Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/03/2025, 16:21
Behavioral task
behavioral1
Sample
JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe
-
Size
480KB
-
MD5
74e581bf0271af158ec7092e58e1fb3b
-
SHA1
b99375f2ee37c2b361f8b1ab83a97553620e42b7
-
SHA256
8c7a2c8bca19717a11b3c63dfeb76d502c2659eaebecdd03dd64f7d8e300a9b7
-
SHA512
2b96e09ce9ccfc1ce75a178380144829631b71acf88c5e033e02b849e8e64876f7dfc16fb3413dba19634064e1abdc03cb5f41e8863d27aee081eb8a8c5eb71c
-
SSDEEP
12288:GyPm5yUjlzdG+g05KUjeQmVkE9QQPavpM:GyPm55lz4tbCeQmVn9Q6i
Malware Config
Extracted
cybergate
v1.07.5
Cyber
onlycryy.no-ip.biz:82
QGMUWY63DK5LGW
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Winlog
-
install_file
Winlogon.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
System Error, please restart your system and try it again
-
message_box_title
Error
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DNE578IT-6B6O-8M4P-3T2C-OFN88NH233T8} JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DNE578IT-6B6O-8M4P-3T2C-OFN88NH233T8}\StubPath = "C:\\Windows\\system32\\Winlog\\Winlogon.exe Restart" JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DNE578IT-6B6O-8M4P-3T2C-OFN88NH233T8} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DNE578IT-6B6O-8M4P-3T2C-OFN88NH233T8}\StubPath = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 844 Winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 1804 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 1804 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Winlog\\Winlogon.exe" JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winlog\Winlogon.exe JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe File opened for modification C:\Windows\SysWOW64\Winlog\Winlogon.exe JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe File opened for modification C:\Windows\SysWOW64\Winlog\Winlogon.exe JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe File opened for modification C:\Windows\SysWOW64\Winlog\ JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
resource yara_rule behavioral1/memory/1268-0-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/1268-3-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1268-308-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/1700-536-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/files/0x00300000000173e4-538.dat upx behavioral1/memory/1268-600-0x0000000001E40000-0x0000000001EFE000-memory.dmp upx behavioral1/memory/1804-669-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/1268-869-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/844-894-0x0000000000400000-0x00000000004BE000-memory.dmp upx behavioral1/memory/1804-893-0x0000000006A40000-0x0000000006AFE000-memory.dmp upx behavioral1/memory/1700-896-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/844-898-0x0000000000400000-0x00000000004BE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1804 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1700 explorer.exe Token: SeRestorePrivilege 1700 explorer.exe Token: SeBackupPrivilege 1804 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Token: SeRestorePrivilege 1804 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Token: SeDebugPrivilege 1804 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe Token: SeDebugPrivilege 1804 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21 PID 1268 wrote to memory of 1200 1268 JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_74e581bf0271af158ec7092e58e1fb3b.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\Winlog\Winlogon.exe"C:\Windows\system32\Winlog\Winlogon.exe"4⤵
- Executes dropped EXE
PID:844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b1504a87a425566117f796e0fa03f0a4
SHA1f7b869958d3d232203ac42f64b1cccd654011f1f
SHA2565403ef46bcad53584065b36787f106d8d0830a3cb0b3ef5033a2c9964aefb5b3
SHA51269577f6e805fbe7c67967aad99a5fe63fa13bd69176778c405d9d4c0cafc103a9eba7e3caa9e6fbfb4888efe4f3f1880b6497d979288bf3985496d2295941193
-
Filesize
8B
MD5e1d91062a7004300eb3f7eb6cf0ffd3d
SHA1abb530e1deb454480dbc7257fb70f2cb36cf47d6
SHA256c4e779b55ca9180823bbd2c1871f13b3ba0ee02299be4c608b2cc2ab70814c1c
SHA5122fb10013ef09177b89de9a541dbfdb91c3915c7cf1bc40dcf174fff860a1a85d60319d4be492fbc78cf37600551262c32d6e099805fae7a3e1f9efb6cb1cde07
-
Filesize
8B
MD5f0734d12f9c3617f758763196f71fc9c
SHA1b5448bc516d73088f48339aba072f731468ada92
SHA25662faebfa9949c8669ea873095bfa632bd6392ea8b3137780315b8c5865af7c92
SHA512e1a3aa4e43162b0682c33f6b78e1a9decb65489b3ea82fbeaee3119f6fae0b52f89870f481c87d0f917bedc700ec9b21e1298d40c8cf267ab51e18c4ab9a2210
-
Filesize
8B
MD53dea7c56e40938187c1608fb57c525fd
SHA1787bb0a00e1b421c6049442a9f3ff5705526996e
SHA256b506cf6d61dcc530fe6c25a25aa25fa7eefc2e9da85565ac57df459b42f38a43
SHA51233c20df1c336d9b3bf3bf01a7ac2d6abe9b2d4263c530dfd83710e9bfa2c818d901657c7553bd295ddfe24bbe103cdc234a07f8e100feee39356acd875ed4c1e
-
Filesize
8B
MD55b02731b4b7cfa328a2191aee55c13ce
SHA166465c6505d96838361b402162cd42ca7d53d0ff
SHA256662a8c7546288e0f1e42e4ded647e01f66689439e99f72b1f008a61a7363b1a9
SHA512221e16779537973e208a56ea4be5e4f4e9fc80cefca4762dec8ea6270040de39bf4048745a5a07c0bb95249478ec6ae8f7a80fad1fcf00ef9fa1acfd78bb79b4
-
Filesize
8B
MD5de2358585548487450f8fec4ec3a22de
SHA1320c2f81066be7d4f3b57b48ae88284b0a890111
SHA2569247dfc0d2172f13f65d10d592a93394ac3b1b88c2400961bea1dd67f2f7136c
SHA5127a87fd170d2f643114fc8440a33b95b14439c64e952065f16a6d5b131c8ed0885a91cf808e320def1fc1e8046b7e5a2bdc9f32e9d6b0d3ae2d90a8a48ec1da07
-
Filesize
8B
MD509a8d28a1cb9e5f376db40c75cbf328c
SHA1ed8c31f7c0f66ab836b8f945fd49fcebaa03fa10
SHA2565ad654c384b3e1fc1e6556cd08ccce10e6a71e4c8d56cfc48b82b8a893844d28
SHA5120cfc751ee98c1838a6c007147ffaca40102a783058466fda05bfc14e790135b1251fd20f31ab73e9bdb546515cb182711a9fc56678949ce94ccc43bb5852ce0b
-
Filesize
8B
MD5b4ad3e8fbec8b9b6b77fa962ab193841
SHA16c79ba2f1ae188851feeb94c88fd515554250aee
SHA2562b7037a568ad9c6a4305e8dfdbc051db854ebc16c03d67197a01f34c37c67804
SHA512235099f6893fe4c0e051df5bac029c8a7802ee5dd72bf228b91c1690071c9247b493f859c9e9afa6ca7ee26997ed822cb85f0eb17ece73ec69273652ebbb8ae3
-
Filesize
8B
MD587269755b9b3a046485fdae8d96b252c
SHA12e9cc0015d85f671336333495faa15437c7ac2ab
SHA25613d2839e2a085d7afd43c1784bd0fd06eb5e7241ff994fe5c72ae51f17fb5546
SHA512c1458c1155fb516986ad96b9c18bdef7eafdb5fe01203a04e521022859e7703f51c893de0ea6a84fdf687959f61f44afe586915c74713f0f59be718520510e5c
-
Filesize
8B
MD56e8ac13107fa1726294b1a3002b36821
SHA19fa4b741501d6d8dc4a8d1f37e202d3294a4681c
SHA256d99ac69c3dc266b1e78b93a5e616d5217e2f4a8349cf696eed5da88808522187
SHA512a64342d710f9ed366d502f0dd05816e7486f14e5c17129c102d25e4cdfcf65f25afa20dda19705391074738d830311f59ec5251168d0ee88cf5631cdacc0b2f0
-
Filesize
8B
MD553b3e3f0b874c5f9e52d35b4bdc91cf5
SHA19a58cd18136f81b05ba4af48d7ed9871062181e1
SHA2561586357210d53159cb86bae397104cb04a10debd5b675ba78ec1f7beff10f8da
SHA512b58876f17a63c7f76df76cbfdc24079cf66e5c4a071bafba9921081bcefd2605672eabe396653556185cc58b84fa13fe273d4054d012a22ee143c0aad0800d3d
-
Filesize
8B
MD5e4e785a41044629759a8643e694f8d03
SHA173b0a57f37dcb02d7d03f60b3fcebd9318df0955
SHA2564b5889e47bb38d24980474f3993677ac5d9b1e822432dd12e83f31140c11bcc7
SHA512c8c403f04fa25f622dc4133a0769a5e18f3e827a08a9c5eb10f9575ddf365ef1e4b6517c85feea0ee46aeb567100620050d601834fb4ab68fdf62cb90beb0391
-
Filesize
8B
MD5eaf77267001d459c1002fd67a6a08592
SHA1c2c3740f7e3d0d6a52f3f6875ac5b180e6a52c81
SHA256a1bd13041db424cc82836351ed28b07b64baf4dd6a4c374a42e7e22155a6f558
SHA51283aa0dfad18b79d68a37c20556de57100995bc1ed5be36c44fe9d6f4c8a85b6cb6457b071b80f6add1ba5d053d68c65e8b5f4b1e00f89c5ed92d870fcefb2cbc
-
Filesize
8B
MD57665c73834365f8833e1bbb453518773
SHA18aaf45af530f0b0686b5dc1cea3245f5964d8450
SHA256465e93f42356e3d47c7ad50b2aa8be0746ee0e2b8b7f07603eade89816d1e7a5
SHA512536da107ec4e77c0a18ac1e93fa475cf9e0a8e8685d8224f3311e30fdfd0e8fcdd4f6e0b7c72cd3cd9889b1887f0a651aa53bd108012b82ae88f7897c9f40be4
-
Filesize
8B
MD5ec7b0de10e7a66919404356566d9ea11
SHA1b17841c8045273c6d7a494a339c60b05d063279c
SHA25640417d46717a47675c7104e65f5d91fb1bb4bb8d439a9d9f7d26c4b7f7bf4672
SHA512f6dfa25babaca58365915b2d78c6c30d69d1c36d180e4bcf1e5806389a4b968865b12462922516922c5fa0678f325103537100efb80c73a64a32756f8f4fe352
-
Filesize
8B
MD52eca7857883803cf6773ccff1feecc00
SHA1402f2a640bdddc5fe162c494f5c6c28b9f2a4a0d
SHA256af67b485fd35bb6376f744870c56c85598d4eaccba4a76979c02865563fb49ed
SHA512563723bf4b2a062a35d6950d080692aee9df4e81c99fdc632d7c1f8076b12c46e611dc321fdcc7a05b6288e44e61c261dc47c272dff331c059d7087baf307643
-
Filesize
8B
MD52b8cf79037ee957b0b84d395108f5b26
SHA1a3ef5f12fae26f51d67641205e3a652d0727b8f0
SHA256b0fa618c62c231f69a2db0902b60175c42fb1ba8966fb895b00380cd0b3a811b
SHA512234da37809c86d670936df796588244cbbd336e89b7a5ee87354970fa257c87941801bb97a29e869f0fdb894f7dbb26f3f3a81f5c56e17f0187b38a51a71b372
-
Filesize
8B
MD545f4b9079fbb2ce09cb5c79ff4b30cba
SHA190320dcaa0fa2b68d9fa6c04ca0dcc75dba5291a
SHA256f0fa24192fa488343ed70e2164234ee145f5d56e186b2c66a6e90158da411bb1
SHA5121c6226d1759c339851bff99e00af08def32dd7e8aac2889dd425f4042cb1abdafca9ca2efc39564f2ed95e32e9289998f087d760efdac404bd4f2fbdb81af41c
-
Filesize
8B
MD5b7c94ee3aa526b01d4c0682cc2860fde
SHA11771a214a8626526eceee2a0a12312d85d1becfc
SHA2568ddab02f304f7ee7fb9ffc71e807b49098faf107263c8ecc40e1bd71e15193b3
SHA512629bf819fd6eb1a1377dac6afe304e1f591bdd6cd319138d0d1993b622793bff9211f974cfdcea90667161fd6c0f1784749c2980f5aeb8f2fdd7be8aaef9c606
-
Filesize
8B
MD55523ef64fa46d524c19e9705344388dc
SHA11514aa209618c57d4ebbc7d8a6180b69af8068fc
SHA2565b6d14b16c8f6f178521151f9d11668b15a14791c755c1193071535b279d975c
SHA51261888ef78bd053b2e41b1ca54780171239b576662e1358dd45ca3e5962ea05043d5bfa649c8be015925070ada76ca78d21c8653dc0b81c2655898b32231b209c
-
Filesize
8B
MD51cd16b66fa584ef71399145914d0eb35
SHA1648ead60a6506d05fb3d0822c085598311126c18
SHA256032cf7d836f0a860a8f53efc9538e0a9a7fa4c8abd305ca89434ed9cdd03516a
SHA512278eb98cca9a34a35e95afaff83225a923cbdadab269449a38c33f489e47881109e8bab878a33b37130b86d33cf5cdf0bd10a15619ac70537609e499f24f2637
-
Filesize
8B
MD5ae0378d9fbf23f08cf13a40581d94eb1
SHA1ffe3909e732817be01c45f961ba04f4f11d44bb0
SHA256ad6f7871c7fdc74a7bc1c8c40759520c716ef29440b68684b7ca0d53bf033fca
SHA512d5d15f1272e8a88c9309c99fa942c120d7b4489a4eed78beaba7f486c79da782aeaacf3c98a950826487423a0e061eea53e25859ef13050b20da7f72a07c0bef
-
Filesize
8B
MD54332b4a22de2dfe5ec8c76dff6f9bb1e
SHA1521c6ee71ef7c0fa9ce1b09e7e6b44a8726bb96e
SHA256fa24173de22f1ec3e4eff163329d180627e11932308ad248e53caff277390a35
SHA512aac23868a98448fc3cfc9a19a1da6fb713e1a9bc1d0d67d1386bd976047d19fdcfa00e7a4199a9e30f403b35404fb6a1a1376ca6a16a2225d599436d7efa6e5a
-
Filesize
8B
MD5a1315a824f5e9ca1a3bbb99dedbdc4fb
SHA1fad2944904520dcff03adfc213170566af21af83
SHA25658140181a7dc131bec9588117117dfd2aebe57716deca294e19996d7cf20e00b
SHA512fa1f6ce213c027a3f504812d841a7f790bd605872b17da4061741f1089f9a2ed1bea35bfd65cfad7ba81befc4dbf953bd8df4f210ccf7f030a3603685495a066
-
Filesize
8B
MD545646d66bb6a7df7dd14d1d27173df8a
SHA1b1b97fec6f3310c059ef4c32e7633d2047b42126
SHA256ca299a74875773c8d1a054f50c3dd7cfa909485fcd7f8b1bc06669cd8bcb372c
SHA512a91f8a88a4831956393147871b6c338fa8e68cd5d56e32235267f9897b8a881d7dfc04100e82c7ff3d11305c4a7a979db17032a473ee1df33abaa31c1ad9fef8
-
Filesize
8B
MD51fedc4441c3e445d77473fbec5ef7367
SHA14a96f4037a6d0d0f8c17995d33e7c4f30813345c
SHA2567252c77d1e68c14c42cc329808571ce888193d3e407d03fc33fbad3e799f2127
SHA51238242320e2961a99846e68af622a61e535ea9832aa27709c1d1ffbe92b607c7f8142688a17910ef5704321777719cd4acf323c0b4dfcce27c5623887bd5897b7
-
Filesize
8B
MD5f10ed5ce7ccde8e659d67a7ce172ffeb
SHA118447b1f69b94f650a7e3d0527b701f96a30698f
SHA25684a3def934ef03d4a5465a973f5abee282d2786d0e5ac706bae5255567c5dc44
SHA5127624a822e3faf7138cb2bf878b28287dd4987e55e685c0de4519e527cfcac700010e3318e8159e3e03d174cea0573ea3f08fd92ccd8bcffbd7f771fc25cf8e8c
-
Filesize
8B
MD50ee42db6fec099d2b3e5128ff32287dc
SHA17a78229225ad8346f5620dc1bc4c057f9554f2b8
SHA25639d4da181810a67aadec793178eb9d03ee00580e5695cfd622f26416242485b4
SHA512d3bb5f7d5ef75844655ccebc5a7c7589829cb282cb90d7eaadbffd08e3788cc63a4e0a3c213f099d1c5b72498ff13d325d8a2a3918c5c54a98beffa57706e40a
-
Filesize
8B
MD55d3fed7172b1a8901c1c83ac2bd9c9dd
SHA19ec4d522b914ced3e4164e9e80234cdb7af4d80c
SHA2569d69768e265e529fd10c183a90c18545d4abdbcdbd0ce78e57fd7918b8e20d1e
SHA51239de35f3fb57c757198567a7c2623dca4fb0b23103e013327986cf907a63f840b11b064ba987bf004b4d4358598c2762168de80dacdb0f96691dfdcd6bbb48f5
-
Filesize
8B
MD51f113f1470a568e2e9e12d05e06ebdba
SHA11239abaaf886959336639e4beb194eb6d4bbcfa0
SHA2561d06ceee6dd97bf7bc98eaa3fdbdbc71ccb7da25d51c5dc2de8f257b6dada9aa
SHA5123cd11061ae75a495183f9f1895ec1ba4db2d22a32af922da76c323da2204e7014d17c19704ef9719990588d52527045b93c1291e2207208b055bc12f9129c47a
-
Filesize
8B
MD590ee04fff4c815565ebb4982c3d71567
SHA1f7665224ac90543b74531d780ae93eb0d2171532
SHA256b77c1728bf186b0cb80b9c530ebe680230b83289298efe3512ad9f79849db07f
SHA5124ff5aa5678c31a28bcf8f4a65e0d4642fc572da04e5b1c271067d99d94195096040592a2738d249febafca604b8c3dd4728a361a7a26f9c5090dc33ba1b3989f
-
Filesize
8B
MD59c5b94d963ac0802a9ede40f710b5f55
SHA105db01dbc18d97cddf47c9badf623f88a307f316
SHA2561967fc6a02179663e314211195872a26fb9a584c1333bc7b81bacf121da5bd1e
SHA512c018c585a29e673478aee717235ecf41032e2c44ae7fd06f34e1a3af204656514d37a8b41f43500c76df7032d52e834118a2d551b32a8c9ab1c83d4d2dc42eca
-
Filesize
8B
MD5421ee93d5a666cba4ba5fe6aaf501bd7
SHA1a4d3cd8d71e3b5560effba5490aa46ec4375620e
SHA2560708b26a22a54b9fcf189eaed15f8048ea2a43ff2fe6779445887bab941a7b95
SHA512624d4aedc8dc7bf950050f5d64bc9a64f276870f8074a3afa567f786030427a637f37fc6398542d2fd6e87c62e93f605bc3f90c17cb0837b066331b127f85f41
-
Filesize
8B
MD541eb99a647ebea3b4ca9c54aeb0bad96
SHA10f26d5677adda731ec70ee40f423378a3a3ae8b2
SHA2565d5858a28b943265dce65b3a6fc373cb82783c56f0235781698e816700c92b51
SHA512e856b75401a1004549f716de97734b24db99da0067113592276d6a2cf51f0cdfa6f4e936c5a2c036903fd7d2b656543fa5bf1c7277e44048cff5d14b4ccc5a25
-
Filesize
8B
MD5ec52452c8fee712afb9b682d2bb5107d
SHA1d31d7bb90369b57eea4389e0e3ba7dd07bba897f
SHA2563d78300ba3522d8e1cac5e4836e2d451bdda8ee3f3e720eda3177162d6696cd1
SHA512ef14705c6e1b3c7e3eb918f7f2c03a0b4db881dc58b7fde68e023b4d169821738230cc68fdfdd581a8a8c8319467d672ee5e4b9c0581ad3d8a39db0ac9532497
-
Filesize
8B
MD5f50aa6e8e47b13898fe3d1232c308271
SHA133410d4472d421dfc49c45571fc995765678c438
SHA256d571d2b6836a3741e996e312cbb444be19de6351f0fbfaaadb0803afe11b5743
SHA512b4d8265d7f26838482f4e579f432277bb06dedf2b01a0a266c73a930fc9499f0b936345dcbfeb8df00a4195768954203089c0b0d41eaa1dd48ef84ca9ccfff48
-
Filesize
8B
MD5f67832b20e53c42c00221ef6e2412b6e
SHA1dfc11669583f29eeb4ebb2e788b6aaed5bc617dd
SHA256e449cb5af10b86f2ae113a7e8ba3f1266b5ed7dfb956af451dc1832bbc7a6d51
SHA5128d1b64f332a14724ef08edc754dae8abee8078399707fbb9c3e4e713297b0e6e8f2dda3eaaee1ab78ae85122d0eef7640a139e70502314f51720e4ac841f30f1
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
480KB
MD574e581bf0271af158ec7092e58e1fb3b
SHA1b99375f2ee37c2b361f8b1ab83a97553620e42b7
SHA2568c7a2c8bca19717a11b3c63dfeb76d502c2659eaebecdd03dd64f7d8e300a9b7
SHA5122b96e09ce9ccfc1ce75a178380144829631b71acf88c5e033e02b849e8e64876f7dfc16fb3413dba19634064e1abdc03cb5f41e8863d27aee081eb8a8c5eb71c