Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 06:09
Behavioral task
behavioral1
Sample
JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe
-
Size
788KB
-
MD5
17bb69e78303a9f7b95233dc3a76162c
-
SHA1
81090b7a60a89339499e6531bdafb7c3ccd9482c
-
SHA256
37e2fdb580342a188a8aade6a8be7282a259cc5a4b969d59e53a57f92e42f486
-
SHA512
9852ce186b75c756272be13e04b3e443300f8d83aea406557a755b2cf0474c2636ec9537b36150dcf9b94a3f38cc9cc88a49be214050797b9e7f9ef48e6e87fd
-
SSDEEP
12288:Tns2behvo8xcf9QlPDJSnL2r+JTBytOKADJ3H3KveGFipAhGcZcwpleo23SAJ:TF8o20Ql74xYIKAV36vxipyLPao2rJ
Malware Config
Extracted
cybergate
v1.07.0
remote
no111.no-ip.info:288
DXDUQ1O5KPY30E
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
1212
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2G0REY6F-GHH7-O38Q-Y8A3-CQ75TA6E5PYE}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2G0REY6F-GHH7-O38Q-Y8A3-CQ75TA6E5PYE} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2G0REY6F-GHH7-O38Q-Y8A3-CQ75TA6E5PYE}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2G0REY6F-GHH7-O38Q-Y8A3-CQ75TA6E5PYE} JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Executes dropped EXE 1 IoCs
pid Process 2504 server.exe -
Loads dropped DLL 2 IoCs
pid Process 1640 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 1640 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
resource yara_rule behavioral1/memory/2372-0-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2372-3-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/2372-306-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2992-535-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/files/0x000900000001749c-537.dat upx behavioral1/memory/2372-868-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1640-560-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1640-888-0x0000000005990000-0x00000000059E7000-memory.dmp upx behavioral1/memory/2992-891-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/2504-893-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1640-894-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1640-895-0x0000000005990000-0x00000000059E7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1640 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2992 explorer.exe Token: SeRestorePrivilege 2992 explorer.exe Token: SeBackupPrivilege 1640 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Token: SeRestorePrivilege 1640 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Token: SeDebugPrivilege 1640 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe Token: SeDebugPrivilege 1640 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21 PID 2372 wrote to memory of 1208 2372 JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17bb69e78303a9f7b95233dc3a76162c.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
PID:2504
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d080db44cde8e542c1d93c214fe1c596
SHA11e061a9575ad68b330bc687eb21fc48e503186e8
SHA256c3eb234165c9ebd2d867177d1f1451c9c38ad625b79da72f661f0ff927e8477a
SHA512c7e6fb34d50e412415488cf54de89e3c5c514a2f13a5d4acff144362e8fdafa00bbf4f4358043e5b93fbda37ce8d5b9e39d64abd27b7efec5b8d8d3d0e931578
-
Filesize
8B
MD5dfa15aad7bb2531662383127d645b381
SHA1551cedd893071b7b4b199d830ac593ad2fa6776d
SHA2566a6018391124d8b332937d3be0e6295249f1169606341d7caf0b037243f8c334
SHA512f029a58e5d533223715aacdac0c5de378b69a05fd417e70c47d24c33d14acbd95a22b1fbc57659fef91b0b2e2685c4212824f1f17c9171d4a6a0c21138975563
-
Filesize
8B
MD56a76a3341342fcb9d18e20781179f612
SHA1744e132de44fced9c27526b6afef881553d55ded
SHA256be8cff44037f36644fb83b179ce9ac9912c53d6f5465fa111a7b88ad7b436464
SHA512afb6087826541b55fc654df4cbae903c7725dcc194e9f19918fb472d04576dfc874042976995e9a80e5c44bc19f1c172e72c72f2f0687c87ff789971233a8d0f
-
Filesize
8B
MD5d50462cf4fe25062173f380e270f3e9d
SHA109e1c456aea16a224078d0c8478a4a4aece28e92
SHA256a5a558b6cdb06cebb1ec67f6aa8a10ef0f4febea711b1b46fc2ab55db9e27dad
SHA512e9a5c1e6596fcfe89464fae9714373562795bd5fbe9f0e565c9e8cd5a704a335c9333d79596f728ceac5821bdda06172b81ad037129535b66c7fbf338b3569a4
-
Filesize
8B
MD5f7dc0a3c385ef2a59e10ef8c9f14e573
SHA1692ef01eab615b5f177dc747cda518b4dac9f790
SHA2566524cca0a7e9f4d8c974310c69ef1c6354abc6b78d33c10aa87ed07b9c92dc9b
SHA5126cca24781f3d82c81240e06178118d096f460ed6d0fb76b57386fe7838e1909abfda61d57e66e1dd22b28be986ad89c760c4c181525d808600c62fe278e5f9de
-
Filesize
8B
MD50217ab129029e41bb4583c4ea9499376
SHA12bcf88f259df74cede7a53e604bf0aff7d52c2bb
SHA25637fde9d585a03a68b79c05bbe53f46cc0be74d77d4c87068197ca76debbfba64
SHA5126a876bf846939f84d5852eae14eb860c1ce0f0be01df9283f8173652868088269600bb1b16917ca8cec08ab6f0804063da7dfda508d3c11b8364e047f87fa973
-
Filesize
8B
MD56c89d0c1cb50690675ae84cea1186f0d
SHA120657566e08d7969d1f7b0b090a85ba46bd22884
SHA2567e498f3feba856a4489b60401fac98326d0aaae0b9ac8df5496735f6f4839ec9
SHA51229034ae23ac7e966bf82c5c0681a4d26240418f51e7e98c2d77f150f136ad8098192b47d77f22448005f9885fc0db6bd5b68d03f39706c84455e93251f1360af
-
Filesize
8B
MD5400e3fb46681252f48e5126bb0cd1786
SHA1e1fcf103e25525bf6b9f1dec16c4c76e29a63d3b
SHA25649d8a4712cd063dfc9503e7c6264505d389a06f35ebae62f1ee6c55c38682cdb
SHA512412504824f40283e720bc3c0f7aeddb7af14dc5cfe4ef2ca4406d27f08f3771eb2607dd2e960fa3534a029e4bc681b034ef65da131dcc765ec10163cfc34c002
-
Filesize
8B
MD5096c6293dc15d14efded6157f75ce658
SHA1caecf3b700a75a5493cb727bd1720c2ab6a7fcba
SHA256fb0a9032332cb046778986fc211841c7c9eb116f6cdccb3058bb3ae659251be7
SHA512d350ec77c5fb9cfbf10e9ca7f944ade9176d1314182080dbaeae8d34fd38a9ce5301eb65c1e3566f66027b1d1233f89da7f39c31d6068de286fd3e844c041c56
-
Filesize
8B
MD508cd55b3a77b3407496d63391e5fca07
SHA1f6c310a83ea192fbf420f8f27d61afe3db2cfdf3
SHA25666cd9cd3fb7517c975e0433e63f35c980013994417afc041661e59eb7beac59c
SHA51226f47a3ccc1ac450c82522da78d4365fbe0b489e90916c2d4dcda7ced40bff496be725c24960903493eedab1a66db361a4b37f517f262caebbdea876ee23d9f0
-
Filesize
8B
MD5f9eb8c1e7899abd923e1d9e8be429f96
SHA158ff92a2421bf9e2592a4a8c24362c1195a978c0
SHA256f9f963cc68c44fd1e1abc6f871c047117d3f7a3212dee1ac96b7f861b76f0b81
SHA512dd7dea0ffaefd1da801d6de653c6538ee71bf8d99c86efdb146bef15af80c5692ee2634169fefd34d73cb30f44f785bdb665a1e21a5327f4387dbb2435a92528
-
Filesize
8B
MD5aaf43fe9836763cd67643660ae4af0af
SHA1a7442c51ddd79a53d157c55afa7c19cdcee55a59
SHA256581431c997186d51c83318f17696f3441d04e4d35ba73723c25030c6ec553fd8
SHA5121071c2a263de87c70ac461a3216495f2bca15f1a3ee61e7b19d87437e44b0f845c3d6dc5c4a43a1898853d5a2ca34d3eab0f8137cde0bf669e42073afd71ee89
-
Filesize
8B
MD51393dffd2c4d797264faf86ac07df067
SHA192f6ff43f1c2fcfa6565fdd3dc897e26c84b7126
SHA2569ad5c55b5f36051e75ba0c0b5cf76ac63e00cb180b718a53adc09a9da8a6a6b1
SHA5121a68b81ce5bf714b4b6c7346464d7c51fb5a762e8221d0833e6ed055aeb4d76bba56922575b7cb847580ce17c687f1eef6374cca5bfe0969d0c60a53a7807c30
-
Filesize
8B
MD5df6b39b612f8fedeb7e68b04a5530bfb
SHA1cd95b6c252c359bbf21fab20f999559f4efef58d
SHA25626e07a97e5e10a4a71bc36be7872e649a012bee1a63e13277ec58b341d0f756d
SHA512874f74f7c8bd151bb5b17afa0d61ea0a0063720406901a5782d1ea9fff0a54acaf5e59cf97c9080dc196b9b59031345c23cc24a18f3e41a91bc44f3b5f4a41e9
-
Filesize
8B
MD5187e97153fad7e4ec42902bc365d45bc
SHA142d784b02c3dc51fbc489dc88b0a3e6315a02256
SHA256bea6f302ca882fc5f088da87c31d108e576c035f8aa2de77a28b85cee6b0b912
SHA512e1aedc6dcd0efb2c8b2ae96e2b721a50e3389fdb58165e46ba59dc9087fcbc0298d86911f1978d12d52c454c2c66b7a3f8a3b7b800bc6ec6c192ec8766ff41a9
-
Filesize
8B
MD5f582b43bb01b1ba813589c28baba2804
SHA1225570d14f5e0dd257112b659ec6d76ef1232de2
SHA256914711d5f8421f3d04abc74f48dd3f8d99a61fceccc6e0b9aa02f26558c36967
SHA512ed248ad547d69a20e0cff23c9d4f15785932744f89c874ca6ff576c422db83a937d25a3d81c10178de154347a6d85dc9c113fe22f165d80377d7b4d4c532a2fe
-
Filesize
8B
MD5e2dff9af5ad4fa560dfd183173ae8aad
SHA105d7b67734299def7bd0591635ec8928c2aec763
SHA256f9ddd2c144c80f5255307572f3e70884e2d48a5069191f7d1d6edadf4453114b
SHA512836e5a6616bf490706f61fab3be051487788edfbd7757e916081fbbccb6d99f8e532593b67cc80d2fa2ea9aecab10597ccaf41000531bf1720e505a55fabb500
-
Filesize
8B
MD54974990d0a62a641ad37d1ba8996f615
SHA18e51ac60e83824647d12f6b194aa43d672026b78
SHA25610d3365801da1492d91e6c20ca7cdff402961c3ae6f513df671e6f4a7320428c
SHA512448a1ebedd54708b244616e7745002a9a0395242e073bdfbdecd3e59d15c5b3b95c0a0a8efa7237ce03729fd790a0a88ca7137622e94bd1103afd8b3285c5e49
-
Filesize
8B
MD51fe1bec09feee66aafd14b7e1343435f
SHA1453c35a8048965dc639e779c8fe3c36776f459da
SHA256c2921031bb70ff579658de65101f9d50870eb7127b7cf2edfdc36f65ee2d6c80
SHA5120f478cd1dc1524ae9fe2561e3600a310096a025fa0e443877f84beeacfb8b2c19940d4c72694e4e4e1a4a80ed36396bc5fccffdd931530cea5b80d93ded6d523
-
Filesize
8B
MD5efa0c07ce2dac4319f693c21757072e7
SHA1aa30cc57f9bbbedfa78f5ba084b06548bcb03bf7
SHA256a597b5a1cdba5026d586fc7fd3f4f3291e0e02f3d74ede87fdd721a2fcd13345
SHA5124b59c93d9586094e08ae06441c647e668abf4c37523efc9706d0dfdf10e7ac9883ce6fd7d3dc3a3f6f38e3f50f66dab41da81df3be84758f15e81a1b8638b4f5
-
Filesize
8B
MD5e5a83c25586821bb120c81aad2d5b6a6
SHA13546b555b2fd47da1cdf8cb9ddcdd55d78074d6c
SHA25629aee1c8dc31553309e892299db3e7fe5566c82b86b0d5f4c368d0fb4f8a0a40
SHA512cef3721ac0618512c3982c3eb6f1681c12d906b98af010d462c047a1af24edb1823baefabeda38b82700cc2f557d9a156ac172073e0cc5db03694f9535722a19
-
Filesize
8B
MD5e90ffb3a29dd8415dc1990f9fa204697
SHA13a66417a3ae9c58cbbed6db8ab481f4005ad500e
SHA256c7d301b518ca5a84f4d4d2abb7a3d21f55bd1e0defb83010b88bc559fca52f76
SHA5122de66b19027f0d87413a6cbaa7cb93750f10f4d46915c3c6a2a41f90e56df2ddd8a8ee60c9c57270aa39ec8461b0ff56ce5a623d962a53afb5efe187b1f4671d
-
Filesize
8B
MD5ee14b36a33fdbc3dd927e0f2484867de
SHA11f8e86b99a41f840615f6a662fc0fbcfd23ca9c7
SHA256635828fe7c757d97d5a4cf237ac7e3040bbe82b58661a7ea40a81b576b6d1a54
SHA512e2e79a7ea4c84f6e31d72a17a81dbd8f352de13c2eea1f17a6f5de5dfe65ce8776840c60773af482a74672f37e3d63353a9929efc2410eaaa7e2cba4cc3cc225
-
Filesize
8B
MD5bd2860cabdf5d03f68073337749cd83b
SHA15461e2dd46ab69d8fa6a0c6c408dddb5c14b188a
SHA256499a4b1aaa832f59edb1893b9a5ae20330b8e05fbb97a670e4ff2828a8065ab9
SHA51212146353d0ed96e4ecf6696201a24816661c775869111373df7aa421f80c744130115a3eb829d7c9f2fbd29aad9409b1281c4f3ebd4102855f79a4678fba909d
-
Filesize
8B
MD5683f1004a37173bbf5c1c508d5db561a
SHA1fd36545734c7c0bed1dc8061041c11a09244c48f
SHA25680867d6f06cafbfc42ea6b1facffeea5ad9cec49a32418cffddd90e3c4d68fca
SHA5122f675ccaf2eb247741dc9026efb5b8abe6443df0a2582af803fe5830008281dec51a7b5f65b661d112c0b8db893eec4c9cb96b4a059bd27db848582467bc5599
-
Filesize
8B
MD528b48e86b2cfd2dd19644b253148ad15
SHA1472fd2f8ab10c7ac862668401dc21a41b90c21ab
SHA256957e0026f9a3a9f3d89fa4b429a9044a90d5380c405b02e07d3c119f396f4519
SHA51229bf92957535d7b1b49fbdee38f4a41de40c785fe379084055266a00a863306996918bb92d2ad44415261c6d27bdfcd5a3ac9d96cff36fbb63bdde7b962adcab
-
Filesize
8B
MD5ae82dd96e01e3f638857b1e04a59e39d
SHA13dfdcfbc3d4c7706a757bccfa9d9bd5960215024
SHA25659cdff0c474cdc1b255f90cee9e5cebed540665956f3f119a42a70c6f247ab93
SHA5128b2a73b2135cbda1ffd7cf9ef13e27be8a4710b4a7373e48587607771a17b68346815f0ac32907d6f6f261f1bf1264df0be33ee8adf06e26701ea73c6c4ec36e
-
Filesize
8B
MD5dc138a04dc94eb6ca2c7b97f8d9137f4
SHA1bb7349b9f62ecf4623b07d9b72aa2b0dfbdea6eb
SHA2567aebd3afa5f0dfbe709acc742672ee2562b021eef97cd6430547d606f7f133b2
SHA512fb6955f9b2a3b0004163de644143fd1c03929b0ea8f3c576775c07f801f4603e569aec265f8439becd016610cc556a458752e167b7e49df1ebfec371b4e0fc8c
-
Filesize
8B
MD55fb825050e2d2476af09400bd04cdabf
SHA1ca970d5cc7e7eabc2cd5002db6c523c6596e75e5
SHA256df54460dddce8d25bbcaee1642f45d87b63844cd1a58924864fb66771a151f61
SHA51261af99a463a70799e7a9eefd79915a37c7a8a6521dd7c0d87ed3eaedc4af9d34a660a5b437dc7464f84a124facc7bc80d0b551dc91fd21c1ae5c395ba3fdcbc6
-
Filesize
8B
MD5207611f28bb5885ba13a2601b4109450
SHA13ff2e75e006130aadc5183f4a9e86bef6d198e14
SHA256fa59f1902e9dade645e1cb451746aa02cc05e99665e6d20ce796d61d35014b1c
SHA512265d78d6d3c1b5d16697d033068f4b5f8ee52e0ebd011174c51c3762ea6dbbd7ee1b516bd95e6ae6e8f2af79bdfb92b406438c3d37f563e1ddd27c19ddceefb1
-
Filesize
8B
MD58e29c23f604c85c4c4f2d73a7264d4d5
SHA1c06a605e4dd3031bcf340589ca840f69f7c9c605
SHA256351700cc2b239efce639b73f8ac23b5fff294066b2370a897657e733c72011e1
SHA512ab979d5cdea8f50bb436cf6072d08b6203db92c1ad800b8813fabd7535acf3c5f4479e366d1fab055d5b8380c72212fa0b6e310140f77aa60f2567b8993add83
-
Filesize
8B
MD522f391b13c1a2932fcbe272b7f432ded
SHA1fe1d801162f26b1493c045b2895753df7357b432
SHA256fbedd8a81ec755244c06738793accd7a14c0e90833f2d0539df4889e21a83f68
SHA5124194b7d5c474e082ba7c23051f4f3153c4db33679f9dd85ff53a062ad2cf653f45f9c9735379ce7db981443e375600b930bd13c6034ab82cd2a32a9d75bec869
-
Filesize
8B
MD5988f6934bb1c1f1e74c2e7502f5ed294
SHA15161721582437da03a2df6629407c0c7ec771097
SHA2565a9d37357f7484b0915114409102fa28c2747461c06c8815af14d2df2fe84909
SHA512a13770ce7ae6aea8e2e9029e834f5382d2ef1797a6a0735bf30d7f7ade843a7e38f3586758f35343ff7ad1da47587d714c46aeb7fecc0cda9036fdc43bb7adce
-
Filesize
8B
MD54e01fe98b55ccd36a7f2955fecde5f5e
SHA19e1b5b774b355711ef20594535c1336115eed15a
SHA2564d801b657790fb598c567e229d00e854a9a495eada83a34267df28f683714686
SHA512c801e22bfdcdaafa0742796a65cfe64177a2eed2c35578738fb2cd8a0aa6bd5264567b765219889722c2bd351ed115b5bf4fb4740bb77d8f6e2d40ae779c0556
-
Filesize
8B
MD54fe4c01022e6379e5127261c8d226c84
SHA1ce282497f31d0103e4f8c6d2a39f68d71d1cd908
SHA256c9bdf40acdfb328e60f345fcffcf1fa15c5603b561c5ec6cebb41ec8f649ea07
SHA5123976c763e693026f20eba7f7f5bdcb2187546501c497e785a36d4df31bd5bcf6384d2516a5f54bb3d2a1b126136a905e888410435960ea9dce297d5fd20f4fd9
-
Filesize
8B
MD54f9b6f10062d0fd9109955a7e4d34e48
SHA1b891fd21b2e25027e011b4ae8520f60a0aa96594
SHA2569fc85c7de9eb1596bb03a107986c6768cc0a167e88cef9c51eae509ef2386ebd
SHA5127f0235c26424d7b68fc66504e9d1ab32b89ed9bd311d43e3e46842cb77fe175f5da921286f3304374fd13ae05bc07b6c4cf1d8d5f3ecee04c47d36912b442b48
-
Filesize
8B
MD5bbb003b3d7f5d6e180055835a4640056
SHA177f45116565688d617d313a216405efd4330c1b9
SHA2562b159a0a410369794b7c0efd1a7434cf7132adf86614fd94892c89eb8a64a1d6
SHA5121af825f4aedbe171ab027a9950cabe36ffb54f9ff1e56a26a11892c85c72ac7e3879d0782d50c08929df39d756face753f0c6f73efe07937ee8646684f80b766
-
Filesize
8B
MD546c6bfb5430297ee4615d14eae30ea0b
SHA1457beba7b547a402d9b0457b09d060b012698f0c
SHA256218b51d0333885da22c4715c6f6fbd9b135f771183132da257055f1b99117fb7
SHA5125ee3577805659c16dfd52c6e897c3a3a4628f4cdddba2b141570ced630df74f0bb1a40f7f03dc054101696a51bc1128d722dfe9e60362d5558fdbd55e0fb07d6
-
Filesize
8B
MD53b4a7d58fd9697bec544bcdd80e1d7ff
SHA17500e41d6a97c2c7fbc4d5e75821520c6b8b744a
SHA2565543841446a22adf7b5e6f349056fd443b755443709876f82a6a9d75954238db
SHA5126477787f97e43575e383a8d2cf69a51b0758b16ffdd51b55339125348d9dfd28cdee5def8f0f5bc82c10853e45365d1f0517aa2958124a2f9c9249088e462805
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
788KB
MD517bb69e78303a9f7b95233dc3a76162c
SHA181090b7a60a89339499e6531bdafb7c3ccd9482c
SHA25637e2fdb580342a188a8aade6a8be7282a259cc5a4b969d59e53a57f92e42f486
SHA5129852ce186b75c756272be13e04b3e443300f8d83aea406557a755b2cf0474c2636ec9537b36150dcf9b94a3f38cc9cc88a49be214050797b9e7f9ef48e6e87fd