Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 16:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe
-
Size
1.4MB
-
MD5
7a914e3a57bec131b8dfd01b3c54d2e9
-
SHA1
87f232e876967d3ad665024f94a2215c01292e23
-
SHA256
db5b38f9ce4673ac42288b65bbc2aa2686da96b58a2533ce71891a921cc6f85c
-
SHA512
fd50bff91e29255885c0fd1eb84b8d7c53ebb941e6cc0db057b2e7fec8bc20c3057b656e3fc7dbaab8886f231399352a13922f8270cf0e0438dc2792454cefcd
-
SSDEEP
24576:ucbzshAB2/QgsvbRRcGKzir+ldqvxmlvSFaGV4JmnLS229XPlIUrQIGPk8Puy9:uGbcfmRRZgir+nqnMMCpXP5r5Gwk
Malware Config
Extracted
cybergate
v1.07.5
Victims
legioncraft.no-ip.org:100
DMXTG1GSV2C6RT
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
explore.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run FUD Crypter v1.4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\explore.exe" FUD Crypter v1.4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run FUD Crypter v1.4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\explore.exe" FUD Crypter v1.4.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{238I366V-E01S-15L5-1W80-0S35XRBALMFX} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{238I366V-E01S-15L5-1W80-0S35XRBALMFX}\StubPath = "C:\\Windows\\system32\\install\\explore.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{238I366V-E01S-15L5-1W80-0S35XRBALMFX} FUD Crypter v1.4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{238I366V-E01S-15L5-1W80-0S35XRBALMFX}\StubPath = "C:\\Windows\\system32\\install\\explore.exe Restart" FUD Crypter v1.4.exe -
Executes dropped EXE 6 IoCs
pid Process 2336 FUD Crypter v1.4.exe 2432 Easy Binder.exe 532 temp.exe 2888 FUD Crypter v1.4.exe 1984 explore.exe 2184 explore.exe -
Loads dropped DLL 24 IoCs
pid Process 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 2336 FUD Crypter v1.4.exe 2336 FUD Crypter v1.4.exe 2336 FUD Crypter v1.4.exe 532 temp.exe 532 temp.exe 532 temp.exe 2336 FUD Crypter v1.4.exe 2888 FUD Crypter v1.4.exe 2888 FUD Crypter v1.4.exe 2888 FUD Crypter v1.4.exe 2336 FUD Crypter v1.4.exe 2336 FUD Crypter v1.4.exe 1984 explore.exe 1984 explore.exe 1984 explore.exe 2888 FUD Crypter v1.4.exe 2888 FUD Crypter v1.4.exe 2184 explore.exe 2184 explore.exe 2184 explore.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\explore.exe" FUD Crypter v1.4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\explore.exe" FUD Crypter v1.4.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\explore.exe FUD Crypter v1.4.exe File opened for modification C:\Windows\SysWOW64\install\explore.exe FUD Crypter v1.4.exe File opened for modification C:\Windows\SysWOW64\install\explore.exe FUD Crypter v1.4.exe File opened for modification C:\Windows\SysWOW64\install\ FUD Crypter v1.4.exe -
resource yara_rule behavioral1/memory/2336-27-0x0000000010410000-0x0000000010475000-memory.dmp upx -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\EasyBind\Contrib\Language files\Irish.nlf temp.exe File created C:\Windows\EasyBind\Include\FileFunc.nsh temp.exe File opened for modification C:\Windows\EasyBind\Stubs\lzma_solid temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Uzbek.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\VPatchLib.nsh temp.exe File created C:\Windows\EasyBind\Stubs\bzip2_solid temp.exe File opened for modification C:\Windows\EasyBind\Stubs\zlib temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Indonesian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\x64.nsh temp.exe File created C:\Windows\EasyBind\Plugins\InstallOptions.dll temp.exe File created C:\Windows\EasyBind\Include\Library.nsh temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Croatian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\SimpChinese.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Swedish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\UpgradeDLL.nsh temp.exe File opened for modification C:\Windows\EasyBind\Stubs\bzip2 temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Lithuanian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\UIs\modern_headerbmp.exe temp.exe File created C:\Windows\EasyBind\Include\TextFunc.nsh temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Russian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\SerbianLatin.nlf temp.exe File opened for modification C:\Windows\EasyBind\Include\Sections.nsh temp.exe File opened for modification C:\Windows\EasyBind\Contrib\UIs temp.exe File opened for modification C:\Windows\EasyBind\Plugins temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Czech.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Irish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Turkish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins\FindProcDLL.dll temp.exe File created C:\Windows\EasyBind\Plugins\VPatch.dll temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Arabic.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Croatian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\French.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Arabic.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Slovenian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins\VPatch.dll temp.exe File opened for modification C:\Windows\EasyBind\Include\WinMessages.nsh temp.exe File created C:\Windows\EasyBind\Plugins\Math.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\English.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Kurdish.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Turkish.nlf temp.exe File created C:\Windows\EasyBind\makensis.exe temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Danish.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Greek.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Norwegian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Albanian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Japanese.nlf temp.exe File opened for modification C:\Windows\EasyBind\nsisconf.nsh temp.exe File created C:\Windows\EasyBind\Contrib\Language files\German.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Hebrew.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Bulgarian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Korean.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Norwegian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\UIs\modern_smalldesc.exe temp.exe File created C:\Windows\EasyBind\nsisconf.nsh temp.exe File created C:\Windows\EasyBind\Stubs\lzma_solid temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Estonian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Farsi.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\French.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Albanian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Lithuanian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Plugins\AdvSplash.dll temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Belarusian.nlf temp.exe File created C:\Windows\EasyBind\Contrib\Language files\Bulgarian.nlf temp.exe File opened for modification C:\Windows\EasyBind\Contrib\Language files\Spanish.nlf temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FUD Crypter v1.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FUD Crypter v1.4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2336 FUD Crypter v1.4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 FUD Crypter v1.4.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1620 explorer.exe Token: SeRestorePrivilege 1620 explorer.exe Token: SeBackupPrivilege 2888 FUD Crypter v1.4.exe Token: SeRestorePrivilege 2888 FUD Crypter v1.4.exe Token: SeDebugPrivilege 2888 FUD Crypter v1.4.exe Token: SeDebugPrivilege 2888 FUD Crypter v1.4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 FUD Crypter v1.4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2336 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 28 PID 2904 wrote to memory of 2336 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 28 PID 2904 wrote to memory of 2336 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 28 PID 2904 wrote to memory of 2336 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 28 PID 2904 wrote to memory of 2336 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 28 PID 2904 wrote to memory of 2336 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 28 PID 2904 wrote to memory of 2336 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 28 PID 2904 wrote to memory of 2432 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 29 PID 2904 wrote to memory of 2432 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 29 PID 2904 wrote to memory of 2432 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 29 PID 2904 wrote to memory of 2432 2904 JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe 29 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21 PID 2336 wrote to memory of 1184 2336 FUD Crypter v1.4.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a914e3a57bec131b8dfd01b3c54d2e9.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\FUD Crypter v1.4.exe"C:\Users\Admin\AppData\Local\Temp\FUD Crypter v1.4.exe"3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\FUD Crypter v1.4.exe"C:\Users\Admin\AppData\Local\Temp\FUD Crypter v1.4.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\install\explore.exe"C:\Windows\system32\install\explore.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
C:\Windows\SysWOW64\install\explore.exe"C:\Windows\system32\install\explore.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Easy Binder.exe"C:\Users\Admin\AppData\Local\Temp\Easy Binder.exe"3⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5141f49d1383476419395167e4fd14337
SHA1b26434fd73c0dc3e4a4d70d987bfd8a978b77b6d
SHA256be9874c4a61a55fa43e40fc8c826fc872bd068cecf0d0cbf1e99acdb4d473983
SHA5129aea1d374b0bd8e2f195560f56e66d81fe7200475859138ed247392010888642a2e6740b38ef7e1e06efaedda08cbbb61f211bb764463e131c956708e9ea2e16
-
Filesize
8B
MD5e95a32ea28ca13334a7df78d8fbee318
SHA1008a10a84b07a65ccb70c0f346575f55a3587ce7
SHA2561abe3b34e7769b72e325760b68bf5201345da347806ebe75399e77b4d31f1575
SHA512ad3441d62384f3697359be9d78b3c54a80fb661bf599f10b283e8574685729860e54d1a7e45366112078447bdb409e499d8f66aedf09f73c0b02f88423dda01b
-
Filesize
8B
MD52b3c64f287bf7d1f9f689ee3c1af72c6
SHA18c44261bf65455a1f7da20346e9fd2be4923fb48
SHA2564a10cec1ea4bd8698ae30db23b9d7eba66aa6e88e5d7d44976bafb3ba5afc453
SHA5129b6bfeadca9041081197423cc1fcc094990a700304b4f7eb532652db6760edf43fb4cc16ec0de2e88ae24832d9b2e3cfcbe81b02429a96e4e8946dc1dbce70ed
-
Filesize
8B
MD5775be4d3dd7d59a795010e08a67da3dd
SHA181aa5b5250a3022cfe196a567254ddda584e5486
SHA2566cc302e083db833f4c45689f00aed5f5d84b0b3936d01650fd5f60c70745b4b9
SHA512be052c09eaa903ebec248bd8c783656d49860c284f79004c9d500079243120d2e80a74ed9ebc2886d9321e6082e1dd6a96a6479cf718ccd6dbf5e41d79e8015e
-
Filesize
8B
MD58a88091d2d8733a99d09f0c1535b23b3
SHA1ca22928cf8cbc5592fb9a78b8d55cecd6bb0753f
SHA2569ba4d835517e0f153a6a4ee7f1bd853f6fc39c251edcaa79eadd831b1574d593
SHA512b1b458bfc1db41a077b6ad0efd842a44e0bb325b036d663f6228549455b17f8c271d8ab27feafa037aa13dda1d6008bb75c9026565b82188563658d3d6f1bb41
-
Filesize
8B
MD5d904655e463affbfde13d0a6237813e1
SHA1d7960f65382ba106cc90a59c11f91487fa176fd8
SHA256938d843ab01c26d9b05d9275990dd2e52e4c2ac685c97c115dcc86abf97dd3ca
SHA51236e890f5fdd29df941db9bbe7a31701edca7eb5a772c06405ee0737c6af7ccbe036a884dadcbb8ea397261dd8bc90ffb07e1908fbadeed94a550bc893204538d
-
Filesize
8B
MD599703c46130cd2b103fbf1692c684564
SHA1022b3ae51b8983a25898b1658a18c7af2a6ebedb
SHA256f0e16f6ad6167feb0e4454427abecf3312e284df63decb1a6f8151911722e8ee
SHA512c2cf795f7abcebe593f50cd3af7c6fcb80384348f96f61ecd4d13675089532c1c1a5bd2b24589fb84aff7fa6731eb6047275a10a7da80042b912d61ff69ff23e
-
Filesize
8B
MD56c0a9a8cefd072704308de8b85bca012
SHA1fecc10fa22a9b53d907adddb798401f3ce1b7dea
SHA2563e5953a5e9e9374d20a1549ca457c14f9ab351f8225b98afeee9ac600d86cf55
SHA512d5cf62554b88d437aa12e9b7fc9d309d636181e1903743ef22e5f3eca02290da75550d89d8c7dd9b05fc1c3ad8813e501810b5fb31ca4bb9f0c12ad2b4e4c1bc
-
Filesize
8B
MD5ac5a8320ed5b2f16a23162aa3fccefca
SHA123dd6ac0b52d4a87b04daebae269ffc3809c2b9f
SHA256fa55567f854ee53846033051192329bf63684bde5184905248295ecdf6ae7510
SHA512324a6752a7219d75a423c79fd272c416d3ab698f0918d3183ee8352bc98d1aa32aca6023c22a4c48ee32785b3da446ad9bf5175f04cc991ac64b90e76dcf85aa
-
Filesize
8B
MD59f70db5231722ee61399f6e963d10617
SHA16cc13fa4ed655e567b74572c3345c66e62f3b67f
SHA256a90369fbb4bcef12d4a6209babcab7eb09e343a8fe7d17b7b3a2193e60345c33
SHA51281221a134d30d58b0b08b4bc2a41ffb224d178de5c757836cfd9891a2a785ed9e8674e5da476eb22ab72aecd238ef650935181d29498d3ef361e19606d9bb242
-
Filesize
8B
MD5a21b542464e005ecd3b5e4d48154661a
SHA133b9428575aa99848f9c9e249b08b0e8a0242a3d
SHA25642e505f158d34ad8cb1b45cdaa87b08569225ab679402c34959b815605a28949
SHA51258ec2cc6a232aeedea7d507ffe283186fd9124e558a89179906b66a5cc9c268fa279e2b5a59d1b04e7b062233eb5b47c75bea380c1db0f8e8f88393d34477253
-
Filesize
8B
MD59179dfb3e81b38532efc2691241f4068
SHA1da18436b21433e334088bf4952d8b979900c1f57
SHA25625af8d9bdef676ce83b4e97aa732d03706b25ccce39781d7597a4039293b3c50
SHA5120d9c0895030ad0297fd81de6121ec339ecc7671704b94658067a859b34a340f91bf9b64bfa51bcd5d856cb90bce2e043619c4c608a87f2d9ded54977c78bd434
-
Filesize
8B
MD5dfd1d58e989976c2636162028929a0ae
SHA16529ea7a1dc722f6494c051ae65b56237a6ec1b1
SHA256a25a1dca4341accfc017e3d37e6ca0535d37ec4f4fee660e6bb771a40907ce9d
SHA512ac49a1d924628223be5708e53f23a605a4b6b6ad01f988828f69d1466300f1d3e78ef6d649d461c8affd86cc923747a753844ce0007331b36425b88ae00ba13d
-
Filesize
8B
MD5ea5c682d2de1768ef8f7b0ca058b9c8f
SHA1bacbbf4645dbb85037a924df090c7b8216731f88
SHA25624fb42365ca30c9f92ae38afbafbaabbf28ce8cbaa6d1ab60fb8769fa2a4f8cf
SHA512c840cd81c69e7ca52cb65d5031c7233bc051b43be03a1b72a8c57495a8f31e1042ae419d6124fc7a3d18335e6d23f1536cd143e21953ecffdfe328ebbf1872a7
-
Filesize
8B
MD5bb8818b166220560b4057a49735184c5
SHA18c3889180b63c6e85bc5d6ced849219165da26bc
SHA256017296b9d9e29095968fe78a5059374eae9418b39ce39b41822adef5404d2690
SHA5120d9e1079be4d7f6e894825ac42dbb9e2c58b23062eae8c968be8b6f435a668f2bbfdb9fbcebff4a79ef62f0065b042453af9bf74b204448d322dcff365945eae
-
Filesize
8B
MD5fb8701e44721e5c743fbed03dd3578cd
SHA12b9ac541d78a327f8ca50e721dfa914016b51c61
SHA2568be1c08389411ea4963b11c212cd835bfd70adf0228353f72f2d00b478965ca1
SHA512c5b27a85376f7665cd1db810e9cf15b4018b1715239cf230af1de2e33b60aab57f993c970b167ab56c8326b4949791359e81a322044da11cb4d884a42e830884
-
Filesize
8B
MD57e8184fd80ad33ac3b5e8a4c470a6416
SHA11e4a4a769cbc0cf35af0b450a2ec537357115500
SHA256bbc7d2c5fef16942949ee95d275acbbaac6a7f0e3b39b57df57c62545a1b7c42
SHA51289725857c85a36b9c41f316f17c492a77b4fcea0a3f21de3d74ca567a4e65db25f7b15af31af388352fc6a170ee1ef0abcfbac8f1e26e169f27797a32116bddd
-
Filesize
8B
MD5810245163b1968b4bd431768b604d69c
SHA17d7c268c4fdbd4416ea707c342ca47ce2cbe47e2
SHA2568802adaf41b45bd988f435b91ff1b9d4747b5828adeff3520b404cfaa7047994
SHA5124cb9162e76ef6379d460de844156eae860b998526f246e577d236b9852e81094dcc8c31f3d28a8cc3cfc1556ba2ee762707a33aa7042530c09d67ede1280651d
-
Filesize
8B
MD597c312bc4e9a6f3be4e3be7bba228a5f
SHA1ccbe99d5ace58e3d2bb1ce5953b19346546d012b
SHA25659cc44db180cbf3632a6f76466337fec13e59fedac9dabd0fcb351027052e587
SHA512521d0e54e77b4d4ab3519a03b934e0996463944081f7fdc8f9d4b6daea409c370b479f3cc395963f83b35c2decc62547eaeb79c4f87e0dd326c13ae48dd9e1a5
-
Filesize
8B
MD5b1bb431944fa29fe3b5ba4b11e4bd00f
SHA148346e736777b6a77cbb49e7857c24c659ce7833
SHA2566f678f441a371fc93a81b4dfa2610c0cb571ececa2f6c2dbfb42f03471798c95
SHA5126436e6978bd054dbbf33949d2c51a49843c7460121d256a9df72a1e46afa3cc40532f7c35857455a10731e9a9d685a8f80a122acb6287779472bef615a637bd3
-
Filesize
8B
MD5fff931a49227ed7b8772de2d73097b0b
SHA1308a99b8715bb8be12c7c225fbf2a18ee16d9119
SHA256b8d5b633aa51b14bdee2dbb4db85d02e3a5c4d6e1da406a21846d7d5f0d2b3f0
SHA512b3a1315c1bc2b7ce535d46da2978033092cbf33098b98d475799e35e455b277b75c064312225da8bb8e79ed4a79ceef42b56fbb5178c4190a21a0647dfa68fac
-
Filesize
8B
MD56e51d5a239fa75a518cbc6c5ae3e242f
SHA18dc7d0df0e53a3b8c1d34690fa1c548617bb455d
SHA256cb89c2b3c2cbd22898b63706668f12530f6821d34e6a7847458fd42dc50a5028
SHA5121ee3e96b21715407417b4a81237ad79af3f204e3dbff32c9c6813e9ec53a91f8f4c9625cbc4d32e0ec04b38dd25ad39bd0852a35d296c06afd9b901c7a2b0b73
-
Filesize
8B
MD52134d49b3f164db019634ffa36ab05fa
SHA122eef386f77482f72a291fa5c647301bea1019e2
SHA2563506f5d6b8f3a4f036ccd468e9c123545d854d8afcd5d18b372c704a1e124927
SHA512d5211928c1e6481ac5e24bf6cdee67d2ff8481e533ab71be86959bd9defe483b6e15ef93989edf13beeae1ece1c83654227b87c3cd0dbfe93a99bd97fc3ff1f3
-
Filesize
8B
MD5e210861b6f64607df5be04b11d56f8db
SHA18155aa984accb0fd4e82a516a3b772ef68e8be8f
SHA2567a6409ad8f3680741f0f293709f9a577570a9860d77b8b5842b4dc020e231ecd
SHA5128a3fbcf190b85f0a9eeb72b3674e6116c360b1e757ed0959443e195c2d37b3b03e41202de6b1e83ac579d1941f25cd29406270c159f82ff9116bd2c3428aa234
-
Filesize
8B
MD59d392bd1a2396188d24e8f23f60bfaf4
SHA1bf689ad099a4dea55a4c653e1d0fff2a012ea0c3
SHA2569f2c58454e3ae1d684dc0f91c4d2578eb7c11846d6edf08f6b15d325fce49b47
SHA512c577c13acbd79dc3c0e19c1f536321f761a16a112047c321c7b269b68879501c2c836f6e302031778b14aa2f907e73aadf6dc77fac72843fe916d52d1becca49
-
Filesize
8B
MD56b4d726104ded5a8b2c726898edee7ee
SHA1a430bd55a45ce16f263f30ccab57444abe95f726
SHA256e9ab8abb7b646ed10c8afdf118a8ffaad6b9346cfc8063904e0d915ffaeada29
SHA512e2edfe00e5fe60d1d599ec557f9df4a0ba16f0f139dbb56638a839c0313b3dca23cfb8900ff3f1f7d1818fb70b1c8ee20777924a1f41bbb73a12d86462f82bb9
-
Filesize
8B
MD5e5740968f493fc68bf2f8001fc0ab7b7
SHA17073b09a75d99fd707058ed930d1db44a59f762f
SHA256cf61143f4b26d0d4ecbda2e45d6de46f9d85f91c2138c6fa535d36cd4730b366
SHA512f086e09b867f2fbed73be3454bbc7ed8a2618bd099d333fef89807d64826c457583b490c8f9a832de9cb63157ce61268236c38908cbd1e0c62ffc2792f95cc19
-
Filesize
8B
MD5c5104d5dbc15009efc5c2c4e82b37e90
SHA1729f30337da056b0e571c8fa94d30bf60021c45c
SHA256e249d0b7fa42f9accc2e0cb3292ef36891a9a165051a3c207e682481d3e1c2a0
SHA512e2f2ffee3ebb3b01b7775704e79dd61da235638c8cafaedc838de7f19a0ceb516824242f9b872e469a56fb3d68580dc61c29f69f05e2955f3c65876ccdb881b9
-
Filesize
8B
MD5191ac3a4537ac3f05002d24c23244597
SHA177d4616178fbc0066b12c5c4bd1b7a80f4f6e2ce
SHA25625e28139b582a4dbfe0e7c5de33ff263912773ae8c537e9f2650cda68bbb83b3
SHA512833d18c2ecd84f8f487a9531f6e531a23933c6b6bbcb8a03a19f7243671f403f18ec000b6959699b25670111ce8716e67567a39f8278a2718bcdf21f887f529f
-
Filesize
8B
MD5c64235b049e29f4adc0d78d1a8c2277f
SHA18717dc903350295fb6e7311688ffa577270a7e58
SHA2562489fea7ac9014a7dcb79652dac7db4d69ba3a5735d395a68071b7881fffb600
SHA512e6707ffed06daa35c322377069d12e036f2aab16f8cdb1d03e99c7e3a588bcbf6bbc764f632454c02de4476f07638ebaf30c665435dbc876567aad35266f217d
-
Filesize
8B
MD56e5202b4a24c3603b25b075e841af5ba
SHA12a2cd9673be4813f87a33c0db50c7878988cfd11
SHA256a0046cdb1258a02ae9f82efd0d286e8ca52b0a7f861ae8f9cc277001e610cd41
SHA5125d3c58ffa20c42619d3c0370a76bc6d329ec3f2903941d4e0442d0a43d4210d8a6f2c885a4c0bf7c5df5029bcd26237289f6d0287f164c03dfdd0b951df6a983
-
Filesize
8B
MD5f4eceee6507a1f030e9b58a3adf04c53
SHA101fa7826e1a10f30e59003dca30b70aa38c79ce0
SHA256d3c4b8572af752cc29931ac023993640fadd48604c99319e46b2d1c7b294c5f5
SHA5124c2f18bc41e3798070e246701a989b949905ab9023435a3452b4ef4fd138a28fd3c21ba27021237a04759fb4f4ebf4669df36b40c62fa4d1150be0b6fb9ac5cc
-
Filesize
8B
MD52000c29e0f41d440749f17c615306e42
SHA1bac42c90bf616ff97ea4ccd1cfda9db300f9bee4
SHA2566c7249fe851ffec4d93f700176ebd14a68eec8be4e798d6875ecc479fbf212bd
SHA5125514c7c9a2038bbd534e9e53e396cf019ee61c849dea44a805236a272c811c9899760611a72df594870a20751e6e5685d11bd8f62cda0577f41060c6e41f6e4c
-
Filesize
8B
MD58ec6d22d8abd4cfdddaf744d4e7ea89b
SHA15f1ce092fac519f5fafa9acbc56c84ef2ec7d7e9
SHA25686720ca1383f8d5d089f0fcaad421b798f2cb31ddc26b199104f30e0f46c6e7d
SHA512b7d98be1d073e89b7cd6376d7c47972db95185911057d891e9c7bf5f5fa064ffcbbc03b17fa13e0e523f83b893392401ef64ff6b5eeb9da8f8b69256aa4407e7
-
Filesize
8B
MD5ee5d1f4a1cf45adae28319561cdee13c
SHA14120ab37d134bba505b36a68ced259e93d17f851
SHA25626850bbc2ffe85fe1c555dcc4bf009b75c41cc8f043471de458d8b16bbce8f88
SHA512dd99f035d3d4324f72d39655cc5829b2fb4b9ae03a822ee650e310971b943bd7e6a4966b49e3c1aad2c098e437ca5f902ab513d280211f25f90ac55ee6642eef
-
Filesize
8B
MD54b0bd540cd0ae8941469ceef0c492fb1
SHA194a7f3c5b0a64e545dfd8f10882195e3a411322f
SHA256dba9767a019ba5537617d44bd9cc08c1c0667f54385277821a66f97e1965449b
SHA512e286af6ca545e960b4ec81babe68035788088871fba656064b1856bfce724972106f36b7ac1dcfbef0a968ee2b3dbb8feac8866f8e3b086e4280cdc95e5978ba
-
Filesize
8B
MD5159768157a86efca95e3bb1d8e634753
SHA194469d5c080898ba03d783ae76daa06ceb019491
SHA256b2c87684d97ecc1d76488160b304b075d78c3576c65499b0829a1d8322012d3d
SHA512401cb7381eecf081df9a04c9f699bc8922cb852091a75c28586c6940e4e78240e56413bf807c78c40a4d9ba964b71f56ede48563bee5e224369559ec9d590d1a
-
Filesize
8B
MD5e7592f92c94e4b6b1615ded166d6272f
SHA1ab70016343fea68ce7f65d12d85854fd67dc03b2
SHA2566a5d666d13cc0414f3bdd885782ae4066a50fbd68473942e1e6cc0dda2cc4041
SHA5120e2412133c6fc6cba44021161ccbf4dbdb6a1292d414c55a5c3fd5cedbe7a90443bf5cde92b355b7c5ffaaf14ccf286e13f7a9eb4640bede619fd445a92efbc2
-
Filesize
8B
MD5f0d913d0f078773e909622d860dcbdde
SHA13231c25236ffd08761fa903dcfcb3f421f5a3e43
SHA256388b207a417992af9c7b6811814e3e53e45168a61d5596130d8c50749a7eb081
SHA512edcc68677b494fcad00ee2b17c23b42f815fa69d4aa55a3eb6c32d1ccabd3199a9f753a188179ce997d21d765f4861d27a2fb07d93739983aff30d3a6ee02af7
-
Filesize
8B
MD535cdbefb7aa0d52abcf31b3e649b4a6a
SHA17700ac67f2c845d788b9927a032c84cf7d66223a
SHA2565e140be4757f88537247e7ee45843ba1a28834498ce2da0a7b8365897b7deb54
SHA51297829ff2a1dc47c0e555701958ec0b36c0dff3730870b1262493ffa876fdf0a5885f7deba7133ad3a8e6ae16b8745d3439083c97d6c310f3db1c9c7950dfe697
-
Filesize
725KB
MD5df21207322bb1e8511a824107e852e16
SHA14818206adb4235428f76954fc51eb319215d8147
SHA2565eab7cbc6741aee4fe457138732e8f07751ce360aba25f973e41cf96a6b880b5
SHA51285981d12a547a24d4218479aad1ec0ad72307f931456c9eb042a2c1647063ade23b2c84229fcb1c4e0c6fc498562fd24eb0d8c9afd46243223f7f4afea2d63c7
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
2.3MB
MD5efbc9f49dd2f2e1088cdcec3cf35a41b
SHA1ecef7f277a50420d08fa7a9e0cbd8f37faef3394
SHA256cf28de8089bc70759c9d524cbbac2c3d46c4aed10ac57f622086e71032226295
SHA5129506331e80d4027e6e8c51ff8424ebe45226a63ab11a7bf228a4e1c5ecfe97606f507b47470e5015baba5cef5cae37fd7fd3caac7ea55ceac4894156d10cc665
-
Filesize
1.2MB
MD5180ac417d41c01b6d3de14dac0d11134
SHA1ca20a6fafc4f7e25469a9bf98acfe6f9915c6161
SHA2569bc95a4c55c32b0279cde029df33d17eeb6fe3b2d40aa2bf63b71cbe48d6b1d7
SHA512a8e02185e98a27724fb0a13840c3c9e26292d9a16b7735bc945571202f5094a4a8b0b2eea9e3ea00df4d348b7af3d87aaa1cc69ae1785fd574d8d947476e5518