Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 02:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe
-
Size
344KB
-
MD5
4b3832d77a56b1aec0475ecea63e2530
-
SHA1
1fd692286b788b7a50ff0de4fff8933ac3868863
-
SHA256
6bc2f7766d637c77fad1088d171fdd57b33ec9052d88aea0382f674e56a13b4b
-
SHA512
1470af2fef81afbdcbdee41f1e91d68ced67ff1683f6ce95c287a8df57639291ffbf43f35d01dd993bea80f5267f81c9c66672bc08b3a31d7a82e5142f6d05f6
-
SSDEEP
6144:cQf+oOIKXOUSdaV8ekDiNiaROjXkqGKPHkirffY4mLH0vmA28p/k:yoOxOFgWPaROjXsGHkirYJcmAP/k
Malware Config
Extracted
cybergate
v1.07.5
wilf
wilf.sytes.net:1604
EN6VS20IWBRSX0
-
enable_keylogger
false
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
ERROR!
-
message_box_title
ERROR!
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\WinDir\\svchost.exe" JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\WinDir\\svchost.exe" JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5531W55V-MSFI-5GIN-N40I-TV01X660514V} JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5531W55V-MSFI-5GIN-N40I-TV01X660514V}\StubPath = "C:\\Windows\\WinDir\\svchost.exe Restart" JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5531W55V-MSFI-5GIN-N40I-TV01X660514V} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5531W55V-MSFI-5GIN-N40I-TV01X660514V}\StubPath = "C:\\Windows\\WinDir\\svchost.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe -
Executes dropped EXE 2 IoCs
pid Process 956 svchost.exe 3452 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\WinDir\\svchost.exe" JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\WinDir\\svchost.exe" JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4704 set thread context of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 956 set thread context of 3452 956 svchost.exe 89 -
resource yara_rule behavioral2/memory/4760-7-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/4760-68-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4960-73-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1548-145-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/4960-163-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/1548-164-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\WinDir\svchost.exe JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe File opened for modification C:\Windows\WinDir\svchost.exe JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1620 3452 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 4960 explorer.exe Token: SeRestorePrivilege 4960 explorer.exe Token: SeBackupPrivilege 1548 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Token: SeRestorePrivilege 1548 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Token: SeDebugPrivilege 1548 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe Token: SeDebugPrivilege 1548 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4704 wrote to memory of 4760 4704 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 83 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56 PID 4760 wrote to memory of 3436 4760 JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe"3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4b3832d77a56b1aec0475ecea63e2530.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Windows\WinDir\svchost.exe"C:\Windows\WinDir\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\WinDir\svchost.exe"C:\Windows\WinDir\svchost.exe"6⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 5527⤵
- Program crash
PID:1620
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3452 -ip 34521⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b1084d17152edc4d9306b5464e0ef4cc
SHA1d1c191b85edc64b48c275c5f466bddbb7d302812
SHA256705d6e451e6042c7899da919fe58ec7a30b9bb1fcc2f77fa3343bceeb428c2bd
SHA512d057372fa32457c5f47df46e7513f51a67cb2fe40b8851df01ae36a5c3c39ee9b5f51affa751fd018a2547995c13f9c599bff13b362006e50413a0a3f29ffa87
-
Filesize
8B
MD52fc5a605dc8f5e713b29b89b71271129
SHA1bfe82cfa27c04dadf7494c6e3279aec82997ccf9
SHA256ac93312cf2758aace8e1b026c91f06a621eac712297103a184277ecc573e0f1d
SHA512411b9ca02a71916d2e45f0805ffdb90ab06608442cc819bc35205fddc7b65d8c1a19b75cc55154d6caf48f6bbd1c4e6547df56faf04aad2cb128957c3da3ff2a
-
Filesize
8B
MD5afe9ed236864c567081918f688468359
SHA1f3d395a71e955955f056c341fcb416b2e7b8fae9
SHA25697ef4479de5ea87f774e1c7730c7aff2f89c7e2ab35121959730345d487dceaa
SHA5128af2391619c6cec5bd73d4e813c8ce7d98ba5c31c69be1b71455e619d21788f283d8a73d6fcded167f19e6b0eedab19a5a9885cbeee1ea83becbb10f9811f263
-
Filesize
8B
MD5c12d50f2bb3117c437c07ba6b9c2038d
SHA18b808da6ea64ba392a27612ae222e4316472a3f8
SHA2568a7e7408958245868a362c784d8cfa8f6d6595f321ed0c1a98b2aac2121c6a9e
SHA5126dd77d8ccce6c0bc82c5574ab6c553060ec9cc4cfa5a3ee0afb8752af4347fe51e1965c74837d4e3cc6e20709cc37945167d25c31200a9a893d6d742aa680822
-
Filesize
8B
MD5716299a21e512010d13414221ffdcd81
SHA12971256bc0aa493682cb0e11ee6b46c95c7da1ab
SHA2569feefebd7b40d64bdc199583b8245abbbc10e1b2047a4e600059e57aa2ea6cdc
SHA512f95e6f1763857cd3a175f1ead0f7c6689452381f22461285f79e190e02b740973a060e94e031866fca4db4dc3860c5f6b5a5bd2d4fa5bed4e71963732b3a92e2
-
Filesize
8B
MD50bfb8b817772482be703c4f93b0b6d5b
SHA13e0c9584163c4af584afda91c8155ae84ab38a03
SHA256a7f2e16238bd687592e9f2c292ccb3d47b4b5362bf3ce6f8590935cc475a0fd9
SHA5127f0c4bb6e715337b89ef53edac9fb9e3bb2cef71ca9badb340e11c1f894115ab44ec27cf455bbf6ef7ff0c86dfa165a647fd4e22604f2709b12db8405cd9ab2f
-
Filesize
8B
MD5277dc0962568fc9bb64e653f62da0d4c
SHA1375a4a9fcadae1b6f0fb37c98754e3aa3ab87872
SHA2561710b07f83b41c234f0b02be7eac585e9921e43a2e2c3c59125e129f3cd2c96f
SHA512d63e96eba6e4e8e99abe42eb81c91b47dd556b53eab73a507e192c86721e2ac162a1bfd0022124d42e57639dfc5929b794304fb4e8ca54ca15841a0556d7098b
-
Filesize
8B
MD5918f9aa6514a1a51423c6bbb8d30d54d
SHA10edd1a9e5dafdf2f5102cd353da2f938f94e7a26
SHA256d8ce60f826e32f1ddafa9977bb3873f2e08f2c08c2f8b71c1bdbf14f4af1ccc9
SHA5122343319ef0672ab2305d874e36286cf66410d64677b02b3544256fbc945bc621853367feecc2117c8b2fd844d67a40b66062368c2ecc2d7849cfb724e9e187bb
-
Filesize
8B
MD5af30df07efc21106beada129291da9e7
SHA1461054358cb4048c8a7d7043c7dd1e768b82b28d
SHA2561e7563dfd8d94a47660fe75c67b7cd0150d91ff689b4d35fa172a8ecc03fccfb
SHA512bfaeff388e06b715a7f5b420b7f15aa65e1bbb0a0a4ec446b7049805ec15b316cdad5aa5533c097e2a918c5981b71e8ff9d1d74104d6d6b2be4b5c7bd609d875
-
Filesize
8B
MD591bde0dd1e261f30d2ebf15d81478dcd
SHA13730cdca6648b36d9e11879c03828b40e31e567e
SHA2565011939e91da84109c4507e8f17441817384eb10679f8d49cd191762bdb93e1a
SHA5126d54338dfe50e5b6892fcc9ffe006401b043b3c01e971b8f745b487c5dfa59eb423ed9920154faec9020eafdeb51a713ed2e3c88f8fc8bf92dba4f7e5d4ea299
-
Filesize
8B
MD5146c458500faf57035cf51d711033449
SHA192f195bb8d3f9ba96a971cd725c121d450897bb8
SHA25673287f1e3a6b6bab6aaf444150ec2ff7c5cfeea4705b39c33981bf93d96f4c64
SHA5126a871969a0a2724caea86d4d416c188346f1718fe1b7d83d996a0d4a36cbd6e86fec94ff5fe5bba1d97130601748274c64aa264bdca7e6bd79e1a09982a34271
-
Filesize
8B
MD5c941882041f13f0195a5f187dcdbe868
SHA14eda623b8629235530f90c9efa8f24fa2dfd64f8
SHA2562407027d99c0ad8eeaf81578514a4a3599fea371b794bd4d4825801f9d00a0a8
SHA512c635b09bf32f14d961b994d325ce77b9c7a88a462fa7ef9a26d94362dce8a57854c406f8170874956c0a9dde2b1cc98f2763b3e73778db4a8b07e7962faa2216
-
Filesize
8B
MD585a819b92c33ca148d70cbdf16faee0b
SHA1fb2f717f5644b966af0bd05e9d105c8b03b9ce70
SHA25642d3ca290c95f6b192a7e5be0832ce0c74a2a52cfc74fea852bc64336774a32c
SHA512708cf4818aa3553ed86d91ff8b6fbe876decbc8156526538761850842a52d0d8a4a8c8e5c2b4b62679f0fbff42d4977c917d12c226854b74c412b3a6805d5ff6
-
Filesize
8B
MD5f3e80fe8047b8e942cfdda43352dee7c
SHA1b5ea4e8cc32cb43db2f953c4c093fd263eafb607
SHA2569e6f4fc91b8e1d575de49fd282d07da6cb7de039d6a4618e9a821b16065fa602
SHA512fdf82b68fb7b31094d4f0e8243b8df4e300f3365cb2970171d2216f66abce942ec3cdcd9cb2ab212760e44f2a46cfe07d5f6da975c0cdc4229926070da548046
-
Filesize
8B
MD57af3309424f62b4511f5551353b19c15
SHA178ed3eff9419ff109454506da0df06dcfb18bd03
SHA256a1b52406182c97b0bca78af62da83250fc67d13bd8711d2b3a8ed449ef8c9d53
SHA5128d5ec67ecfd466df09a7e5b8a3b17af074008dc722ac5e4a22fd5298c73371133a3bdc3ea5c61a3453a07d9201a8d79c59d9c9b26207f70be38ed53e9774dfdf
-
Filesize
8B
MD5cb46f02f4e9581f1c9e4f48765525f0a
SHA1adc73c12b82f75bd942877469c36b87d5954bf4c
SHA256e4b96af032ae8076b62ba4e08fef041c06787ea4caf85ecd58963695daecdaea
SHA512d990b818abf79ec705f39ad68b4ea4025fc6ef071b0b50441a4a8ae9fc2faeb616a2239d5bb98ff7190540f573b7b145f877d11bc9bed7407953c2b79fb538c6
-
Filesize
8B
MD50be71902f6165c0f4cd3792878fa760e
SHA16efe87203453a91300511120594b363a883e1497
SHA256d88632cd17a02f4f023d5cbdad67023ad738b77ced5c2848c6d66e411d3dd0b8
SHA51275fd68bed98470566792176bdd3f6220c7fce9e068f076bc3cbe568b05a68749041add033bc2394d1a2646182d5803a942ebea6b2204ac8896ca1c8fc5c38b87
-
Filesize
8B
MD5401b7ac0f71db723037c3ad3a4b41be6
SHA19f2964629d9330528b3af5d6132bfcac3f22a7a0
SHA2561a625f692eaf0388c3a2d7bb035419b8463cb0c2272f537f37b06197fc5fcbd8
SHA512a0d71f26d4d60ebe7206c2fb2f07702f8c94f0581953aa6815208b07ff01a80d2ea11007b12e02d22cb18a8ca31d41261d770fb45d195bfda9fda779c46e5f94
-
Filesize
8B
MD5485e97c1188d6555481fbb9a290c86a9
SHA17c7641b6be9da3927c4c0cd50f6651ca68972a9d
SHA25655b1ef95c51aad236985d9ba7a42376cd96fab5559646641d20eda31f38d406e
SHA512130715f88102677d4beac8ed0bcb939fabbc80928b8020c4ab25c4afcf9562c3cfe1365e1c31552bac4115add93f1584ce97962e1eee582626b2d46c0554fa73
-
Filesize
8B
MD558c94be99638c1fc7358418817ee6025
SHA16d19378366cc118db6c334bf3eb6d789e3ad618b
SHA256a9d2414f066e971fc668f29b11cf1d3ca21f3cbfbecc40fe80cacf6dc46dc455
SHA512d684eb431ff069536351de8bf747679fc0c0bbeec6b13c209f969e9cecbf5f9fffa91bf58920c1649227a48857c1555a901cd2dfb5056d6974ab08ebfd795c22
-
Filesize
8B
MD56020d0894fe82318f82fb6cfc87f8ee4
SHA11edf9bab65c1e0f8dc387297964f867bf2dbbd52
SHA256eb3af4401dfdf57bf351041461b6d5c9f6f3adffccc2ab85e253355178545e28
SHA512d5b97a5adacde71936feb15f7cae455cea4ce2fdd57791f387f35f1d9eb11929f51f1e04ac91ae03ba35f7fb7bbf144aba120589b14430414f3554b71251d6bb
-
Filesize
8B
MD5c5c545bf0d22ae5d84bcc6692a79975f
SHA13cf368cab28312e0425bf078a2dbdac8386243a9
SHA256b117b3441744cca1524ccc3929ad99e53c12821721ad969327cfa6aee19bb3d1
SHA512eaf20fe65c458186d720d04abab2a6feaeb4bc35fb4d93c72292a6c8409562b4480d94848e99f75b92bee1efc57c99b94160b56989d33bad76baebb96eca5a67
-
Filesize
8B
MD56a6b6bab0b5a281582409780eac996c8
SHA1789d29d154cc5bb1435fbe0b51922a40423ff4e0
SHA2560c8dbffb9b097ee5972698f5586f3df04cf8c4c2bdb60de297607ba4b847dc16
SHA5124182a622d12a0ecf79caaaacbd4393b9cbf0b9dda72c08ea431b07e704a645a6b2074c0be733dccdc010873542729184bcf329bf1352546269deb953a54495a8
-
Filesize
8B
MD57e2961637fdfbfdbe65906cda8bb781e
SHA15b0392de73794b3f3e6dc7a6681fc5d780ec7ead
SHA2562b5fcdf8ed3588565a227864b6bb168aa355962f7be305803f41367784837752
SHA51218fd9ce86afe0679edf89fa86f9448e2b2b911199adbd4d815c44754eb38b67a751b07edcf3723325ce5f605a2174ad4f2dd564b1f9e70e0871e8e6a56e5a6cf
-
Filesize
8B
MD50cc6e718f4310cbefec95febf8865767
SHA156d37bc96fae64a5b60f2c7d63517405349e1e1d
SHA256a3ba0630b2c0bf3dd956722bc5e1a00b4fb50815c830814096c32638e2452a9f
SHA512819cfbfb6783674c10d33cb34f5e75d1eef229807e93774785634cfa21bac0e22f6eb86f5251383ac8a33c69307f215693af0cee9923383d2f6581867c838f8d
-
Filesize
8B
MD54d2b4d70f9cdad734c4f1a1be29f7d62
SHA15811fe488cfb7c15ba82e6ebd2524e428ff9593d
SHA2560dc3e721f4d84871a7a3bee5e50105f723f74dde6c053686303958a4048f4356
SHA512029178481062941ea68119580204350c20f759bdc5d986a62c70079e23ca004a83e45f1bcfa0069573dacd61f90de36dfca72116f61f45e63f4543abc017630c
-
Filesize
8B
MD52a901fb49669ed4429e0e20d321f8ec3
SHA1ca3211cb275aaa169ef852583ed39dcba922b0f6
SHA2562d82237bf6775cd799cee291caf557e05bf8657e77ff15ab269c63f70d055911
SHA512726a9d1dee7a56de3197be80c03d7d4d5233556971b0739761995dbada66995bfb218b77548339f4fa300fe723a6619cccefe2c5607caa76112ba2ffac370971
-
Filesize
8B
MD5c7fd5829bf6bb259075cbc34c4de5bbb
SHA157dfbb0a16e7953770161502c614c571d995afc0
SHA256333cf46ce6b3f3c9058439f15666f12c23648a9cace8dc921532a48cde608267
SHA512ab5073fc07de6508dbad98fd61bf93fd32fece17fb16ab2c49b9ab244a27c35234ce1f6eddbed7b26e5518d01b43a71a14163e9ae8dce33435679fcb7b1e2197
-
Filesize
8B
MD5b0ad7be590d279face98c7f6c0fa3f36
SHA1946b73cce66887c1d7fe6566398f649b4287e3fe
SHA25693d5c0ee42b51d2e85b9bbf42fca749761daf547700e384e1c56d82e314c7b87
SHA51290604569630b1ed64e43ad7ffed67fa6f3d125246eb34395450a144c1b667a108fc5f810b4f5331dc69ff4a75bf793b1aa655ce9cb0fb941915e4b6fd847fa96
-
Filesize
8B
MD517075040fd7093fd36864632e7c37dbe
SHA13cd591d39c0c4648cc4ba121136294e513c73d15
SHA256ff5bee6ac786399962c4d958c1ab32258d77138410a0ef5295a967bffc39a027
SHA5125e81adbf0efa071da5d12413e187b87bde8e3130dde8743ba9a77a1a1272be1a3bfaec8386af82eed94e21e4a02ff296c8aa12f62443d47e72291ce1bf17c11b
-
Filesize
8B
MD587bcb5d5c62a42f31904ce3619a25f71
SHA16f5b7de1cd9b12a3c6ebbb32ed8fff5c504f5bfd
SHA2562d564d6c09c88b637f5c997c1b547967ae6cb2382daa53b0501555a0398d1746
SHA512b93321025e6490f23cc7d10eb48cd9a3d9e8fa71beb11e5257a1145ed7f795eabe51bcfcdc947b4e8dc7ef3075bacad47f2d364276224251c001bc5d7f31a329
-
Filesize
8B
MD54476454952bc54b3e0466f3e9699f31e
SHA15b0cb625f111007b1a1feb97940b4d7cef78e76c
SHA2569c9c1d76c9252c0ffe1d1b0f8475ab009a8c4b1ea321443733ce45bb17adf455
SHA5125ad5a0a7f3b4fcd2d633be555703cd479b9b0edc39d5782b360790d2a55704ae3575e832736adec66f276e8fe1a7a018a9f87c257c5bf975d89d3c1388f5a95f
-
Filesize
8B
MD5f176eb4c89ebe82c9dbb8f8f03d2fd1e
SHA1f2e16255376276e4fd12864a9098cce5fab355f1
SHA25659c893d59ecc9324ef2647e79a2160fef5d7188df0be56e2d8d9aa2db627b58b
SHA512eec1f54474bff5f8dce2ba9ea5097a73a28a32921695e7e16639bbc25af96930d628fe32649af78b8609e5785408c9ed9be3c936818e5fa090a27aa8681a3bc2
-
Filesize
8B
MD5a2ed7317103e49982d5012bd459f764e
SHA1a0ac7114e7acff5fae1c89e440f08fb7f2b07607
SHA25629e8aace94ed0bc35c020271828a1d6938577a9274b2594e317f017e566a9bfa
SHA512aad878f9ef0081b48289f66d17ed2956421a97f50b9dd891a6eaf412d04e46b92beb749958269162bd2871bfa17a989664d2990ba91c1ff94afe432f3a832cf3
-
Filesize
8B
MD514037396c881d0069426fb06dcc48f73
SHA1f00f0dbaf937dfd2fadbb1a1266072feeb415784
SHA25691a50e2e596a1901c9164224a3a0a98806b9d70f18cdf3c3302177683c4f2810
SHA512995b78af21025f99b2f6dedab6d6efca9f846d6a4bb6209d6da38d3cf17ada0f457b96c0814860c73a4387d86d7f9eee660ede278bfa02d0320f2d7cb6439af8
-
Filesize
8B
MD5300e50e43a1ef4ab507edacc9b6a18d5
SHA16a175eb62c2b4503db94ffe3700031b7c72f91e9
SHA25615cdc7bbd24e1886e001b4438c32d9031f8288ebb6f6294c2e5d9846223accff
SHA5123359964020dd817849f5f7035732a40feaef293307cafcccb710c17681f9421d3bfaff5f699176e7ecccccdb49c3902fcefc82b7ab26835bbbeeca33becc47e8
-
Filesize
8B
MD571df2fa729ffc57e10052f948c08c16f
SHA15a6350024600bcd8f9ab7441eae5342d90e76e89
SHA2568803685e273c7f565a407d302632ac2c76917418d44338ce23bda985941e6c8c
SHA512b2111c2130be2f5f574bf1cb00f122027acd5858252234ad095ad00821c4aca6cbef06735aef2a9923fc3e574e02c25027e75d4e51d2231835cdd66f29a8df12
-
Filesize
8B
MD544d670b15a682a202c5865fc310afbba
SHA15c3ab87131287efb0dffefe1858cdf8425bf716c
SHA2563c8516c66cb86e9606ecd7beab3ba6ae0f9965dedc237b8be900bcbf7a5ffe60
SHA512463baac6313fe5d39cb4dcf4ca8bc11daa781c25622e3659138b74883f19f41f7806eec1d07093a76dabbeed5b033e909364b09469fc51c0d11b2b9aeabcb116
-
Filesize
344KB
MD54b3832d77a56b1aec0475ecea63e2530
SHA11fd692286b788b7a50ff0de4fff8933ac3868863
SHA2566bc2f7766d637c77fad1088d171fdd57b33ec9052d88aea0382f674e56a13b4b
SHA5121470af2fef81afbdcbdee41f1e91d68ced67ff1683f6ce95c287a8df57639291ffbf43f35d01dd993bea80f5267f81c9c66672bc08b3a31d7a82e5142f6d05f6