Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 02:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_131cd33741ecd765120cdfac28527736.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_131cd33741ecd765120cdfac28527736.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_131cd33741ecd765120cdfac28527736.exe
-
Size
927KB
-
MD5
131cd33741ecd765120cdfac28527736
-
SHA1
1ab0b0e5517a9a01c148220e7cc28c07242214d5
-
SHA256
08fbfb7ea3fbf9acc391bb69030b09816d1992169af08b63bba885ac8f0cb2f8
-
SHA512
0d02fc6b74345ca02cbed955e49caeb41faee09b9b8e37e7621e3b60f611671cf271172624896a3f1c6c1717e7b619c69c12b2a6541e38da90a4d9b9b2aac106
-
SSDEEP
24576:PAlf+mjRLEdhbTUmjB8SNPJ7ugZIb+f6V6a2M7P/rae/7DV+q:P+jpoTUmS6+R3/wq
Malware Config
Extracted
cybergate
v1.07.5
cyber
captainherp.no-ip.biz:100
X636Y37C32E6V1
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
you said it this guy is fucked
-
message_box_title
Your fucked basically
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A12G1I3-D2DE-AC51-K4B0-76WDH1038L88} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A12G1I3-D2DE-AC51-K4B0-76WDH1038L88}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A12G1I3-D2DE-AC51-K4B0-76WDH1038L88} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A12G1I3-D2DE-AC51-K4B0-76WDH1038L88}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" vbc.exe -
Executes dropped EXE 1 IoCs
pid Process 1872 Svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1576 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 1576 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_131cd33741ecd765120cdfac28527736.exe File opened for modification C:\Windows\SysWOW64\WinDir\ JaffaCakes118_131cd33741ecd765120cdfac28527736.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2468 set thread context of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 1872 set thread context of 840 1872 Svchost.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_131cd33741ecd765120cdfac28527736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_131cd33741ecd765120cdfac28527736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 2840 vbc.exe 1872 Svchost.exe 1872 Svchost.exe 1872 Svchost.exe 1872 Svchost.exe 1872 Svchost.exe 840 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1576 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe Token: SeBackupPrivilege 3012 explorer.exe Token: SeRestorePrivilege 3012 explorer.exe Token: SeBackupPrivilege 1576 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe Token: SeRestorePrivilege 1576 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe Token: SeDebugPrivilege 1576 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe Token: SeDebugPrivilege 1576 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe Token: SeDebugPrivilege 1872 Svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2712 DllHost.exe 2840 vbc.exe 2712 DllHost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 DllHost.exe 2712 DllHost.exe 2712 DllHost.exe 2712 DllHost.exe 2712 DllHost.exe 2712 DllHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2468 wrote to memory of 2840 2468 JaffaCakes118_131cd33741ecd765120cdfac28527736.exe 31 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21 PID 2840 wrote to memory of 1204 2840 vbc.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_131cd33741ecd765120cdfac28527736.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_131cd33741ecd765120cdfac28527736.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_131cd33741ecd765120cdfac28527736.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_131cd33741ecd765120cdfac28527736.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe6⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD582adf1577835caa55e3dfa6f2e300f4f
SHA168e1fbef4a08941a881c69a17e949294961a4f75
SHA256966895f3d160beefd922cc01f74d1af42d0dba7be6cf3314e365413ca74ce69b
SHA512681b2838418904d6ef0a9fde837692198d54c609a4a1ca61f4c8be6c6f58aff94753f6f15cd93ee3a0c094f83d381021366c3744e55a9f32f482e2d76b76eae2
-
Filesize
8B
MD55dd128a31140d897bd21e933b3e47d52
SHA1cae558ff83481305784c25d05db7b1aa73bf6a2c
SHA256bccef0851e6cb2809a901113197156385f0f0a5b88e3ccefbfaca02191991035
SHA5122b5440d19e3bc14f1f7d10be95ba81a17fd6f532da21283a89c6b904302171b38f1e9473044c8315f75d89d28e186acdafcce15c6615e967b42aeeb3836e6d12
-
Filesize
8B
MD54f741e0368f26b10921f18bcbc1e0f65
SHA1df03c536c15147f878e08b8c114fd9c2534d7a0c
SHA256502af492b74bd890bf49b2be2642f64a1bfdf2dec6a1c61ed4a0a024e3ad295c
SHA512f1b7101a1ed5be4e0df4f320e62ae0158973ae2e63194337d0965df5bcc506f5fab34ed9af61b22a991ebc1bdccf46609752c7ec9815fb48c865f87cdbb17091
-
Filesize
8B
MD54961ba5ff4ddd4bec333aaf725fcf905
SHA19f20fd58065d2da4ba33119e49fdd0858baa9024
SHA256c70a536d0728a2d95a60ff20f431e6251a5d0f49f9c66d3728d69a074edde602
SHA51242c41b66573c1e32ae0e0d1554586b987537adc9acf23b415a1f02069c18897c4ed552475070c26a8dd48f3f21ba8b1f9def156f91d07eee27709e6324c26d58
-
Filesize
8B
MD51f78f6bc5e7027d9bb89da4029477453
SHA1084b41d083fbb1d1ecccf1aa55ca01ff9bb1ec40
SHA2565ea1160521e0facf25a5deeee75cf50fcbccbdf27d5fa23a70f2b8291045ebce
SHA5126b522384224b91ef863729947dd123d277383d157c7046ac3e2c93f4a81145d7edff943cf6a90b6dd9c4688bec196205dc9b86c4b30b4db772b51116f3b26d47
-
Filesize
8B
MD5765fb23ef55d552989f1e83e8b525163
SHA1f888bfbbcbf5aba13d4db6ea9292c4b783c4bc24
SHA2568a95332059ff05d508a432f9ecdfcfbed75a9451a50022a8100ee3ea47a23c38
SHA51214358d3d59e323d0a46c0152a28ed81f31943c23b9701d132b79a9b683ecb227f05d46dc0e4d2d43ff778f517804ca6eb9c72139233be5d3317c14b5a1bd4afc
-
Filesize
8B
MD5b7107633287471d51d685b69d2ffcd12
SHA1a8bc23f22e0fe571307fc65b5a3f20a11a12270c
SHA2567559d0764496966cc580d60dc1de84eba457b806ea4436a8d0113d7d57d0b9d3
SHA5129457011d710795e9e1a94fc237ed0443c8828771129208e5ff6e83fe8cbe74d967b9a321c441b9dde193b591fcd9c4c3e4a5af8bc1dfc160e7cb46410e7c168a
-
Filesize
8B
MD5899cb58a6c0ef4f11807b96cb61fb9fa
SHA1ab36e171afe3fb4d4d73e54b900a76ff7881d6a4
SHA2564a4c08b748e8732e28eafcf56458ef576bf517057d37a75d44105e829aa5dfc9
SHA512e0eb8762d285af0bd47907cc174bb867acaf184868fd0c7f4deed5f79f8617ce27c94b713793ca5cd01d22b477eac075ccb516425d6a359b2ed1ab6d7f3dc0dd
-
Filesize
8B
MD5f4320db7f09c51d066531f0257ed82a7
SHA177ee06471cf4c3d5a27d6f77069a9b559a35ad77
SHA2566911b49ee84d7cbeababf13d468da672d907084995309a34058d7a31f46fdd86
SHA512eb890e0134d24a8695caa8bbce47141aecf51f530434861d958b28cfd68cd19ecae107e4f240825d4ff65ad303ef1469a7dab5333e1a173a956fcd84a215f4c8
-
Filesize
8B
MD5e1849e8dd9e296d58f12b3f6f7e3f361
SHA17d9c879a88d0275fca05478f5986d2300d6229f3
SHA256879d11b5db7b33bb76bca1f126b181a33e89b0f5298d49175b23c8ad52320b8f
SHA512af99bb1a37a12921c2f7f7ac49ee7867b2ff6bf6d170a8b734fc8f64c392c68122d88dfbf6533abc3a1bd6ca49acd98a7ee025844fb79713c135f0f8acf184ba
-
Filesize
8B
MD50d168062b68970010d1f19822256ff77
SHA1bc381aef04af743b95f077944f5666e2e9e06ae7
SHA2567d4c91b4e9d688d8a28d5a5771920df89410335f192847e56f9fde49f79378af
SHA51265f83495ff028b77d84c52c3583ebc783b2e7a9313d0ddd22350775ab3219f5fd1ae76d2101381eafe813990c9e1345922b40ad34aa3e2e3e26c606ba27ed7b9
-
Filesize
8B
MD53d05e54cab59a9d5a13ec6ceff815de1
SHA1b0e1a2e978cf142fafaf6900a9b92fa1de08a783
SHA256dceef83e8a65ddd8d6fc8a58320f90821acc01a64a4854e830b7acc9eeba0d25
SHA5124b81c082d2a98519bc8b0528d9afbdacd1a9050150b5f0e73f2ee9ad677be25a9ac65f4b37509437f866b68880ebfa721b898ac4a573085b25eff60ff4188a51
-
Filesize
8B
MD5c6e19f3240772b6410ede0d4441826a5
SHA157ba227b9f8072a9ce9d76e4262e4e6807dcc018
SHA256ccfcd9c0077bfb07146dfcb43ee0358bef2be2366382e0687e46bd23e9fd737a
SHA512abb633cf665e1df77e5740e42abdd2d58ba2757ab56c7b620a86245e2b9d0f45ba940f6085fded3f95873e1aa2a15ce3f1cb20c8ba7d72dd7bf55613fd071747
-
Filesize
8B
MD5b363cc77e62043852b8bd52bc1261d54
SHA167d7af906060864eb82419d4ea6144b261e74483
SHA2561e6815baba91a8bd30527a98900dac07b42d2fdcc240fe6d1634ed56eeea9b0d
SHA512bc0706edcd9c844a11c412fa5147d94c52fee5a296f44e20f683d860fee4b2d09e083fd788f7787154ca6a9a305936c12369825f91abd49a72a6ec62cf6802ee
-
Filesize
8B
MD56727b8014c9ddb717ba1f58c38f71a5d
SHA1464a4be1a59ee0302c29aa5f23d7849baf52c39b
SHA256510cafc6c6e9b4d59730f76ad1054549292fc2cde90168743faffb8b9e816d6a
SHA5120133aab9b35f00ce1f36bfc492ed3c2c64c845abff5ac4431631f2dac8b78c184eae6f3e20e5b4fa10a7bdf853c91e02690c965211bef00b03c6d89227ca803e
-
Filesize
8B
MD563406810550c38fbd57afe289153abd3
SHA1a14e4b1df58c57ff6a9fa541b19fcf0f978856cb
SHA25631652d4fae44e98145e36dc05734786121ed614f4b6b7a0b56f716159118c225
SHA512d63b48e4af5c8a3fb57b49774681dc056b1cffb2a881087eb572fc46cad02db2b558f700e35f77750aecd170b9a8070d5dbb86c8f9b303f5bfaf30bd732280c6
-
Filesize
8B
MD5915323aeadb5a878f178939c642e22fa
SHA10a4f7a5757281273612ef4ea90bd52f4e7883919
SHA2560372bb15d48da49265b1466ae79bf377a16d043be51a694ecf00a66adfba786d
SHA51290df70e0cd0781df345915dad73790bbb23ab3abeea3c95e474eb14488386411fac887c3eb91a566c5db6703a547394e15da0dde4cdf16f3afffc06eefc0cae2
-
Filesize
8B
MD50662d8a7b00b7c44a464d18229b028b2
SHA1cbb71b2206469dad8f92abd484ea67838ec185d3
SHA256f5c778e0d53f67c7d5f199548a41d2e138deb2f2718b0d1e53bcb5e406be33ff
SHA5120ee3a1eaa986873836e61874a664b71439060389ef6344983b9a214cf6a722ed1a5284eafbaac65c468de757be7663d8442517fe56c526ed1a715f863f590501
-
Filesize
8B
MD578e669b162d8e1f26e8f755954607a14
SHA18197a13cf822579c2a9637d7131d536d77215640
SHA2561f4ae54893bb745b72f85cb440d64eec1425697f775898647148c681573a14f8
SHA51241cb3e6ec0fe71359f720b4221e7f427533394611f48aadf7317c505759acc92041b0e8a00b8ea6480f7d8a0a37309544d3a611b9ca91c812d3d5b98fe117e0e
-
Filesize
8B
MD51199c6b2596c77703fe672d46ee8e035
SHA19f7b1f75bde6c1b8423dcbe0ba7d2a98b574f571
SHA25659d89357812be971f4290258b82d834bb832781a7ac1f59feb13a325d75d367b
SHA5125682b795b5d3709137747f47df7cf17a98c27b1434829bc11254eaf3fe03a4cc1e17c24bbc0b888d598b377aee270418b4914d287905447dc91b837a9e50b114
-
Filesize
8B
MD5696961da9430f41bb02cda4fa32e244d
SHA1ae1c0a3904e6b3a6a780d43992cb9ff2597f3b8d
SHA25611a0d8fe5f20057f1fb38aaaaff8d46ec99ea1097bc5d7b8ca3bc745702682f9
SHA512efbdecc2d004253cd422e642deba92818b4241ec9b5d8c6b6a8ca77d00db3f73b632643e3d0cfd1a5ad108d788603f8494ba9586fdc97de9d175230b69d9c65b
-
Filesize
8B
MD5a02cab480138fd171c9ef186c88c52a6
SHA1fe900109d4ea4d35c8b3d441c4e8805385d07c88
SHA25652193d3ca458b9c8bd6119fa7e9798e2d43977cf090a41a5d78f63ecb4d3d2e6
SHA5126667916834ca73e48283710b5683f2d80bb644c249c85da820857c72ca879708ac70dcd2ee2456fabac5949aee2976537e8dbb28c4a68c4dd652049e28dc2f45
-
Filesize
8B
MD52ae300ce5310644323e7a7a97e65144c
SHA1158eb4202a6a68e74f18eb4cce59f685b532a431
SHA2565b84d4e5e7a997935edcb37a23b6afa9fa7538b217ef452ebb0926f5a2c68263
SHA512d2255d6eb1033a37325363c8252350d5ab67a5a8fae84c7cbc719d689e5fa2c187dd7285119467d0a132028dd3c3b98ad26ea20a9235abdd452aaa7f30dcb8af
-
Filesize
8B
MD5f2e9912e296167373afb8e936cc6daa2
SHA1080c5b058313f33920f43aee319f9f51f9e47a2f
SHA2565d342bb6ddf6cc92057afd842c4bc0f04509592251daf593bc48a4eef73aec01
SHA5123a6cce7faa0527913c813295e882542003c9d396374cbd8946275523632030f41b4c72aa135bb115ab3db37e15d56a3853ef6c12a03319520c87779e5316323d
-
Filesize
8B
MD51a93a9dad235e8a4e57e61f3ebd5b550
SHA1599057eb0d848784b626bf83d9e55c8ce4edf0b2
SHA256edf4eafa0827032d1519855688648c330f091f81516a077a2f562083db365c5c
SHA512b49b2c744ed40da63adfcbe0e7b0ddd4e9df5a3bdaa742d92eabffc9927f01dd647bec215a9086c6bf7819bb72ea3432a5d9ee11e7df700e0a81bcc08ff81619
-
Filesize
8B
MD5b5393ec38614944d3e78653495a4da96
SHA14820c92a29e670f91e836c5e7bdd3ada01f2b573
SHA2561b532bb915c5e8df880e0b5837f8625552f382c44350ec5b9f3af77d4e3b5ef5
SHA512ec0864b9fd8a69eeb097da6841960b5dec4799285c4e6052d4ac640d02942e9d12f5668d0db58f2f6d8a995c135f0851ba6fb496fb1fa68712ff7fda11705260
-
Filesize
8B
MD573f7031dc9aa90fec3f87396f012efe4
SHA15c06ca6a1eb5fbf87f6a5c9d9d61e1beb2a83ba4
SHA2568b678003d9ffdf8736666fc546b5a228b099a4f3c5a56a69db37da2fddf65f15
SHA512a21bd933dd7db8c9b88040adb644f5418458281b0bd4e516ba036ff63cb0c3e7f4d5daf329cd7178a694f6034016ee3ed4564be05e9165cd7e90a71a4817ab9d
-
Filesize
8B
MD58ab2a8aecd9b6326d28fd8f32522b30a
SHA14bd7f0cf16bdf99fb31525d384c8bd1b552242b8
SHA2567896132003bf7685924e7222a039ab0d81218b8900083f67372dbcc1102dde0b
SHA51295c0cf76a518735bc1f18a539af6894998f74f1cb31e4fd28fb492446e96fbf3d89f2f04ebbf8a70e6628dacc07ff842f7afcd653a22d706c88ba8824da79931
-
Filesize
8B
MD58ccffe8fe05aea0b6671373bdd4ab005
SHA11ab66f3c943e05b6ade8abdfb079374f4b927f18
SHA25615ea8cc78fd008bdf08089f86ee927cec9ae9207b438e9fd9e428c71e42589b0
SHA512ae0db949c6cc21105f150bf1fbaf48342873503d6e1ed0ee27c40f1530817fc2e6f4686a83e9d08fb0da4c7fb3dffe86779ecffbb6af3d49a97b621a52790290
-
Filesize
8B
MD5e21c38bedea8cde30b03a3ff77ffdff4
SHA1a5336bd38f2dc10cdd13f54cca1255ce5b1f2c08
SHA25666c8bcad5feea5c9d64a3ba52e6ae0124fce666d8ce4181482792b9a0ed6acd6
SHA512197218e3c95d3d5380b1f836628090cd9ecc1443f0efc31c19e1c91d86226efb7128849abfba91927b89083b85e7277bef4d67e95303b1dbbc18f244eede73c4
-
Filesize
8B
MD5a8695d486be01145d735054535b15f19
SHA1ac0cec1aae687353b5abc490f56e4c620c8fbd8d
SHA25670e351284947b5a17ea0ea678a903d0749b169c090944aefe72aae246b301a14
SHA512bc6e02a40c90e86b53a815adcede1beae685bb61430c970e72d019a1b9f9d95c3b6ef72396bd857f0e94aa886c63fc2c36756e21e84f68dc8448ddc7823774d0
-
Filesize
8B
MD5058305c61413826f3446564b8d6400ef
SHA145523006d9565c11e241a1c2a39685e22c1ea9db
SHA256925a4ffb8552fe0c5f20ee81f2daf0fa458d97a510f6d9069e3b668c7ebd9761
SHA512b6213ca45ef1f41d09c2c3ba26f2d0b1dd324cab5e269bb0a083855d739a5fe31cb957df411dd9ddc6a8881471ece63030df42f7e84827e278308c4863f75343
-
Filesize
8B
MD519c069ae614b5447ebfde39766f34b0c
SHA1d3b5b6cfb3be9aea7ee59259ae4e4958404079a5
SHA2561c974907f3ab7b4c3568d2c27cb8f82f5baa2d5b3a4293b1946e73cdca3ada26
SHA512b4a36d3460776a1fe4f0aef8fd751e48055f279df475e537b76011a2f3074116ad1ab560508ac4efafcac6162a3dd81930a6f0edabd16cfaaa52e22120d782bf
-
Filesize
8B
MD5fbf9a8dcab1269d58ff57460ab93a2e2
SHA1c9de0265cdc67315f40ad72ed15205cdff81641d
SHA256ffa5a42a2ccfbc27bcdbc15722ed8d2f4a62868837e9ea5a39b5623d3de59ccd
SHA5129a2281307803a1605ef3a055f02b77437a1ec6c7a40b8a49ac1f9f420b1e995ccca3471757199f18abc447fe23844882c75b06be549fc0e8560572116cad8ff5
-
Filesize
8B
MD5b52be70d4ee3bbce731f80c0ade7f3a6
SHA1651450a015cbb2a0b7dba1fde34791e220ee86e5
SHA256c2a6e24bad5dd3170708f9cd72392816587f5f2c3a0fd9ab6fc0bb1b3e39035f
SHA512af1e3d89cba32be8f44e9b0988421404cbb3a8a09fcbc151f2b70dbcf4460607c49160adeb2bc576bd7128240b5517380289916206d6ece7d29669b1ab613ae4
-
Filesize
8B
MD5b79fe2366b1d21598f120853cccfd688
SHA1809a68242f4fe5655187665e6ccf55d96614c1f2
SHA25697692554e22bb6cfd70ee554ea5f7e24597e022f3af0d817c1c4bd4ae8e6b969
SHA5128df425f26556a2b5bd885a1c61c63f45d3914f45ff1b44d720a14aaef9405d1012c5b7c3ef30ce3d8db406a0ea25593b977d85ea6fadf3da15b8a03cbbd0887a
-
Filesize
8B
MD5504fcfdd68bf4edfdce35f1d251f9570
SHA19f444af05f17f03df9dc2a1edf371ce7831f70ce
SHA2563ebee6d242f6e25773ffb203b053e366017ab34d4e2060ed4ef28576d21d66f7
SHA512bcc4cfac2fb83c63f847dfaa59ee77db7f159996f19bf0938ee9daaddd3ce001d2229a456b0180a7dcdd8c1d9a969ec565d78fd571263601f0278dcee21c2c99
-
Filesize
117KB
MD5eaee7226994f7566f09f715130dfcc55
SHA10d1021e127e247c17d6fb4412ab63047db15ebfd
SHA256af52bfc3d241d915153ed2b5c2dc1e38aa3741d86cca4bf46ed26ccd6376e808
SHA512e791ef886fb819bf35fda6f8758299ef7d0d93a0715b4907c255bc3dbef03faf882c9d8b41b9c3bfcc6ca858f3460a6e257ce7758213e3b3a3ed220b4faf1212
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
927KB
MD5131cd33741ecd765120cdfac28527736
SHA11ab0b0e5517a9a01c148220e7cc28c07242214d5
SHA25608fbfb7ea3fbf9acc391bb69030b09816d1992169af08b63bba885ac8f0cb2f8
SHA5120d02fc6b74345ca02cbed955e49caeb41faee09b9b8e37e7621e3b60f611671cf271172624896a3f1c6c1717e7b619c69c12b2a6541e38da90a4d9b9b2aac106