Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 20:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe
-
Size
376KB
-
MD5
018df39c8b9c31d23ea87bec205a62d8
-
SHA1
5d495178e860d97ee7c2137f1f1bda748f48bce3
-
SHA256
97cc87376745e552f06ed88b8c4efd08cb27c18ffc7c6b509e4b7fdebafd2994
-
SHA512
25935d44cdb78e61a7cd6bb52625b04d43d2623962ecd4a5fd8f60941709b8507e80362cc8aa120724bfa0ab8a2ba439f3a92a11af53df5e9dad7276ac3f8b44
-
SSDEEP
6144:xuy0KdZLnX3KqtDYmMvE5BJk9nQWzIOkoMffN/KfnL0oTiH9RRk9oaZ8Xs:mKDLnX6oDNMvIWJAffELIA5
Malware Config
Extracted
cybergate
v1.07.5
remote
my1337shiz.no-ip.org:100
XVCF5H6H0237D1
-
enable_keylogger
false
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\svchost.exe" JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\svchost.exe" JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{BMHX17BM-0HK6-0ACD-UO80-183FHPR388A7} JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BMHX17BM-0HK6-0ACD-UO80-183FHPR388A7}\StubPath = "C:\\Windows\\system32\\WinDir\\svchost.exe Restart" JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{BMHX17BM-0HK6-0ACD-UO80-183FHPR388A7} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BMHX17BM-0HK6-0ACD-UO80-183FHPR388A7}\StubPath = "C:\\Windows\\system32\\WinDir\\svchost.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 2628 svchost.exe 636 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 2000 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 2000 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 2628 svchost.exe 2628 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\svchost.exe" JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\svchost.exe" JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinDir\ JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe File created C:\Windows\SysWOW64\WinDir\svchost.exe JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe File opened for modification C:\Windows\SysWOW64\WinDir\svchost.exe JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe File opened for modification C:\Windows\SysWOW64\WinDir\svchost.exe JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2124 set thread context of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2628 set thread context of 636 2628 svchost.exe 35 -
resource yara_rule behavioral1/memory/2220-553-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2760-22-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/2220-922-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 636 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2220 explorer.exe Token: SeRestorePrivilege 2220 explorer.exe Token: SeBackupPrivilege 2000 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Token: SeRestorePrivilege 2000 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Token: SeDebugPrivilege 2000 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe Token: SeDebugPrivilege 2000 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2124 wrote to memory of 2760 2124 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 30 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21 PID 2760 wrote to memory of 1188 2760 JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe"3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_018df39c8b9c31d23ea87bec205a62d8.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\WinDir\svchost.exe"C:\Windows\system32\WinDir\svchost.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\SysWOW64\WinDir\svchost.exe"C:\Windows\system32\WinDir\svchost.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5ce8247035c8ccf334a0855992a251ea3
SHA133b491363ebe83f505f5c1c4404b14b501bb558d
SHA2566dd52b44970b008ecebb3699e1e8df92d1d4719cdacae1678bcc6484661b31fd
SHA512157e53eac339ee3ccecc3d327ba7941904bc3d64fcceb21a79c8126a7f1cda8cd50228e1ba6b6b35d8a86a91378927efdd70bfaf9ba86f5e0c92f49b88282314
-
Filesize
8B
MD5b6ce010e68fab61fc9a5ab16c8be0c09
SHA13eaa0a3dcc1b94653174715434738f918cf0be76
SHA256bf8effc03dd462cc416e5ed3f61c2512c66e6b3b66b758f3a303e427d822bc71
SHA512a928887a610329aee6078cf24f251ca49416f10f32674c1ea366c1fe1cebb0e40c5087f8ffbb86d648fd59a249727238ed2cf5e145dba6bc9ff403af5bd4de06
-
Filesize
8B
MD51197c632a31f7f46fda145684c7e541d
SHA14afe14bc4f790855f2c3e2ee0848ab82c6c9b8b0
SHA2563d954b4367a9bfd8a33235fc9246618c70d6a599bfec87a54fc2becdfa954d11
SHA51242263c280ba3c37df26502a9aa5197ab6049079f127c9ca414f1d51b0588c6562491a13feb7420d941c2d151682a2de94589459de578116f6805dcc68df930b8
-
Filesize
8B
MD5a38e1e8934dff2aae67cfb9b725839dd
SHA166d671affaf2d094b562eaded5dade3ea2b32b73
SHA256b97f06547c2620755bfbaae2de3b86769d81ddede07c7c7d30d68030a02c807b
SHA5124bdc7d37981d5c3c9e7477343454adc45dca25707fe95a8b8a134cd7143483269810d38b1f4ca2c48473008919807e3551552a6f086922644cf6c51e6a9f1292
-
Filesize
8B
MD54dfb4026eb5178acfa0ef51775d94b55
SHA129da5809e531aebef59e3b261a5eac556c0b9da0
SHA256b800afd9d01fdcde0933fa460a96297c584b13c256a683bb4c1ead4dfd9745b6
SHA512740cebca79a10db1c12f7747c2364f547ccc25eefddea5d897657120742dd8169b79caacc29cbc6e1ad46c3309a377ebe98247a6c165661799719e98894bd083
-
Filesize
8B
MD57c2aeef11811177d09bef810a880b894
SHA13a5ae88b1dbf15131ea3ccc48d75ea403782415e
SHA2563dd277d788e9107b572a93fbfa5dc8f14f4aeb74b7970d61eb57f37fbcb89ab9
SHA5124e54e8f62547f1f11948f9184081364e1d02bac7ccdc848b4858466e1b1349fc4665ac93602344956279a3c95ae0d4bff736cecc9619ae34f3305600b23be0d4
-
Filesize
8B
MD5e7f41e616edf5cbbe4dfae662a745233
SHA11b9d9965260cd7f7160d722ffd1b498f87cde38c
SHA256342a1e7cf91e31e17d651d7859a944d140fad204a8f11b22e23fc08fab435731
SHA512cef998a5e73c927baa86e67a65f62fafdaab65f83933ba7993fe580a11799eba8ddf5a90c0bf2f93599884af740a976193449f6092ad5407c186ab3f182fd87d
-
Filesize
8B
MD54a94a84ef310af350afad971588d4cc8
SHA1ba0b88203549bddf1334a12132d82357f9e3a0c1
SHA2561bdcde95a5ed07248370a8243b54bc362c41a90daee1bfcb444c832fb8d5e3e1
SHA5124693ee9196996f31bcfc0611497cb790b99e887a4b7432e6138577249c55df938e45ae9e95997cd711aa229a56898dcc5072769e6739f63a4b88049cad801572
-
Filesize
8B
MD59b05b47660c4b997f14abab0b47c9e4a
SHA1bf5558aa2c8f9e2cee25737c4b1fd5d615296746
SHA2560ac1c54d392e794bc71aac4dbfbabfdd1d3e3a19c9d94131080993334675a251
SHA512202071ed4c7df89d50d68e391bdf40d88435b704e0459b1c02e02a5ab12758e24f5fa1afbb14ebb1ba4e8546e7dbf0c2ad7d0700dbcdc4f68da461fc88905643
-
Filesize
8B
MD5de73fa9eba7af2e416bad728b4a733f7
SHA136903b4256b7318ae58c3c0a8733bdc48360bcb7
SHA256e9afd8f1323085f7539a11ed1f0a269cd07e406a1ed30a532379667570b10411
SHA512b9eacc60b6ba96c7d424dc794beaf0135a6b73dd3a4ed9b9524302184cf1bf264068d43a601e911e9a2d5afacf7ebd20b1dc0a8f71b13ff65a7a12195f54ce6b
-
Filesize
8B
MD53d3e74459a983e09a3692514aa070ceb
SHA179b7517bc7db4be797490fa5733b61ee3510f9c8
SHA256dad4f27dd9b0e1389f88984266058ea9a837428f19a42f471ef99f3a9fd10bae
SHA51211d3dbaf00b19696d4a764eb0da9077c91deb0ee4c1374f6863c9e4146c57dba2ec0b1b9c093e7e127f82280f7a11cf18238a0a99c9c48057cd444b79738769c
-
Filesize
8B
MD5b82d39cbbb2564a5009d39ee6126af04
SHA12d5391e40fc9a9aee0194966bacb588717e3d888
SHA256bffcf01fe371bf3389eb502c33415ef9661f16b3d2ecc86d27fbcaa8d14749f4
SHA51230efb7beb532d97092f1a146d17017f0bfcb7f4ecce1002f8a24fae9768899a16b71fb68b13b0e5f6fccfd5561c9db5f773c1cfd734a635b0b052a8eea3b3f78
-
Filesize
8B
MD5c290ef5c13cefcbea8f5cd54f80d36ad
SHA1eaa7724c4fe64e629cdb7858d74531a424115945
SHA256f41916b980e76cba4b5b51dca60fea5e7b8e715f9e32f8ed1b82015676b7aff8
SHA51292be9d74a1b39208d85babc7f96c775b958925b52600ff203aaa84a4e69380cd87fb54750fa2534a7b4be6c29d06612a1b6024f10e2c990ffef2c85269446fea
-
Filesize
8B
MD5ccf5b8f2465d1cd8fcc013c581750547
SHA11cf5f9c3ad8d10f588cf32b99d22271682bdc6e7
SHA256a46392660dc331226f19ea73acf6917def3e09bb5dc9ccfd37623f3b08ce29c7
SHA5122776fe2365252ed599d13ced0701f26574a5a340fc3a518a7ae872690a059247fd682292f51030c0001e5567a89f1a929dc7dfe2749483cbe503be40a8d78146
-
Filesize
8B
MD58f591093bdf61569b60515bc0bd9af5d
SHA17a09f23c4b1292a3c758fefe98db318dde2a431e
SHA2562d5c440ba93b67be8e190e083e1607fd7caf8ff516be7e7c60e55c75c58d5bcf
SHA512ded005e858fa218d733a3d27f7f2b5f5f2f40c4d8021875c3bec8143cf3e1e0687ea661949664a3a049f17fc1db8032882020da1f4c37d38272e1588ec1bedaf
-
Filesize
8B
MD5b1a775ade9e1bd409992a6768244912d
SHA13418b7404ab9214cf8549de1634c8f2e1aa2a71e
SHA2560f52adc3ba1498488bf50053fd7130c1c87bf5ef3ff7602ea2670c893c3b1522
SHA5122afcec256b48a6227c32611c6941c4fb8fb572fdbb4285e601b2539f0f0e7be15ef888a7ba14c4e5e120cf5a32f024020df72592725b5b06ac4f3c3db9197b5b
-
Filesize
8B
MD50248d37282ed2d930bdfbc1001e55871
SHA1bcae2f0d1ff427ddce31ed2d7aa383512ee5c567
SHA2569fac39572db9d5831a46d3416b948564dc1541462cb02bceda6b074fff081cc6
SHA5122b3d95f1953313b398ec36376e74fd73a40d77210f9890078075ba70e2276a8f43bff0b24c4a3420ee0d67917a8c42354f8e8eb9719c1fa5996a29411c2aa771
-
Filesize
8B
MD50fcf39ed0c8df95962b030548cfa34ba
SHA146b667297313fd237e6132f3790dcdc98db92b83
SHA2564549db527959c5f5bd05af6f1535fd2d1b8da53ac9f3084de103e2badb727360
SHA512fc4f89da25c60573dc2c84f5748e6af54796544b826457e11da2d44ff67eae5f7cce4db0fc66bb539fdd4f15da84dc0737c25f89c642bb60f9b053981e9f8298
-
Filesize
8B
MD5c0e5cfe7b5e65a474d1f20e08213a714
SHA14bf4bdbad98c486db6aead1ded81e7a24b51ced8
SHA256d94e9617803a0b9268ef5e637f4f22856e323ebf7786189a82f466bbbaa8717d
SHA512ff7233f6819af14aa0b34356c0f0af698d1220e49f4646a1380d478d8927720d80f3679a214794e8fc55ec3f9a6316edfd743c4362731efbebfb8b723e5f19b3
-
Filesize
8B
MD50d122471e5fa59a79315f7ca3856e68f
SHA1ee79aaaaf8c07bd506907f7d00f3a99da226e243
SHA256004191594c9ebc2e759035a5a85095e279fef65ff750692a39e3f0849a068184
SHA512cee9da9b332c5ffcd4f8fc753085e8e064bf5ea0a201c6c158dbba8f6485a6b4321100bcd20530f96e4f9ccfda9bac6a2524f08c5d014db382427ea5b70da464
-
Filesize
8B
MD55bb12a3853347d8f47b15dbd4e3d9aa1
SHA1bd699ed7132bebca19e34908385b3aa161b754e6
SHA25648de0fda2b43e01a37f8967e4949d0ea14ae96c7c295612d18a3e70dc514732d
SHA512c9bfa2b47a6d1776117807e54d1307012259f015be30f3df804d098ec71a3d8592e27827030b06d4e39e1ef34335faafc5c55355d312e715fc0b25e20419d28a
-
Filesize
8B
MD546e22011a16c1d770e6cf20d17ee0c8b
SHA19876122da42030fadca367b2a8bce3be73f5d013
SHA2566c320309e2ecb11750a3c73a005ebf4d87b41c56b1d1630dbdf3e6b4af5292bf
SHA5120652e176bbf57fd79d078a3a18ba8aa650f98c26f2b95789eca87f675e825d35ae8c66b74d97ae8551512004a6df8d08659b1babbe5cd1ebc490526b7c15371e
-
Filesize
8B
MD5fbaa7ffae1c9ba17d6b1d34c226ca5f8
SHA1420d2f757e814bedf9a3cbb9c1f428a6d429c988
SHA256a76764c32833321fd08b374dbccd72f2eccedcd6a888b4b6d69efcf2c709765a
SHA512f21913771519631a155af8b10db390678028555ac8c1a7a385b5b655616011d16467a0551d371419df4f0d25cc773a7d4286e721bbe15cf42370a23a2ed5772e
-
Filesize
8B
MD53853ae9032c2e06dd87ddea7a77af16e
SHA1696b3b8e187ab966bfccbdc122f70e5d760e008c
SHA2565e9803e79ee577c3987749f35c78ee3ea01360443eb16ffbed7a311dcc86ba6f
SHA5129f996ea2bad02b85577c672a0cad3a7b6d28c354b29205396603d00cf0c5e6d1eb4e514bd4aad2488b3f15956adf7053fbbea71cad8427c5204f36e6d287ee49
-
Filesize
8B
MD575c86eb775165cfb0a65664ea20e7405
SHA1f7688ac3ffcd447f375abd267e9e6d08381b4027
SHA256dbb087b1932683152d73181d950ecc801a5d7bd9810bf85cd8596a76b3e720e9
SHA512666750f76fd0a982ba0d366e7b40c8b414e58d894d6f805c21a971a8dff5a9f5ef0f35d12777aa88e3c4fb185e68c188f5a58795a6e68a846385ab8400d771f7
-
Filesize
8B
MD565a3eee87d59fc4ba19993a673f379f4
SHA19914de37f9a3b37c93900c8676e9bc6262712582
SHA2563b15d06d90ddec3dadf450bd7f12e383777b59ea7fb9da1aa3f8c13e181f6ba1
SHA512d6fbccf68586a544cd821f956b73e9a784df7460e2bb82bc1d8f21cc0d7a5bd318f2418314932d9db4a588b22f545def04cda6434dc14f461f09f342a36e6d54
-
Filesize
8B
MD51a96c66071a01996fe71d9cb236079eb
SHA16d0eb630d5707969f866dbb95674c3fa17086211
SHA25603bd67abc2b18d6ec81f7ed6be284ca7564b6c2b62a3111ed563ae2b118c4bb4
SHA5121b92e9efba4125a3fedebab37717a67287393dd60350a760266aa8a357ff5e1547c6b3643a5b4e58c48e0b41cbf35247ea0916a993775dfcce85bff7fac85055
-
Filesize
8B
MD5066453fbef0b6a0b365b5791cb12198f
SHA17ac29c9acc1e7af1061280f7513f44dc8207f500
SHA256f8c11004f26fad9c0117aa8242ab190ef020732d912e230aca241b9385b77398
SHA512598837654a3bb740d65a6d1a6f0ffdc405fbe2bc439fe6f4829e9e0d8468306ca0b81292b2330a708ec2ab27b44104249f665f847977e3de29fbc23c3ea4d28c
-
Filesize
8B
MD5b4b2fc765136f87175c9bc8931556823
SHA1f4ec933c976c9a8ee7258ecbb09047b4f3a5d4d6
SHA256a800e90d8c8bdf6b12a8e325b4b79af9be5ed2e648c3b1d67fbb7754cb72e6da
SHA512dc1f9a05bb1a20328b745ed4d1bf0178aa94de55a6f5ccc2228e2c23d257f587efddd608cdc377c7a78354ab3440231b38586142d55251be28633b509faf1b69
-
Filesize
8B
MD538d735f4a9a8eba31a8c153c8069f38d
SHA1bfb53d549eb209da7450113b192ca847f836dccd
SHA256b8ae1ac1299d31fe01aec17f537ce8954486938bd349cf8ca6235991f70a0e22
SHA51256f667116b82e835e766f3fdb55c5ac14b90485424602de79e40f3be39964cab58d2e3c62ed21cbb3e139e56c60d0ae97bac6867c0466d6918a7c9139440cdf6
-
Filesize
8B
MD5dcb2210ab52d00b5b5419614b1f1f395
SHA1e7e77be4e9fc573dae0d751a5e5c8984ed974a87
SHA2567dc19760ac53710f8bc63bb09fcdc613e4978f066721a82634363251077c3ffe
SHA51247424cc504db18764f1b6f05a17445ff3d779aa8467a2378289d1a4b21f62c76ff23db71134468e04977143a994fdd756787de5f80a1cf548edebcd0d1aeea2e
-
Filesize
8B
MD52914a87acec211c9b185c773ed87f19d
SHA1b39bbdec62a72ddf389a08e1b2688480c307a059
SHA256e1a84eca80a00dabd39a8fc01741c629f9ef375fdaa1f617db0399886261ad0f
SHA512d1f3c905f09f03a5ce8615c7651639c5e13f5e459c970b39f22833df18116171333a86909d5cc1b0ab0c8b9c816a07d111c387619fc5b4b2a59d3acd9d564924
-
Filesize
8B
MD50648f603eee8307c41393ac2725d54a1
SHA1aaae2ea3ae418cb90fb2a735a427cd1dceb4fbbe
SHA25622f8ced6c3dab51a324460806fed673b522042a4b043a1ac5e74d2a6824743bf
SHA5127612bff921371a0e0393243aaa9ca81ca04347f870c14b46e8f4885e823461d807fc8678fd14bafa5074c217b0564b3cc49e6b9fda466327245dacc89fc53a8e
-
Filesize
8B
MD5ac6c1ae1ffda6a7eb8a2c43749399de4
SHA1b7f36124e71781f4fdae91ecfcb0d0642eae8d4f
SHA2561db7abc934d5aedf6fc9d526c0d5999db5a720885dcc56ce09de632ac6e92f0d
SHA51271cd998750b8896933d453512848737e3b320a3e2a86f0555f6e3dd09e3a1dce45c466b2a8560a6105dcadb8beafb320e1c9c3be51372eb724571c72d88257b2
-
Filesize
8B
MD5cbe301979aa605f33cdd73a35778836a
SHA1e41f01a80c800954fef3a156bd2814723e6e84ef
SHA256ab53a48415a794a83470be6d90ec1f058b902294127f83bc4e2f07dfed8f11b1
SHA5121a775cdb1605c0dc5fd89735bfebcf664e22e58648488c4546881d9900a1126a327447c08862a23a0f6528d135f785f2585ba888687245a61b5bc2a5485a764e
-
Filesize
8B
MD54ed9b3feca41b874236f32cf79f3badc
SHA143c66942d9e201ef028a513e05254242386723b3
SHA256998466c0b41f9d17717e83da61b7b57b3aaf66b09432b14058e9dc0536513988
SHA51272f22f9632ba69d67a37f8299af4e49b08ad00e0a38ec53d8a5aa2ad6156683fc48cc04a2dab7a0ae388c80b54dee57a845aa9bc654c8079afacb8121a9ee81e
-
Filesize
8B
MD5be48d09efb2ac1a1901ea33707d020a2
SHA121620c05a751721e3b98c7998023995a8fdfe51c
SHA2567133d2471be592142217f8a78ad7ad544a6afb59491bff90325e267e9d527006
SHA5122b4827533ec98e72f5a9d5e59f524df4b1d4b7f217af193603ab7657add8b2ee87c249f4c51724f2e179140f0478874b838972f572275b8fe12df3aaf29b6015
-
Filesize
376KB
MD5018df39c8b9c31d23ea87bec205a62d8
SHA15d495178e860d97ee7c2137f1f1bda748f48bce3
SHA25697cc87376745e552f06ed88b8c4efd08cb27c18ffc7c6b509e4b7fdebafd2994
SHA51225935d44cdb78e61a7cd6bb52625b04d43d2623962ecd4a5fd8f60941709b8507e80362cc8aa120724bfa0ab8a2ba439f3a92a11af53df5e9dad7276ac3f8b44