598c2a3d1baf9a76f3c14bc9cc12e4603
SHA1babad105e87027effda23286a0a1008eb2c41739
SHA256c54fe3ab4b35c0e105bc197d2755e83545bdb572dc5d11ca1f860cbf6b95a547
SHA51263f6d6ead44c5546edd09a4b2050fd5ed87b0ebb9832a5d97470d658da1836dd33f25e213db68e24e942990efb981f05b7b2177bf20228400e839448ee1eb5ad
-
Filesize
8B
MD50c5ad92d71f6c8c487d3f3abb92c993c
SHA115b0e80824c297fbd12e47c176a6de7d189899b3
SHA2560dc5d9d53d1d0f5a21c9a82e519072c24b0ced56189b7fa597f2285b8a431536
SHA512f9596adb676aebebc98cf3225e4a617807dab8b3b289982043d58b268b361de526f1a3bc641ba7e26041f4d6473bc4f8c7631292ce344f324705a4d6a2565c49
-
Filesize
8B
MD573a194c4311c9a4088bc982b06f322f5
SHA1a7062e407b8f36471d3c33dbd52ad566c4d66855
SHA2561c2d1e5f356c40ed9259dbd5b0cf7361d950a29b145df5032c8cdef81e6cf90f
SHA512a34b9963c8c015cc11a73fc1e23f254fc71129ec69821729f18fefbbf8b1855628de88e49a3de4ad3bddf1a3eb37a9f2e189fac718cc0249ad21df1728c48598
-
Filesize
8B
MD58181c494fd45c728b792882261d6cfc5
SHA1e5b67f4598cfaa3ee9661031a230a955dea8db1c
SHA2562230fc49bb04a72fbc71d9197df11e07290566bb749ce53cf68168100007c8b6
SHA512894e87ff78f2577e624625c77edefef663c2dc6e1bad841614425a9cdecfc5cd8507b5e270315cf2fef78208970575616e876a6234f3381fac3bc1a6fcd71728
-
Filesize
8B
MD5962485e0fe4417c34c14e3d3bd5bbf27
SHA1e32fc1d84806a54ecad33e4ea59712a3d0344f5a
SHA25686296c2341a1d0161a4d923160acb45b339662d5e25eaf2fb850ee082d3901c5
SHA512eb941c1d5b15533cdfac6f2efbe35d254965deaf2a826aa9e7235b4aa0c5656568590918d10562801fd9863af069cc7d4924a14d7d797bed7292fee96f323bfc
-
Filesize
8B
MD5239976a77afbce7bf246438023827a0d
SHA1cc5640cb2d5fe882afccc05b20ca884e959a44ef
SHA256911a0e53ddcab5fbce9360de5dac34f167f9491c2e72369f5929d95d54ad91fe
SHA512981f53428fb0815f3ce4b12d55376a1bdacf698a5d9d8309f56559238f34c8422202e94b90bc8baa8df066f09629a80e1cce67d9b8fcf8323138d2c2d41506d9
-
Filesize
8B
MD58c9e1f04e1502d397aa148d025c41ebc
SHA18d80c5dc35b78732607844eb90f532f716497a30
SHA25603befe7be2f858d9bdc6c72ef26be51f91ef704c70caeae4a9806ac586d138b1
SHA5126361629ed9db80391b366787e408470c7051d8f0c015aaaa376f2aaace12cd3f24ae974c2b4baf01589b240c2ed09b2c20554c68edfee0a7cf2b9b875b521afd
-
Filesize
8B
MD5a9d0166ece9fb767d0412ac563089f40
SHA1e851e39a7fecaa6c61c2f34d3accd92e45da8319
SHA25685c7d11ffd4f34ad9de56e1e6c9d8d10c27921dcfbe55c3613ad93f958401905
SHA51200d02f38e839df827ab5610a7cb2869d3f2bd3433d907b3b11f9dd082185f2292e75d79d34d8e53fde2e09809580e9b44abf12e999807bf85fefef9bdd405936
-
Filesize
8B
MD54abfb826296c039623cf9df469218107
SHA1a09f8362c62f6fb824890acf31dfc873240c7ca4
SHA256ae208908d79b6926be8acf9ca3def07253a5d9b26b0c77fb28182ffe0f78cd56
SHA512987d20c2094fbe8729534bde5a54f44a3758fca04907076935dff386f731b606f8593b481cf868c9054c68c183efc1331f039cd8fff740d12c7b418ba6df7902
-
Filesize
8B
MD58302e346772cccf0d079299cbce0aa71
SHA1fe3e5699bd69f69411a0252e7869c92f25ff33e4
SHA25649bc1e7e47bc299c7458fcf5de73f85c2f1537e4da05ac9baf1dcee3a1221519
SHA512ad7b7beed4872db193be11f1544bb118501100c3c0a771650c43abb13e25528121f88d6911a061de98e076539c88124c9d1b0b667a183df9c901133a1d781d18
-
Filesize
8B
MD5f9764ee9f2dfc17e5d69afe5c9c72a5c
SHA1a343388efead3869b697b30b3d0bb1784f5caafd
SHA256319d44d43582762d92275cf89dfeba1a27c20cc0211b355b9aa419cd793bcd6c
SHA512dfdff043f2c7acea8276daa642c12a07e0f451e6676fabb63012d4a134a6b7cc9f04b52bcf5de72115cf8f8153397b3f363a3e9105fb68869340144605f24d0d
-
Filesize
8B
MD5d3144adca964b7ab194521ac26c593f9
SHA1a04f9c8565131a646238dee967b5e5f11d0b0dfa
SHA2569bab138b89f12d423692776fad113e6966e49d4c4b3aa4fca8c6ec3e70df1ec3
SHA512bfdc33f49f9de7f0df4bacf81a333c8f42f3dbbc0fd3116629b81df9d77d96074185730ea63051c2811630e8f6fc1959062c3e8d6dc1f18f2d216cd8f5a6343d
-
Filesize
8B
MD545a6f91272b54cc313bfa9970e7b439c
SHA17b31450ee34ac814af2735bded56acaa0dbda10d
SHA256cd0618e28572dfa77a69e694330b53ea9ff9cc73b106fe91e54b3b1819333c4a
SHA5128d204f821a2b148be901083f435b33e3b3f0016f8358ed4a1bb641f80b2e4e6e092e451dc1d84f5a35b7a2f107041988ba846b07faf3d491ead76c2d6fcfb311
-
Filesize
8B
MD5cfc51d98667ed351bc1889988e246652
SHA1e853362ba0ee372296d366dd6ecfdd6b37eff001
SHA25669d29ad03623395ef93638e7149de66ca35f456285816e5191791c00efec6b34
SHA512959ee9eb69e10c429d3e4b3220b239f2d65f76f512a4dfde1dfad854134f6b0f5c34064ad54a576972f18f51f1f90c4009be699ad60b6f03f6451bb3feeea0b6
-
Filesize
8B
MD5e05c33c0631b7093604176a6ca683b13
SHA1bc7f2af5199c08be0cdcae22c49f9b6f141ce1dc
SHA25626d7ffffd2103c2a1c72ce3d5a2fdf47710cdff02a2a7798daa06fe3f0d21c44
SHA51282a24939881119dcb680bd04d639ad6af293bfb2068b245e46ffe49de2c471a5f6a5002e3e9577e8249eac24f564528a31a80a46f57b7e8533b857a68bae03ce
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
357KB
MD57698c6a326c1f37db5346bf1bd156200
SHA1ca12175a923dc2348a8a9f9a25c9c6ec748b9ba8
SHA25691472e4d1b1f24a2fd24a06c895aa9db2a7ebf749ccd5c323a3ebb23998d9092
SHA512d3328c4f5b158b76e6b4a58117893e091b0131a3599b98a78eb18a7d0dcae8893a8340174a1442fb044d986560b65dbe3728b55c0b0dca3eb14f2de98439a91b