Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 07:04
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe
-
Size
290KB
-
MD5
dfbe920bd7d2b8ebf6bf42785477b069
-
SHA1
395a87a9c6cc7157d1b58846a220eba63a95af04
-
SHA256
67516c1d5d96b5a45dfb77fa435e136971cafe6698d4658c0ff979b60873aae9
-
SHA512
1237c4762e0cdf72bfae30915a7bad5df44d9cea7400746006ade3ff2e542b0280485157b75b5a4ce372aef25e00ec171a0e5eebbd712609f414794418150cf8
-
SSDEEP
6144:Slgs+TpSlqlhdBCkWYxuukP1pjSKSNVkq/MVJbg:Sus+fTBd47GLRMTbg
Malware Config
Extracted
cybergate
v1.07.5
System
notti.no-ip.biz:82
PBLFR60V2J5HW5
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
Win32.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
080293
-
regkey_hkcu
Win32
-
regkey_hklm
System
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\Win32.exe" JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\Win32.exe" JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{WJ52EVO1-RWWK-N2T8-8R0F-B1HQ7F052067} JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{WJ52EVO1-RWWK-N2T8-8R0F-B1HQ7F052067}\StubPath = "C:\\Windows\\system32\\install\\Win32.exe Restart" JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{WJ52EVO1-RWWK-N2T8-8R0F-B1HQ7F052067} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{WJ52EVO1-RWWK-N2T8-8R0F-B1HQ7F052067}\StubPath = "C:\\Windows\\system32\\install\\Win32.exe" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 Win32.exe -
Loads dropped DLL 2 IoCs
pid Process 1756 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 1756 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\install\\Win32.exe" JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\system32\\install\\Win32.exe" JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\install\Win32.exe JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe File opened for modification C:\Windows\SysWOW64\install\Win32.exe JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe File created C:\Windows\SysWOW64\install\Win32.exe JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
resource yara_rule behavioral1/memory/352-3-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1808-522-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1756-852-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1808-868-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1756-871-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1756-872-0x0000000005BF0000-0x0000000005C3F000-memory.dmp upx behavioral1/memory/1756-873-0x0000000005BF0000-0x0000000005C3F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1808 explorer.exe Token: SeRestorePrivilege 1808 explorer.exe Token: SeBackupPrivilege 1756 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Token: SeRestorePrivilege 1756 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Token: SeDebugPrivilege 1756 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe Token: SeDebugPrivilege 1756 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21 PID 352 wrote to memory of 1196 352 JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dfbe920bd7d2b8ebf6bf42785477b069.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\SysWOW64\install\Win32.exe"C:\Windows\system32\install\Win32.exe"4⤵
- Executes dropped EXE
PID:1308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD54297bdd79e26f2fa15ab4c7f4f0512f9
SHA1476c2802f4c82e306881c2eae370d97b387f474c
SHA2561286132147e9a9540fb5f0b9f02baec3e0ace16b776a79a48ce3ee56190b9499
SHA51266885de00f3fe169d396886ee2d6c78030e2743487ae2a226b35124305e61b24f9131c1bc239bb9fcffc62399093acc4189eba7f50e328382d0a65f51b0d1f3f
-
Filesize
8B
MD5754ebd9324571b9e2dade489914943d5
SHA186164f804f067bceaf49c4e679571dc15736a522
SHA2562eca1e22c8443f050e069a0921fbe4bf031162842ccf7a277c1b5966d14e306b
SHA5127dcd82a200dae180b75e30da959108905f46d514bb5078d0076cdc0830954220479067145fba4d0a2aff4c95208135d102afe596a66189f49aef653c8a94b98f
-
Filesize
8B
MD5a6975c848895405b4998bda4d732d17a
SHA188dfd7f9d9263e175dce3c58a630daf45f2a712b
SHA25692e850d162c01c788a9cf79a8dac7099ba813983da9f8aff283cf2fdc76f6548
SHA51288bffd8b3b1cdd09d4a2e21d4e2200a53f6dc5f0cd4ea7701ba913ed595b57f8e952c5ba9aaa4e66221c63e532e454aaa0317dfdd6ba602857fd25a7e3bde316
-
Filesize
8B
MD5ee7cd98e7ffb452d05adadc8479261a8
SHA1578219f24f3e89f3298ce05e9e5604430f126024
SHA256dc1aa0e27aa6ebd8acfe7ff182757d9adf226d66baa4c46f60619cf6bb35fc1d
SHA5124445777431f793242a383241e516c5fa82cf1e919457c57342752af36c48db6cfe4ade83ec72b33781ba2f579f7800d494c2bbf31fb9d829ff612e6b838d8727
-
Filesize
8B
MD5cf0b82ca6080339df1d940957b48f160
SHA1a028baf0abe81c1a6f4d5d43e759bc3d43e16f0e
SHA256bbb7142c1b85a146620098215bb9af24cefd3f93b45ae654f3bd4e3ce5c9219a
SHA5123299774f7ab9af701856ba5aefeaf96b7d57843991ee17bd6dd70ab4db3a22a1619633a50c2720890cf86363b391bda9689461ead4bdd7a4d8938b9911ceb0f7
-
Filesize
8B
MD5cdd2177618a8285a9baa281d9f887104
SHA1995eaa17eafbab123870286b9a46826e7a0e7b73
SHA25684b5c6637848b6dd3d4cfff3798c4c0378b26f8cee3e2e0acf6717fa10379abf
SHA5120197b7aaa7190ed3c177159877b833b2f6efab8187938d2a43f3b1c55a542ae9427c8feb0fb4a209078fc33b4944b4ae5e77e513f5e5dee11d84f518f25d3271
-
Filesize
8B
MD597bfa1ba0a8c5c150fc0b1ff79d087a9
SHA1436c45c60ed2e4403becc7a4fd668dc192fa228d
SHA2563faf20fd45dfcc18663298515e07fc07814f755dbdb0cfa656c24d215074e5c0
SHA51292658b7ef9def0125b1fbf4dff29922845dbea3f112e46be9be702c5808bb4dcaff496dd0b4e9a5ac4794bb7bb80814374b6ddd79eb84a2cf648bd471f212971
-
Filesize
8B
MD50721323fcc31f2e73ef04360eaa55a36
SHA1f74cbbb41c5961b01aa6333f4b9ecc2bf43d0aee
SHA256227e2c5ffd23361f111bd014f75347393e500682856a0f66be21b596437b239b
SHA5123595ff19f04ac63fda84866da7720da31e4d472a0804bd9f6dcc87a9f5d020030bd6733350fce87fb7154b3cbcaf5af26c1c549082c7db1bb1fce7931da141b7
-
Filesize
8B
MD54d7c5bcf5a7cc07ea81d4861efc1c6b8
SHA1d78c2071a9d0a693940b0da3380071a069279b80
SHA256162d1fe2b9a9c265cbe9877aa75710334fdf95d36ee491eeb3157f6b4374fb80
SHA5120300814ff5305fa6496f164040932be93593cd2c45510a70f9782353e3b8cd3cdd1b4ff2b1fa14e5e4c92662c774c274974049e697d4ff687c3342a6bcb59ccf
-
Filesize
8B
MD551e0dd2b6002f75b4151daad3b5c6bc1
SHA103878937789ad3f3aa456f50cbee0f57c20654b7
SHA256b225354d4d309484ecaaf8bee8dc59c665d381d2e8a5f134f18ec18a2a1eb855
SHA51284ab29f38cbe6204b94fb0210ba0d2b580123e2d79751120cc81fea9f43aa2fb46a0c672ed1b90b5250dcfdc25cb3540a869c6419fc1bd59adcdd8be28fd154f
-
Filesize
8B
MD5637e94f177d2b913ae45dd6c7b78d36b
SHA1a5e85b3c5c3dd645069998f73a25f59a9b7c4ede
SHA256fc624aec167ee3f81872f07454d7426c1a50680f3a1b2563e6581624a2ed660a
SHA5125db2408870012f6813af8b7146eeb75e67bcc2095182b40aa124bf43ae60568fbf9741368247cbc934ed3e5df276b1a82bced922265224e77e4867abecb97588
-
Filesize
8B
MD593b2f0bcf407572d539de552b773a93f
SHA12aa45aea433dbbb3ef411ec09fc1386a9d464d3d
SHA2561be345e5798c5e7fc38b8430b7a34e02934e54b68da4191b83f0ecb2ca24840b
SHA51288152f638702f8e4dac95ceff7444ad0a4085fcc7a4f4ef4411dce224366da45a4c770b90a6cdc5be53be44214cb3148cf02e88dc1ec6131317a102a5c655315
-
Filesize
8B
MD5f2b19df65f9de72856ad2a7886064492
SHA1b5e747bb1b826bcfc62a5ff8831bc987a24e432d
SHA256613d69907658de7eb78c555da0aaee4ddf1e9269508e1a4163857410a4c0eacb
SHA5127c724e3cdaee58413f0a6f7cb4fa72403f4d82246817c0b9476a325344154aeaa2cbf8caab17fd43e95063a8eef1ad4f2e16d4f3ba6fed1f293eb67fede4d833
-
Filesize
8B
MD55dfdbb72a546179466f71b69b28d80ea
SHA1315676c9a2a624e5a7c2d38b17b6609a6edb51e9
SHA2569a78000b82f43b95a3d480ab317afd90c6903218a1fddaa9fc248751d3fa9916
SHA51276711e082f982a69e104d7daebf85417b9d566e4291682d380c0eefe8177d71f5f76a8032dbaf15218f94681b3ac0e9aad339027625b579bfcebe2ba1ee7dd50
-
Filesize
8B
MD5537e4c04ac1ea632c2bca5e1431cdd0e
SHA1ca1715433239e0d86307636f2d71708855552c76
SHA256d95226e9d814fbe4a36df8a221113edd1f9684d6c6bf06be21372c347eb74969
SHA5126bd17d721c98067cad3e3e40a092593779bc9991496a6355dd79c56a895e2428da6dc4710a5814cf777bc123c47490b6cb52e582bc8105cf4dc6b863a7c35666
-
Filesize
8B
MD533da198127039c4752b8402ef6f142a5
SHA1ae4ce988267d9224bda436a9a3ad8e770ee9b4ee
SHA25630a0a97cca136c5e93416d2146cb62596afacd5711a295e361f916eac85998b8
SHA512b1feb825be64553d9f3c7446f13ff198e896a43c406973e88d810c970c95ec3ee2dea3874b61f4f95744a2d4cf5ae5cf4240c9825f91b083b7e4f5ed06cb1039
-
Filesize
8B
MD5fa2f91529a31ea4c91bf2ccc88cd83ff
SHA1516545a9af492c2444ab8656e8663668f90e3829
SHA256b0d8d483d6298f8f1310f2eee5ee111ee5f29f9667c21472465583867a2c2e87
SHA512eb9741d101d24982a72947432fcc511412bdede3bed3b78e6a1cb5d8a74efbe1c0b60a660455f992ebd076f3c8fe1afde0436625b89c68f62bdb16daa6710154
-
Filesize
8B
MD53698e21f3c51f0fc76819abfbb4b3b6a
SHA123f8290b119e4f51e591007032852457de1f595f
SHA256fd732ca93930ad6f060c0e222c46463918522acd0c235cbcbc4868a1f21b90df
SHA5122281bfa3620ee420779e6a3fa8d62d8db8deb896c009655dd4ed489d028242ec34dde31ee783370f7a8a883d700fac79ac413acbf7872a915e82683b577141e8
-
Filesize
8B
MD5a5f73e1ad1dfc7a583cfba940d88aa0d
SHA1a6913a8ee964d8362627a52b789e50146ce917d2
SHA256ada7ef203ed9a49e950830b88ad7608d1772c0603c16330f9a38718a67ec73a9
SHA512c89a29b5433a05f245d8e57a688a2a2b9fc00922a4f75527b4e8b1d5918afbcd6a6beea78565ea446eb9bfa5eb30115a160c647c4a06ab2846f841c6b6b1dd50
-
Filesize
8B
MD5ce329909fc6b78ec7bfa7849197963c2
SHA1a678dbd82e9f90d4dd3e851907e9d6af3667f57f
SHA2569b0e27ca631c3b3a468d2bbfa54058863ceb8c2d12190a4a4726827605bd1750
SHA512a6d755238d61d2b47ec18f908c19236c3e0d6e9b83e5931242a2a108dca449f4c7e02ef6abc5a6b49a0c80680d911613d36d42f099a33a05c32a4502a80235ba
-
Filesize
8B
MD507ae638b0ba6d2e880ba1c58dbb565b9
SHA1e92c8df30eaabeb5bcc77b5160648ba50cf8e8c4
SHA2564b2b26731c9c77ce3296c1e2a0bd442ba5946b2b38cf29013ff2f55ceeb63f9e
SHA512bd5aad974467652636e79164d2dc6b0f3193c00ab26978ef9b52a4187742dda7061d3d4c891549058582028677c534b9963da8fd88ca936e88c8ba29806e77d0
-
Filesize
8B
MD529908d1be469bcb63ae08904e9fdbca8
SHA189401ac27391b5fbe5c8436f6f7735c4841c9e92
SHA256bd35b9d8ba42b5fef1761ec278b4093df6ab1204de2b8ca870ac166c12f4684a
SHA512072a5955ed048d5e660cdfff6a37b44cbe69c39e80537ad98fe656cc0f9bbbde43dadf4e678549f058598d86ff2ef0ce1c972c92ed5ef530cabf33024b042265
-
Filesize
8B
MD5ae6e138c10dc3de0c7401a443ba21ddc
SHA121ef2c98092df9190b7eff17529636cd581ed0c1
SHA2565e663b22d201b7e66c3324cc7c15acfed2b31357f26c7756cd64d1a2a115d3f5
SHA512d536ca737269c2a24dbf01ecdaea944031cf34e8bc55872e155d7655ba2d07538b955973aaf145d561670b639735623bafef4e3320e3dded0bc54b7709c18b81
-
Filesize
8B
MD58607a555a5101664ac0cc89aef440a6b
SHA1d63b4c84ead8d284fd66e677a4a19e291bd66c5d
SHA256802c32ca1d0b16f3ec3ead564f37d138b7c56329ea4be2f2c2dc20b7d577c0f0
SHA5129eb93db7ddf2afd1e4572d7bed79c5baadc0065439499111badbc5460b9a26f74e9dbfdea3a02003033fca178ff63dbfb15e30636f891f33c8f7461690b4f0db
-
Filesize
8B
MD53aff03c7c7646993a4661e8ec1bbb389
SHA156561eb8f218ea8489d7b56e0e5dadf86574cd58
SHA2562374293a84228dc634c8cc96be6395ca55d374664f246f2a8f8775eac62af7ec
SHA512a059364a6a46b6bac6c4715ff265733f6a7bfccf719683b14770bee842fa3661c2e6ccfa9a621417d7dabd16453ddaef1ba627bca7ae26fccdbf8a71eab012aa
-
Filesize
8B
MD5265fdc59d0f59eeadfc033bb4d86b889
SHA115f5b83e58130aa0be839b0a0091ec1be85590a3
SHA256335ce95d8a95fe870d918b58ad5bcc7a99aaa7e2cad1a11ec2158b03afec848c
SHA5127815a26efe5c38a9ecfa7818dd209f41b3f20b6d4b90ba551907aba40414b02a977d7d766677e40e300476a185655600316b39a364f3e54dff02628493efb45d
-
Filesize
8B
MD5aefcc01eaf6445489e322ad8fca9979b
SHA1163bd5f07f52161ff493863b7113f275e9992af0
SHA25636725ad7b32d5d1a269907e0f99f3fce191b8b0437ecc915d6fcaa9415d95b6b
SHA51245e401a2bbf4ba7a18d7f620414ecf3c92d91a77422a67d0a44622c4dd74003e693b93c1ad632120f4fb89ac28e17fa4ab67f106e9786ce22b4359a1bbe80e2d
-
Filesize
8B
MD5b6fe05f9dc9676de24d4ccf642efed91
SHA112d8ee769f9007fd0deb3ec6ecdfa4cabffe4212
SHA25613bb3e1761f9e183ed1ddc1cec899da1e713a1b76aa2584ab6e3068c982ea986
SHA512dc4bbeb9de6b15140d6c49027dc10b976234b8c9e95d1ef7f4690b0e0dc81e416fa9ed83235fcdf4d463a65f12dfcbd2a7ac248a34acd98842190ea0c6d80be7
-
Filesize
8B
MD5beafd3ecb9113a12470ce5a15dfb935c
SHA19a977d5ba238da9b4acd73ef6e4b24269cc1c6ee
SHA25652660d36cb1db8bd1be720387f726da875d98b2deb7baa4379bee6d3e27b1ccf
SHA512acca28b2aa97467de787295abb8c82918c3fd31808d57d48f9ddd9451313d1b37b514bb1a68c66af6e635d59fe0249298702852003a346b5c330ad22abbc7bd5
-
Filesize
8B
MD5b839b04fe338571de2c85c4dc7116b68
SHA197c99ee58b43f36948cb1dba97feb411142af26b
SHA256c1af895c2ac64c3ff2f07c436b8d23887d20c529a50cc0b4209217c789f479e7
SHA512d4b1de0d5a8a282339ee2f764f22bc7c33b2652677ac38d894346e080930505aee070918dc824653ebb982d61b5d80effe31cb14a32e3975410f57f6879269ef
-
Filesize
8B
MD5311e84377eaaf3dba73b1235d9b3ef06
SHA123228aa4b5c6bd46e4f4baba3d64a6908db7323e
SHA25678ccac8bfb9bd4d1be98cd0bd1fd64056c5ff42726fbd1e762c684b71cc0bcff
SHA5120b1763ce0f7e204c201c90237fa13ffa2334404e78fbad4ca7448f872c4dd0c14a978605ffa11c62011ba32c17651e07dde24c0cf1dd6fa0998c61c12483c27a
-
Filesize
8B
MD52196ad7d70cb4c05be2a0a0384171839
SHA19f569b6a4e5054be3379fd483d5712db01c1b59c
SHA256d154e87d86be3fc76ed9975cd95d1a0646c0bbdfabb99f8378db78ec55101d84
SHA51292e41beb355d79eb2a156e8391ee614f4954bcdbebf69204fb40bc8b72a25c198d5be680a34f10bbc3cfe1eb4ec564a819ab5086c26f35b60c8ff2d9df5a2aa2
-
Filesize
8B
MD5cbb6710020ffa90ecf7a5a860d93a5e7
SHA19044cc8b2709d6821a046f5c430a4b842e62a11a
SHA2563793b204fd8600952005ef49fbfeb5a5e0fbf6a64626b852dc8a595057255553
SHA51207842da2433bb9527e3572343f39dfa768a60db34f1b65b01f0dc2d9fb1953d51d98cb33677395987da25816202245a061f770e352753abf03c3d1543d09f15c
-
Filesize
8B
MD534e8dcc20fb7419f56abf9280b48ae56
SHA1f1f953198badff79918c7ca92154e4b91b1b92c5
SHA256c000497cb879a8616253e5b90b3e8cac1340b4953ecb7ebd95efb86773d5a3fc
SHA512b8b634c5d66290f093694aaa629b83e85d7634e699efd29337cdf62658e068ec508da50a63eb081d03cf9f580945f0f9c86b390f7698060fe54684d01d0c3ace
-
Filesize
8B
MD563d85753d79b088bcfbfaf1d3c84c611
SHA10ddfaf2c0d5c2b5e4476cee37c35f2a12d54db7e
SHA256111aa9c95278049fae70a3660ced58a1d7c8b6fff518d680c40654579acc5585
SHA512613015be9817b879750972a4dbf31392c9a03a15f4763cf7187b27d66a8c05409259ef947a16c72641a09355ea2c0076dc0cc2d9ef882492c08edf4b9fd7876c
-
Filesize
8B
MD5e5000c0db79d51037a7b9e2621dca2b5
SHA127bd59d7c5ee6929a8ed8f3979eab80e9b56162e
SHA256085f9f2d593b95c32816ca5aa61d1441eed6a9dddea9489e44c6cd1bcf7f07f0
SHA5120af3912f368a04925d60903234e25f853cfb1e9523027c54353fd45ec102d793b0fcab88af6d99eccb01c29e8a9bc3ff0b5d4ff9db284e0f5f4ee8f3adf33429
-
Filesize
8B
MD53d4b7deb8c28b34de37a02f69541c645
SHA167a6dc7b80762f9814917de6c36bd60db4abcde3
SHA25696a10b6a06a5415a7785216cec779eac930d7a2a1ce819276093bd97e38228a1
SHA5121731fb595d54847d80fc45c69c59fc0abfaad0b8c6bd1ce2c909d95ca4bb64aeb0d4a4148c54359c76b91652ef47d7997b63866cf3c526667157c860b3fc28f4
-
Filesize
8B
MD53d38a49d9fbdbf7f384231fe57712a7b
SHA1896aa007008d08a3b25fa18ed415ffb042fc5c07
SHA256594b3c1e137c2150aac9630b01f68c4fef16472d4d1aa7f9372de51d03eafd6e
SHA51221dcafca86cbfcbf950a9d4b33ded8b2fb9132fafc3d994b19b7f01a32eef95f95462139c99d739f03d6387cafac9a8c3dda646a85c010c52d8cd3c1895fb2d6
-
Filesize
8B
MD543f5ea79df365bd9d0bd333bd6205516
SHA1087bcdd4764e53426f9a2d0c285bc4a8496616b6
SHA256109aa0320befd2822a8cb64bc4afa50fe6f2e4a80a732146b5d5651d072a3956
SHA512546379c5aa12edb34c7a3b37c7b274fd00589f5771e643be7e9da6be760723356ebba38844247e7f2284c1ba7440e2053fc89ba3570ecf4b26705d6671d150ff
-
Filesize
8B
MD57d75a96556c0a53dac8322017f8659a2
SHA1002402ed2613bc011f937cf76cdf4f3f5f9770b1
SHA2561be83e69fafcd835398bc9e1fcda7c3bb30f4dc3eb4ef35dd5116c9222a9f361
SHA5127f20878fd7e13a149fb6843b2095bc98cf346d5b47b2319448de9d7e0516dfcb83833ae1487b8cec9584ddea9530e04c348da6d4da20ad324f18de2b757791fe
-
Filesize
290KB
MD5dfbe920bd7d2b8ebf6bf42785477b069
SHA1395a87a9c6cc7157d1b58846a220eba63a95af04
SHA25667516c1d5d96b5a45dfb77fa435e136971cafe6698d4658c0ff979b60873aae9
SHA5121237c4762e0cdf72bfae30915a7bad5df44d9cea7400746006ade3ff2e542b0280485157b75b5a4ce372aef25e00ec171a0e5eebbd712609f414794418150cf8