Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2025 06:36
Behavioral task
behavioral1
Sample
JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe
-
Size
264KB
-
MD5
10e297d2299ebad17f0c3e2d4ef82347
-
SHA1
7b95c9064774ffddd51d90bffd5a7efe2c5b96c6
-
SHA256
330f7157c1b2d2cc908b1dff8efd908df35ef578f70b9c20f3eb1ea3189cce67
-
SHA512
a0d5f06ea1706d4cd061a41800af1b38cc46a219b2730b5b52864386958755247d09ef4006478337eab29e0a0aeca027c9da43705c233cdfce1f67f6d350a1a1
-
SSDEEP
6144:QkkoNBi7/uD3w8C+oCbQatuaIAe6GlWKUJElPWU92I:rkOg7mzMSQAXIAfNKUKWK2
Malware Config
Extracted
cybergate
v1.02.0
dunke
nd1.no-ip.biz:511
TH8U778I48F3SX
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
csrss.exe
-
install_dir
explorer
-
install_file
explorer.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
Ja07ReD
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\explorer\\explorer.exe" JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\explorer\\explorer.exe" JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Key created \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VV66C018-67SD-0687-0TU3-X8QD4254FQ0U} JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VV66C018-67SD-0687-0TU3-X8QD4254FQ0U}\StubPath = "C:\\Windows\\system32\\explorer\\explorer.exe Restart" JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{VV66C018-67SD-0687-0TU3-X8QD4254FQ0U} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{VV66C018-67SD-0687-0TU3-X8QD4254FQ0U}\StubPath = "C:\\Windows\\system32\\explorer\\explorer.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Executes dropped EXE 1 IoCs
pid Process 3992 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\explorer\\explorer.exe" JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\explorer\\explorer.exe" JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\explorer\explorer.exe JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe File opened for modification C:\Windows\SysWOW64\explorer\explorer.exe JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe File opened for modification C:\Windows\SysWOW64\explorer\explorer.exe JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe File opened for modification C:\Windows\SysWOW64\explorer\ JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
resource yara_rule behavioral2/memory/3512-0-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3512-3-0x0000000024010000-0x000000002406F000-memory.dmp upx behavioral2/memory/3512-24-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3512-66-0x0000000024070000-0x00000000240CF000-memory.dmp upx behavioral2/memory/668-70-0x0000000024070000-0x00000000240CF000-memory.dmp upx behavioral2/files/0x000300000001e649-72.dat upx behavioral2/memory/3512-140-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/3992-160-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/668-161-0x0000000024070000-0x00000000240CF000-memory.dmp upx behavioral2/memory/740-162-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4312 3992 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 740 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 740 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe Token: SeDebugPrivilege 740 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56 PID 3512 wrote to memory of 3628 3512 JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_10e297d2299ebad17f0c3e2d4ef82347.exe"3⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:740 -
C:\Windows\SysWOW64\explorer\explorer.exe"C:\Windows\system32\explorer\explorer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 5645⤵
- Program crash
PID:4312
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3992 -ip 39921⤵PID:3364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD5dc96e420cd464e232cd80d23bf43f39f
SHA120c586ae775a7cecbf776d2dadab3e2da0018cf0
SHA2568469e5f185845f838715de908cdfe55b84de03bb8b926cfe023c25b29e363df9
SHA5120b4a1e9b9bc03766a983e4835b6e0a7ed76c0ca270bc92387c30fd565f908b3de375317b961079359606a310c3c1073f815f64767e6e9b1b396a5bab65fa63fb
-
Filesize
8B
MD531a38383ef2bea15e4c6f491842c9cfe
SHA1efa10f8be8dcde6f5d5338ada5be6f427d3c1314
SHA25603433218a281bae2f4dd1ffef70e9714842e8e4aeee40804e999c8b7aec4948e
SHA5128db7cf0e3b27de03ee03dfeba788b653b2c384bd16c74278673d5ded2ca08323ef451d5cf2f452cbca35f996111afe8910a9fd39faed21606126d3b9b9d89965
-
Filesize
8B
MD5ee3286b7990be056f96a101515256be1
SHA1b2a596b74a3d0bf40bad74cca0a5bc4ab8078202
SHA2561e279a7399a3b296062220ce8af4ec08249a407a3603f16721a4643f36d3da54
SHA51242921f897b0ce4f20968c579567bf3651e860ed8eec9e8fbed01597deaa5fafefebb85266370a896c94d1ef47a9662dbda7019784730fe64ba9919542378ef63
-
Filesize
8B
MD5ac54dd56ced68c2e8576a668c48483a5
SHA1316e6224e9a7e48202d33886050ac35c84f5d605
SHA25688acbc465458e35435e6b72d0602e6dbc2d137ea5a46407efefa8aaa88013c58
SHA512b62043ea2856c8edd704aded7886503e8130e2ec0aedc4aa8026d81b14aeefae74273323d0e43c08e12de566f2596ba6e2245ddef174e6c5da09596cedaa6ccc
-
Filesize
8B
MD57369bf6efc8bb18c3cb8e214c35dd556
SHA1646ecac29be76effd9e5398da12cf356e5c1ca35
SHA256beb9ba0714097c59f0326ee9721cbfc81cab2fbef6ec251afcdea37de2f75925
SHA5122038a12a410930503e1741b1f2955323dc0d4a938324e715619cc191e1343f73141ba1279e164aa5d9e69ad00af8d4814a3834cb2593f77bded64d8126d2f3b5
-
Filesize
8B
MD50695def5c8dd23fe25ac53ffc413ad0f
SHA1129670bedfc0e4fc88bc89542df87806c47d203b
SHA256b93892b37b76d98066dbfab68ad204276bfdd4795454f50ac4bfe7ffbc488000
SHA5120bf6886f4c08f14e4dfa874bf8799c3f48385025654f520955e4b7ca061c08028b37494af55420bb2b17ba588f846a191dcb6d5f51e2bf161a05476fc03d4e6a
-
Filesize
8B
MD53f1e82701c5efc2aed9294a125bf4b05
SHA1ea07d4d8d06f27dac689a83c5582ae02aa3dba8f
SHA256003e0b655b1c146c8c5107654c3c06ef9708628c8cca3e32990bc259bd366cab
SHA5126d7aba100559211711889412b2db41fbf1462854afbd2d2d9b8cee137011a8013c5380d92793cf6e24ad10d90177254cb311299b64456c6eef31169f12130f6f
-
Filesize
8B
MD551f8a4eb65aaff57e07387f839433987
SHA11fb7c8b44b49d33a4a5d855a194f3583e2afc7be
SHA25627ed7e26bdf20f62fa20234ca425f0a78da179787242cd31d014100364793a63
SHA512d7f6bf87078e36eae4d6ddeda0f93d03bfa08b1b226efc8886e4a50da1a580d8db3a41b0ab31ad5d6be21c4235212942185528b2efdefa61f1530fd9546f44da
-
Filesize
8B
MD5bdb21f75fdc8149b0b667e66a903eaa4
SHA11b51cacc9b4a07b1c641dc0e41f0bcf7a8627a27
SHA2569483a011d14a4d3ff253ff018c69d0c4b086054a915849f8657ca89723b9f263
SHA51218188bee112f812a0fd7ae361fa147133c0c19b9eae0088b67b68bef65566c0cce6856ccecc96f97ab80285cde95b0586ba29b745f92ce8c0a463077280cf88b
-
Filesize
8B
MD58c133904a93dc7c279feead389c056df
SHA18eb5ba242879dccda94d8c38982fb7999a9bfb60
SHA256eaf21240cab9b30787dbe8536c5a0698971c9208b0f0a5274f05705102454aa8
SHA512ec54f32a2a6baa29794b3fbe8443dd70929c67dc953685a7636dccf722c5a7e60c744dba45c48c51ad054731a0dfaa447ef1d2765cb64a9e32972ec2c94176da
-
Filesize
8B
MD5a0e09a6193d8de7702c0a27b6a1e9a72
SHA16cf6b19ab86628925d402ad2a6d1a6d5b53a31e0
SHA25636da2729d4909cddb4015021ef5b1b2541d78dec59b70fea20a719e2fd25c172
SHA5121c3a07244f39c34cef59e00882edfbceca6e6d830e41a92984e9455bb873a37da0f3f8090731acae7b75bf204523cb43f6a395bf472d47868e46f2470ccb0957
-
Filesize
8B
MD574512153ad26d3297b169ad6bbf8e4e3
SHA120d4333d113c7e8b1646674b05a68c294f35298e
SHA256ec4ff9ba1699d85e6d18004d57436310c3361fb3cfd8579547de468a77471054
SHA512d03d4f7ca6653d80c4bfa61f4cd435281a3cd2ebf1c3931d2bbc6d2cc5194017c162e99b87990a50d3b23e823a1448b5f774a242211a7552f6ed1f3b3e677749
-
Filesize
8B
MD568bc00175c4bd0a9d94c7a6971d94493
SHA1c498f19ca354d919cea205b8fd6e9d500838a166
SHA25666aa0be3a30065491f34390a97654edcfbbd3f6a1ce7e08e1505c3522bf0d9de
SHA51259d9bc04152a616b407c335b7aaf4d4cc60e3ae4fbf92c391dd721cdf0f425ffe1d01116ba7bc158da3f7b858b2e8103db7f891813213d8a10d47d7b0f92ff16
-
Filesize
8B
MD5d668eaaeb76fa8abefcd8087905d3680
SHA1190ae254a8de2008bb20991e7b34b56733772758
SHA256eff68f6e8223b09c749331836eece63840d12f33457072220bc0abaae95fd617
SHA512e860ed7c774e84bc3cd2ee10c4bc9cca4aee962d6f473e9b8e0d75924018ba293946f8cbe9e505ce4f2e8b9d86c6106dc3f379824e322f62cab6dcca288c5ec3
-
Filesize
8B
MD583761d480806d4e048c14c5576cc07a8
SHA1626134e2c63b53aa05d7d2b4af8070dff6abdaa5
SHA256de7c590fd54e8b74c5101a26cbf3594f6207602b59dff00e23e2c18f82f2cd1e
SHA51252f333744d63a88409aa0aed4c2c02349d852c19ff830a4c36ba15a32ec875673cd47c82404c0f3b2c82ff5c240a28fed1e24fc65b11d417428e298da9821261
-
Filesize
8B
MD5ed57960ebfe2ef4717cf6026ebd4d653
SHA1f07b31e9f8194781248c6fb2ff81371c83e6f516
SHA25619ab13a2d6273150e6267d62d10bcd5c7710daa0b58a0df3594766628b6cdb50
SHA5127586987c50ebc51cd0a6c058e816fa9528051105272e3950bfb1eb5f8f03e6dfa48715d5dddbee54dd31d7cd85f214baed0b2e07baf61ec67428c7a5770cf4d7
-
Filesize
8B
MD51715f3b039df6d9b3ea0194ee4f788ba
SHA166331c540544c101a91037f91fb318772b26c371
SHA2567f5024b92a1aec0ed5822884623ea1591e7facde1aa1f57ce54531e95afc6544
SHA512ec92ca6da91478d6115cf92bee762c1e466e919d930e88ce5e336f7e9ea91af221ab209232a547eefec4eaafe6e834ff7fac1d8e7d21b1c141bf64b1cbdbf0be
-
Filesize
8B
MD5c83559a82ab292c6d869d385408afd7a
SHA1ec721d11338c71f5ef42e71c4896aceb04113673
SHA2565e85f26a0d4dfa6c1c862d63c2841c9abbd2decb1d7418b57fd640a2687cb28c
SHA5129b9aea8c9beca8b4805efb3c78fbcfc6153f15cf92e49bb4640ed69bbc4c671159a578a7480dc89ceadce30372926ae911862e1290098bb73c76b27de4b16777
-
Filesize
8B
MD56246504f696fc0a0a2bb704644d02d1d
SHA176d127e70de5c43cf00f8b6c6511426365e8f95e
SHA256a1daa37f008aeab834c34bda0ef99dab05716f2e70d5c9159a19f9b79ea5855b
SHA5121e868408615b59efaa71f466a2be3752ae8e09243f47e46842d3c3f1675878d925b46c09e7596be789dc66ad2fc89e12d921af2808bf355651299f17ed2aa10c
-
Filesize
8B
MD5f5f47932f53da4ecdd29127830b3ef2b
SHA1567e7e32ebda8cccdf5d8fa20c245c7609db6314
SHA256a06aa533b7e9057ccd538ed281281bc1ae56219c8a197d1573fdd637ed6b5d0b
SHA5127773f819a506eb174a0b2ddc61fb18ca8f996cb6e2e0ef5f63f9e4fdd99577111b3de5bd00815fecc074be788cefb4edd2f23babc202977a0a31de6f7faa1d47
-
Filesize
8B
MD5916167ab0c1995267305614d5f07ffb5
SHA1be473d0d68bc27192c4b7455cf3a3b3a49879a96
SHA2568a4d150186b9277d6422204c547ac87eef0d22fe30ea9beeed321b17ddc5869b
SHA5122450ccc817c92ed7d51becbde2d00613a78810ed5896059c81ab08111ddb698c7a105913de61bb7fcf740c7bf328e895d245536accf0287d8db69835951e0c32
-
Filesize
8B
MD59821ac236a80b77064070f5a9d568aa6
SHA15f9aaadc6ea2cf1c821c85c177839d011e1bf5ae
SHA25624dc50d828bed986ac34a6e55c8baa49627a8fba547b3d28d2aa7dc05d6cb324
SHA5125b09127baf2e9796f5278a7c96f524a7510e1959f3ed43ea459d122a08265dc869c4dd7658a8b7f6bf7fe1aa8d8ba6df501125f50e348dc59d039879d8bc75c1
-
Filesize
8B
MD5962235f6f56d9b57c347b9a7c593e471
SHA134f8bafd91a4204e5b5cbcf439dea31883ede01c
SHA2562bc7e81587ed66e250037a006f95f7ee443ac17ee1dc561a56d0666646d7af3d
SHA512232d93cde5602bb8c367b4e853e32fd5162ae56e782d7eb9f7e196a7c44fb609e57fe1a3c1cc0769533ebd804c19376e0668e6ce3ca29c9229b8a6933b7bcd07
-
Filesize
8B
MD5f4296971dfad65f1e5190fb4c42dc2f5
SHA119e3397e6809ff4029294bfd49be1760936ddef7
SHA256883f3924a775d5a04653ec84e495bcbaeb4785dd247fd9ac98d0aff045cf442d
SHA5123c035df4c9b9a6a668842a685c329b5f79a1404c68ccfa290f27af05d00c6b4528a785b8fd3bd71b369c95007979bcc7cdba010015db544a64671c6694dbb5dc
-
Filesize
8B
MD55c1fbf94714b224edfa9c071ed092ec7
SHA1c2f01d8f7982d759b4912e9f68240f01b6ec33bd
SHA256f87a5e8892861687911834aebc6225fe866dbb07be06ef99a35dc140a6d1f9ed
SHA51231d9dc0359c139ca65cbef4ed6713725b79234d2a2bf2df031970b11d37bc1ddb2a19e93bbdb8b7af2b7fd1ed43de2ab1c7f2c3feea1ee1013498cbd3b3d5d01
-
Filesize
8B
MD5232635089f8a96981016bf5cf54ef822
SHA182bf36166635c2195adb58b7c7b7189dd48cf4a8
SHA256bc677caddfe4b53f72c14dfadc018e9831a689820ac06299380c1b3adeca9c10
SHA512fd0761b85871c93ad6ee36d9768da4c992bf8da92ff2609d09fe2921bda17fd40c636a514cd68f99535f763c676c06d8a259e1a871c7ce3a907fc37ff18189ef
-
Filesize
8B
MD59ed7373ab1ddc4f10fd21f9956eadd67
SHA1d2b2c07938f697064a792fd66605c41cfce609c7
SHA256e47be036600c3e9feeee223849c1130c66ce2870d57a88e9d11ec383e6ff063c
SHA5128af27c2b143280984007c14ad17e8bc8f92879fb2ed8a140d2a232268333903d49a3abe8b77cab66aad3f82a46b23ef5e1bfb4d4c8bdf941141986c8f17b22b6
-
Filesize
8B
MD5fe90c8f9488122d83839607166654f19
SHA1216af66c2e85777c42b5174996cc2f3f92d12753
SHA256c8f4191687fbf69a453b19de7608df2060ec7437d18757c78cbdbb951da92921
SHA51201a3f231d14cb80617e23f3703b5ea586e01bc4fca8cb19bffb75c41ba7f1113f0bbcafbeadda00d55426bb3b5065641b733eb14951ea3b0a497533c54d3629c
-
Filesize
8B
MD5b5df5ca521a7437d689b3e4e2f677c6d
SHA112b4c88628cc6399153c95cab0af6be55d569478
SHA25618b12ae91a171821b85e0c235fb2ae61111e4e316c140bc7bcb03267abd7f5b8
SHA512a32bab3b7e4cd568ef76a85767e879437c132ca29212abafe61a4d18ec8541e158151d1ee510de5457099ea63a3eece91b1c1197320e3fbc874b46d937ad90b5
-
Filesize
8B
MD5f887a5ec8792eb4d1d1ff6f13dc3b085
SHA163212244334e4baa9aabdf77b1a384a8081743d4
SHA256c4496b63a52989d19d987c23c97a6da86d12055db8d7926d557bba5eb2937f67
SHA512531a75c64fd6f3313e994b29bf82e5fbc02a1eeec944f5528878428e68262c5d60d58455ce8b26b99429c42198df892d2aced121ee4502b7dcfb8102140c0e21
-
Filesize
8B
MD5021514438b7ebcdfe6180e4d309221d2
SHA1dcf5cd7c182e49f401f1c367aa136ffb5352b7dd
SHA25620387ec81effbf1f12a79b4b4b7a952ff2b471a005540c601b576b743eaf1375
SHA512b405e457688ee6217df1e78c8e17f06a48f329d47debd7a9de577aeb7f3ebd5c32a522f4cc012fe170f67cd485e325968ec3f7f8e0f8d93742c183742937efee
-
Filesize
8B
MD536c965595fd97a82a160ba3c8845ce3c
SHA1c2717d8850c098d5b6becb2dab3c1c8fe4d9f7b0
SHA2566741466aae2893ef1f0c98e6b1469dc82440af966a086953caa39d0081547ab9
SHA51280b033867354b8ea0dd89f6fa585d75eaac21d00ac5f4c59973e31a68ac469032121ccf2f075285072683b75bd077670df1059e997bf251cefdd845645dc175f
-
Filesize
8B
MD53d68b8b7826b20e1d3c42c17aa58cd8d
SHA1b84123beb532a87e63d20619ff4ee6c7a46597d3
SHA2565f8fbd29956e9a22d91ba4d0c2c5dbb4875b1bc523821c14806b236472cfee95
SHA512f507f2ddfe1dd0a3431b7f818c15378b88900bf195364a26c87b5d332fdc56e0eb7acfe188da613df16513ce1541f6c465567194151babb3dd03536e18f1bab7
-
Filesize
8B
MD557d5f4d66d547f077c79f68961c0aecd
SHA1c3e833110bb3da70db27158ba86c979aa9575db2
SHA2561fd57864603de91a812829f16f4ac8c0a63a611e721fa1bb7ff0a3e7cc3f87f3
SHA5120b080b860758efb220c43f97b7287dfdf98ea2066f874dd65e4ef2409e09d94685ba80305c5874e299e32074cf72a5ced6adf8e0a8654707f948906e6a324c33
-
Filesize
8B
MD53ffba401174ef76e15929bfdb288b0f5
SHA1307ee4f2f041a08cc0b6e86a122588c01c736365
SHA256c8e7ade1fc064656469e83994df54a6ee57f9ca69a0d0f6f8798faf7d71f08e7
SHA512cf28fc92d881ae1d2a9dd8fc123ba0fe99685683d0b7994d31c3c3fee9b35319246859951a6109d9923b7271250394535eef07611bd92aa06d536fc207a18b4d
-
Filesize
8B
MD5db90334f7dbd638c85b641acf2aa1e3e
SHA1aeb7b09d9f1b18ed902ab7e1c755f00ae0902fdc
SHA2562097410effe6878be46032070e95fc893b4db164a8e8318614a8d21b7dd05c0d
SHA512cecd8e665c6854eb740f6af846d8b5dce2127b5de8dc491df2b51c401874f10e1a210e07cd772081256addd8e1aa9889db76565f6653cb72b8ed1cfd823ce045
-
Filesize
8B
MD5d94d81a53d03e9328ad7e822155e92d3
SHA16171d003d46964b88a9e1a0db2c9f928a41d803a
SHA256578084e36744e4c45f60769b3e09a00d66a342a4fbcad2d32a21fa14b83b3543
SHA512f47f1542bd6c25baf665c3f9ca5d62365d1bbc80ab75eef05ae19764232e2f5fc31b6c0458f653e3ab6bb25f753abed1c0c4921d3c9cf02c120063e0e3657b27
-
Filesize
8B
MD5e6a17f7f7f43e1c1f4517b44d07b1d78
SHA1d3d9c30ee40b31a2e6dd324bff33b9daeb1ffe77
SHA2566feeed2c2fdf2ff292af01715532135282d6e78d869c93cc470e58e59f6f6af4
SHA512cf9b416e346d0a1bf0fac42e5b74519b9eb83bb9429f408180e579f8d2c69226f25bcac6563e8dcb1500c87e97c874c2d4fd0c6a4a24036faf2b60f8270e29a3
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
264KB
MD510e297d2299ebad17f0c3e2d4ef82347
SHA17b95c9064774ffddd51d90bffd5a7efe2c5b96c6
SHA256330f7157c1b2d2cc908b1dff8efd908df35ef578f70b9c20f3eb1ea3189cce67
SHA512a0d5f06ea1706d4cd061a41800af1b38cc46a219b2730b5b52864386958755247d09ef4006478337eab29e0a0aeca027c9da43705c233cdfce1f67f6d350a1a1