Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe
-
Size
962KB
-
MD5
7c4048c3b9ec9b27b645f0bd983308b6
-
SHA1
06927095d9803f98552ff4df7c43a4b6663b1689
-
SHA256
8017442b94c83c310571758d0c0dcd119e4bd5192ab4ba19a9e11efadb065151
-
SHA512
07a24bb10026423caa9d791f40566f49f25812a4873ab3dde492b95261b9b3760f5942e66f8027fed32b97af1982520aa3f11aa790086a15c57bb8138b727ff7
-
SSDEEP
24576:Jvt7GleDbIWhGKwhOB2Zligbggggggg22xV+gdjggggBPF6ggggggggggggggggk:xvB2+gbggggggg22xV+gdjggggBPF6gT
Malware Config
Extracted
cybergate
v1.07.5
cyber
disgow1.no-ip.org:100
R68OSDR4C0D5I6
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Windir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Jungle Flasher Patch Successful !
-
message_box_title
Jungle Flasher Fix !
-
password
dickface
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Windir\\Svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Windir\\Svchost.exe" vbc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{U7K458X3-8FUB-8275-MELO-B8U28WL53MK8} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{U7K458X3-8FUB-8275-MELO-B8U28WL53MK8}\StubPath = "C:\\Windows\\system32\\Windir\\Svchost.exe Restart" vbc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{U7K458X3-8FUB-8275-MELO-B8U28WL53MK8} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{U7K458X3-8FUB-8275-MELO-B8U28WL53MK8}\StubPath = "C:\\Windows\\system32\\Windir\\Svchost.exe" explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1144 Svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1044 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe\"" JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Windir\\Svchost.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Windir\\Svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\Windir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\Windir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\Windir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\Windir\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2152 set thread context of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 -
resource yara_rule behavioral1/memory/1124-552-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1124-906-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2552 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1044 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1124 explorer.exe Token: SeRestorePrivilege 1124 explorer.exe Token: SeBackupPrivilege 1044 vbc.exe Token: SeRestorePrivilege 1044 vbc.exe Token: SeDebugPrivilege 1044 vbc.exe Token: SeDebugPrivilege 1044 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2152 wrote to memory of 2552 2152 JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe 30 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21 PID 2552 wrote to memory of 1216 2552 vbc.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7c4048c3b9ec9b27b645f0bd983308b6.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1948
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\SysWOW64\Windir\Svchost.exe"C:\Windows\system32\Windir\Svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5a0b9aa072bb892c558b61ed6bc478d43
SHA141135e6ac9ad016d6738bdc92cd189b188983a8c
SHA2564ab32f41684867b0beafe4f36aba1c637c33d5e287c459318c80651c5422ec35
SHA5123d71475c7055982ee9c4aba3e009656b05e4c41c1a4926ccfc9f750d9e897e7d7454be7209666ad1c65656b9e390a781b42558024c36ab580a63173ad1935393
-
Filesize
8B
MD5b2da0a4b18b6199d87cfafe980303ea1
SHA1d833f1c10789a18ee99087714a5d1ad4d29b0dfb
SHA2563fbaf68ed0f71319d02d231952a8a923ca211a8dfd558cb825695aa980f17578
SHA512ff305f420f8f6a972ca342ac1df8962e8c915b7bcab60c12398baacd4d61c02f442af5ff3bb4f69b547ed68478a2c3b18e0f22cd423cff09290a72b3642b9fe2
-
Filesize
8B
MD539469f83eb474588ac029ac3de7ddba7
SHA1fe15a2fcccf47492e9394040ec7837a1f01900eb
SHA256ef678c9b7f62765df7416b23c77b91c0e751b348ff648bca616c408cb2a904f2
SHA51207aefa178229d42116bc92f454cd46ec3ced2e99d0ba72e2c38e58ffcf5b721ba07c6cda138d95f5c61ab0a61ffbe04523b4ac2104d76d55322a9d918d5f8224
-
Filesize
8B
MD518545786d6551a43165d7ce89316a95a
SHA1800176ad016d4277680c5d104f94d3159ae7c148
SHA2567e7d744b07f8b5f9314dc574509e4aa5e12341daf624c3d89d6b34f8cea71949
SHA51201dc49c87c9796e704fa3541f43f6356791df3bfcd1ff383618a21cc14178d6d45093a64630603b617fc941a464cb1b2c68429352ced3424e1140b14a6d7ef2e
-
Filesize
8B
MD519aae7e6821e360d53005f0ade7010a9
SHA1e723fa1fc9eb19bfd64223e735bda918e85899a4
SHA25637ad6aaedd838b4781472ec00911c0a2989d35a836158bc6014b86d3235d7e6b
SHA512f1bf2542ffca93090a7a3eeb928e5f847167e58c324a82f1348cf5efe937f4ec05e356744698030df2834b405bca3d8381d28cf228b641026772a097950bb209
-
Filesize
8B
MD54af14196ecbef21ed40d7d7176d47db7
SHA15a13d5314a659e6e4d93705fcbd66082740e2a06
SHA2563d7c0ef665bd8e74064cde4d9682300da22f8f00c44b5f992f2cc4bdb7982629
SHA512dc96676b40c4374a0528b188ed2b27fb91eaf67baa10294413a3b0ddfa69f34376e1a0a1cc331612e559585f723cb5c42e111bb80abbd7488bdd29339afb5cb7
-
Filesize
8B
MD5ab1cd1be7245b8d7c7e316049b79b729
SHA10e93a29059b03ac31611925842512c880dca9b7f
SHA256e019a8c0ad3ac39b34ba75bd1dbbf8286c23d4ee15de931a48e8988d746db6e5
SHA5120ac73d4863b8a725d10fde8927c9ff8e5efab620e82edcd1c9e2ac1dcd64c246ae84e8e00a8025a237740df4e84aa36cde995b5a6b73581516168ced84b0352a
-
Filesize
8B
MD505f6bf2bb2ca1f972ec72eca3af79b60
SHA1df237b01477c9dc46c0cf6d2ac702eda871ada70
SHA25681f41350bd9ec6207f6b3912766aafdd3ba7d117bd6aaedff4437c657fe474c0
SHA51208881b3d35823386302321edc76253c60f5e1298155f0de87d608dc148311b7fbc541a4863de170510f7c6c222b6097218e55fd3fd4ab2c4361d883d55f81501
-
Filesize
8B
MD58fbe340d1afb07d937701da5b9fbed48
SHA1b0f6b1d4ccd837ee8ba82cf96086afc09da8d582
SHA2561f7fca47e9d607a7b039f616ae700bcfa962a0f87c2ae1817cd49ec10c34139f
SHA512bfb107dd4f2220846801bf076df2ecb6ef476fb6c19e755cc6940d8d2c9cb12cfd0925b925bec0556048a090def213d950cba12f27756a2243f1b1b694ea65ae
-
Filesize
8B
MD521ca3f45ee32813ca1775dd040102c36
SHA161de6dd0434b682dc96a8c0a224f21c217794e47
SHA256a7c0f01b7762b212e893148383750320fcc8d0ed6790eb307152d26ea360852b
SHA5127d0318dbec9026d3ecb26d68282592cdeb8b6e5f750a51732211ee41baf54d1b7f2b739788b2a66829da1a1d9abb8b785756aaa6eeae46956b3eaae8d905bcc7
-
Filesize
8B
MD50a5573ff86e8fd50a45020969f7111f8
SHA1579bf0660d04dba9afa0f8921abdfc168980e0f8
SHA256a46430e0b19def55cb0492df6c62327161453f5d3cec8ed5f819bd21a45b6b9f
SHA512cb7ab97f88d67b6a52b475fa5a18d22b99a177553e211ecadb62637ec3111b23828cd82a0af6333dec4719c1a8c948856f035c852ba566d6206646507aaf396c
-
Filesize
8B
MD526c8b689214a327067b2ade5dc8d2f68
SHA1f7b9cb43ca9257ad7266e651f52e68ff7109d1b1
SHA25631a982c9c497292207aed317a299b80bf2115e40de7e8ebdd044d3d64cc3fca4
SHA512ae93e182fc3a38c3e0c78f8fd0314cbf2b8839f80a2a3e0a232a60cce17ef30d23f74d091adf73d327dfaa379b228cb18c04e6aff3b6f3edc1b96d7784f3815d
-
Filesize
8B
MD5b5b600086971c724f84b2d4909b3c0b0
SHA10c07330fe549c30208edd5deb76c43745da5fde4
SHA256d1258c3b972c1f5fb04a0be08222241c431ff2eeecb6b41071b15d90dd5464c4
SHA5123d76e4aa5c0d4acc23ba89935f58524d708f7f9577727f7954a5efabf7be3ed0c4ea1601095e7dd19c0e941c130b9905a00b6fa2df6834b135cee0cbf2351f11
-
Filesize
8B
MD50a56508e3a7da04e688be7b8e26fcfab
SHA1780b8f84e4b2e6c7ebaf9e6ef446db39db60b388
SHA256bca0542c99b620f3aec9ce50bb7c96e0b428349a7b14b96206e6b22436945a17
SHA512a1138a11d04d283fe41ba941dd90357ba547f248eb0af3f4bad4a491c83df4d0dd68ffa20cdc04372f81fda9234fa00f8e292968713d70f7ecf84fc16113e492
-
Filesize
8B
MD5937b929d83fc61cafa137dd8fd40e1d9
SHA1b1e4c3bbb91337b1eab3b3daf829cd7b6dddf06d
SHA256a523db4e1ca5e6f0b01e1ab3d38b25f1d5ef1ec4ad18869f701f84c6f6936ec6
SHA512b94923c6a136dcca9cddcfbd9a202f7f52b0d42f72c9d6195eeacbf220b93da853e4ace5124dedb86d9d2f2936dbb8cd64b196bae2b971b4ff262fd8bad986c5
-
Filesize
8B
MD50ebe8be35938c7ac16d9c0ada9e0994b
SHA1762aa28ff34b6c47ce7dfb7813fcab013630dbf7
SHA25614cf74567fdba374a955dbcd965b9eba016092c076e26da91d73b222b553c774
SHA5127924120b2f4a92c26ef7e0c8934d1c2652b0a43e7a12597db842e56680040defd827fe1d7231312f3ccdd748529de3805f7b92c5252cc375713ef42db5dd5698
-
Filesize
8B
MD5e58bfce1c39b6c98325dcf903f91ed90
SHA1e837c8f2eb0fb83c61888bb19e5cbdd17af06ecd
SHA25621ade4b9fd65ada1f9de8cd043fb21c1d54dee792b160ac5dc1584012d8cde23
SHA512053c08f2e19b43b799791d97b22d94409cb38311465958a0f5e20b7dda799f2ea4e8add566bba272d4ee0de6549b99c4c8b8240019fc67c327c6292092d64803
-
Filesize
8B
MD5a2df744ae6485e0895672ff357dac517
SHA1c66aa8221674071b127699f885013b5518252589
SHA256b56a65c29acdc588f116481b6697abb956ae693e640115e9dafd966ead489ff3
SHA512227ffc8298aff7235fe81289bfc804027c804c67d9e6171ad916acbdef8a807280f95224b651cf1265cd164b341679f8210b63e6f1f3543adb0c89948e990017
-
Filesize
8B
MD539b9cf964bd8b51c78547cb677d1ba34
SHA1abb8c332fb74ee2c466bc37add04470e1910b3d1
SHA2569f41eb1aebc49224bc75ceaa03f9e5caa17b10de08c23c7addf3e574cc89b707
SHA512d5c75597ca118fbb64c2fabf6bc79e22c10bbfc018b8bed3ad3c1a20752d7e0a4ae03480e4ed00ebcb1de5dd277f7613eaaa64d2b95c8a225a0c762ed7208d09
-
Filesize
8B
MD5abbdf6b3aeff33b3e3686b91133ac9d7
SHA10ff57728bdff99967e0f999592c1f4d011adccef
SHA256a317b6c378307730b6ef887fd645f494461bfe8968dfc4cbaec4f498c1764f69
SHA512ba76731353ab9b4b12a392ac97d8a14c2e5bd9d6c056523602ebe34748394bfa71f9a0b8591c8dc59eeefc69f2d9d6dbd9b0f42c6ff09a33e54185eab3009e42
-
Filesize
8B
MD59fa79618e93dc19890ba505bace7ee6c
SHA1ea974262b928438b0baf598377a9b79daa41f329
SHA256217d1b79220c9281b265043c3e83f6e40db3b8159b4b546c29fb96d0c9fff387
SHA51213d9ed48605536f89a1e6c3f42e0cbcba4a67af4c4fd5dd0d70a4687a87f6b3c733ed4ddbec63ee67875aa2720a291c6c372e211a1da9cb9fc0ccff40910190b
-
Filesize
8B
MD56eb8ac15b02647866fbde047fe745639
SHA1ab519d9bc04b04371570074e88c9087bbfd03128
SHA25613903301f171114c4904d9060669057e6943a5353ffa558dac81135b943ba619
SHA5124747b9d4be95351cb4b8393abe8956fc23aba9a54f9d355ec892e90e09de8fe5fbb49934d7fb265425f42b88b70de984ba664a6acd76fa153815901d4cd75f45
-
Filesize
8B
MD53e762c5463130cad8260e454bf4d839e
SHA12e306a80e76498b5dab958cbfef03a42efe05e52
SHA25609e31489b5145b9427c77fc2ddcf112c87c97de5809168b2b8d2848b1f612019
SHA512cd831e174667646b1f5fa4a6ab9ca17cadca1367aed5148d55992f404af5e4422b0097468a758c44e98bc62ecdee63ef22c5ad20ac7730805be549e2ff35195d
-
Filesize
8B
MD509265dd4b5840d158348745f36fac8ed
SHA13b573856a7cebffea64e1523fa96e6346a114397
SHA2569e49aaad977631c656a209618fb2f9153f251220ddc472efc71d2dc8d83b9a28
SHA5120b240064d435f2ca07420299849349ca8d58a365e005f3257ada3e415e0b42288fe4d77d75b80a616551118dddec1a357f5215eec9e8a91cebe58ef2eeb00dce
-
Filesize
8B
MD54c6562c9a575445939c724b06ac430c7
SHA1d632fd984ad3ff9280df00986b7837d0c963deaa
SHA25687319888b10d6aec4fe50d33b186d183a7493da776531a945ece255c3f7bf45c
SHA51292d1732ae2c16b8d85226f2d155d01dc7259dcb867d57aa0f0e3de1db9bdd752e2ff64642a2d29d32db102861dfe4fe114703e79bc02660399fc51a34414552a
-
Filesize
8B
MD5ed619fa331caa77fdecf915038db75d7
SHA1510445d2d15d6dd567ee7b746d9fee9c68214050
SHA256da828bdf8097c86a32ad9da5868b0d14ab0e8f4b481eedee2ade19cd3c8b78b1
SHA512c9c771d45cbb427db9d1f0d7864daf1d6f3dac954658c4bd06bc3ce93e7d284c2b31d891576520c45d05179da574d1e42b7b0e78f39607b4a8852403ce394846
-
Filesize
8B
MD5e1a2a24ccc1683a1d8fac0f1a4524bcd
SHA142ff0d725748f069b30516897c9c57f0c78858a9
SHA2567d0d5cb7f529040f1aedd657c3408bee6cc7c94d1bfd6b98f05994679d427964
SHA5124fbe603761cbdf5ac66966ceeefed58273253ef80b1ccd6be2aa81522109f4b7fb8d1d7c98d7ee9625d550039890a2e36fdf24b8efdbb3c89946b3680436f7f9
-
Filesize
8B
MD597929218139e8f9231e06df83b85b876
SHA1ed8690fc62ae1485880a725ed5b9145a1577726d
SHA256f76f209de337e6020535d0468efc1184225da96d63ba8c23c532bb0039988a80
SHA512d89a0ba2eb87f0b634f83324e2a2405f5ed4e5ae8f0c9091978cb3df377877d215ceea66dc75941f534aaed57d2806eac03a45f48d3bed2f49caec3323382d0e
-
Filesize
8B
MD5a4ddf03c19143ed85776ef96877ab15e
SHA1b070f64e0c5b07c7127149fd4a6b70a4f199eec4
SHA2560319955036156877461189d8430c53a740ed68f124b55a84a9410a4b52afa4f4
SHA512b8cac940f9b4dbdb4bcda6ddbd75b95aa6bda484368b96df7821eeac5823f2e35a741c90cf9b3dcbab84181a99caf4c9accb0d7a1f2a7969f9e74c14e13e7ee2
-
Filesize
8B
MD597398c3cac4e79c61c22bd96e156d49f
SHA1c033453a331a8bf17cfe570e36e2f2e04fa05ee1
SHA256903e1e28cc48e5cd0125145e5c5419e0ba901e84797617c04668bca2c858feff
SHA512ab7eb088851163dae81d1828038852686fa456704239e014e13f5ac4246ce487ea797a2a20b6f997551e1e092f5107b7c71b536b5f1568990afc7037554b07e4
-
Filesize
8B
MD51f9ad0f8f13dcf2f0d878d4f85184265
SHA1f0134dc2b44af81632d22b0b5fcd6db52f12f29a
SHA2566b085cea40f28d3960a3ddd00c00285d732518c8bd97caba17af914417a56155
SHA512ad6b615535580f37b5a3f19c877b9089f1dea9ec478af6e554b6392bdb600938d39f370715e076de7cfa2a35b9493024c5a6ae88cd4b979741c3657c57539100
-
Filesize
8B
MD5dcfa331b710af6ff939368cdc491adb1
SHA1065dae5d5ac31a1ca5275d677824d89b950a9163
SHA25631925b33d5ac48cbcafeb9e8f60f0be609e916cdcdd0e41b170ff941f5b2feb0
SHA51297cf1c7e4e48e95a8b72cc4796159d7a719c4d699d211bb8c9aec21a6b7cfee039d3e027290fd2da8ee32aba668a029cb3472afed960db7797f8a7fd50119760
-
Filesize
8B
MD51992fc9514c4bb24422437cb744b3fd5
SHA10a8a2e0c3b9dabc269c3ef67225f06ffd4801ff1
SHA256c532968a02d9de400c8ced7c6b897d1955d0378f32c39b404f08421601bbc6f6
SHA512f86ed4397b8bc3593b855d7fb5a4d5909f0e913ec189da29454ea5b315ac4863e560609eb806e360f2545982ea479e7a93117ecd079f48ede6b2dc971c7d0bf0
-
Filesize
8B
MD55efb44f2c71bec961b32945b0a71419e
SHA1f8766a6087553cc5a4d0b68a28eb74587454851b
SHA256e40d79be0a3df8e45111640400dfa7c94c3f96272373eebfe7343a780c5c806b
SHA512e88b5af26c871e0813f7716f190fe8c059d5f4a217af84e859873d77ff68f36a899103da72044c1664f025baf5d1127d23514bd68d9fbc2171a383792877a5fa
-
Filesize
8B
MD5e3bcf174300c9313552ee39d54fa6d71
SHA1d33fe8d9675d908c38113e1d5a239746274eb4ed
SHA2567d156697a7efe18d1fdcf018834243757cf47c93cadb449f1f446bc5b6022446
SHA512b4b4f94d1d09b7bbff41787518f4dbb77bd46823446c239d1f3b82abe0eb27cbbaa9329a7183c48f4867ad193e7e2ca66be4a9848b797e8c4add3022e56e0f8a
-
Filesize
8B
MD5d2212128d40c1db4aa6dd53fd2b5592c
SHA13666972ed68ea6e5ca6235454cf03069ad0b801e
SHA256a1efc02b08c828afb55451da939886fad06adbfe4c2e2a7dbfa37715895abeaa
SHA512abcfc72db9205dfd33beb4458f6ec1b8f70bc779ed3aeeced90eaf5abf28977f343e38ab17591515c54ba3178c932cbfb68b41fa22a56eba9b9f043a4b2957a2
-
Filesize
8B
MD5921d21e59a7a920440d8b70d700c872a
SHA15e85a196b3db1567386aeb266a8812774c297d35
SHA256c78e07e37263b6f4660392198939863147b3ee7e92a4fbefdd2bc4b7e0fa6fdc
SHA51237c66453311634d6d6d099c0e62dbcf1665128c77acdfdd05f91b86eb24ce65ac050dfb518af61d7a6871d3e308ef9d66049aa76978e3ba39877702096440734
-
Filesize
8B
MD5aa8930a128f0fd4307eafaadb8173dfe
SHA1eb6c7e6f31893c092f6137fe36227926335d7942
SHA256dda701889edb85b76b5c64b08af48e6714752e61a579a9ce271feaf00511ee6c
SHA512ea0658ad923e5cc1f22abd0db760e7fb4dbe42faddece5f8777c4f39f42df6a668ba8dcc69c373009803ab8b25c11de861bc78612f22d714775a64e3704c712f
-
Filesize
8B
MD5b41bab296938b8fc98083d23fa9e928c
SHA1d3e29d6bd8e7fec34f9efb20fd3b2011a9f23ec3
SHA2564624bae491ad74e2d6eb310e8e66efdb7edbdfb79a004c88650de25fd527f4e3
SHA5126d0960153a0956b47d2eeb9780d5e94338180a9a89046d42db94dc73aa789d5ff8a9c3dbd763c0c599daa8445ef53d3edd70f02d1294c57287cbbbe660c8956a
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98