Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe
-
Size
309KB
-
MD5
89b8ba638dc59ceb654fc85a16d3ba17
-
SHA1
3582f6fecc6881dba35f032457264e3aa84244e0
-
SHA256
265a7c02e66732a96c281e20d4e9825e5d42116c8e21dabf20b6593a78b392c2
-
SHA512
0694707c5e557ad9abdc4e1624c779b20234676ab407a4260645123dc36097383da039f096a483075d79c2ffd7cc9632388564f28054dc22e62cac11cd50d136
-
SSDEEP
6144:zBslQl1sRJpzJvVWDolgKaDRNO/Z4szvlYsLX3ZQUOq0NT23oxJAiUgPeoqx8tqd:NslQl1sBjrlgvzNszGu3+WoJAzaelR4w
Malware Config
Extracted
cybergate
v1.07.5
Cyber
r3d4ss.no-ip.biz:100
APN1L18BF35I10
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" mms.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run mms.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" mms.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECYT1EO1-F51C-BFJ2-7J32-NNTR6X61D6NU}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" mms.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECYT1EO1-F51C-BFJ2-7J32-NNTR6X61D6NU} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECYT1EO1-F51C-BFJ2-7J32-NNTR6X61D6NU}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{ECYT1EO1-F51C-BFJ2-7J32-NNTR6X61D6NU} mms.exe -
Executes dropped EXE 3 IoCs
pid Process 2728 mms.exe 340 mms.exe 2244 Svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 2132 JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe 2132 JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe 2728 mms.exe 340 mms.exe 340 mms.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" mms.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" mms.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinDir\ mms.exe File created C:\Windows\SysWOW64\WinDir\Svchost.exe mms.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe mms.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe mms.exe -
resource yara_rule behavioral1/memory/1500-544-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1500-901-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mms.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 mms.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 340 mms.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1500 explorer.exe Token: SeRestorePrivilege 1500 explorer.exe Token: SeBackupPrivilege 340 mms.exe Token: SeRestorePrivilege 340 mms.exe Token: SeDebugPrivilege 340 mms.exe Token: SeDebugPrivilege 340 mms.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 mms.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2132 JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2728 2132 JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe 30 PID 2132 wrote to memory of 2728 2132 JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe 30 PID 2132 wrote to memory of 2728 2132 JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe 30 PID 2132 wrote to memory of 2728 2132 JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe 30 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21 PID 2728 wrote to memory of 1172 2728 mms.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_89b8ba638dc59ceb654fc85a16d3ba17.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\mms.exeC:\Users\Admin\AppData\Local\Temp\mms.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\mms.exe"C:\Users\Admin\AppData\Local\Temp\mms.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:340 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
PID:2244
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD50ea18bd8abe049374db87670e3e35a2c
SHA13bd76ac667742fb904b5112bca91299b895f294d
SHA256bc893787eedd1b13b518611c9978b6a2bb12a38b7495be3f68ae6109a5a14e84
SHA512c0472d764cbcffc548c4209a73b50db13833fe8848e3ad4035b7a5483aa92d54d1105c6cbc8da466ec8f68cbe0673363a15be4fdbdcc59a63a2bfa387ebf2efa
-
Filesize
8B
MD51ac7115514ee242a88b09eae6c73d4c7
SHA1e6c82eb696a79f484b8e37e3ff2c5bbe391c3ef3
SHA2560da725fae9b9fd65456277fa003497ead30e0d4316212a8075c34172b9cfd0e8
SHA51298213da7e938504d39097c92f593c7eb6e0a3a82b85341281ee7d1b2f573306f2fe85dc57b9a1019ae24294637872f15d801b4fb0ed500753050dcc3223c2c5f
-
Filesize
8B
MD5b0c64721abe84e9da49759b11d962966
SHA1fab06b366b604df0a598d52881d5d86a918b05bd
SHA2565d698f5cea917cc3c0ba90b28e9768c2f30847b616abcbc02d5e63973fd63325
SHA5126c6670d39ff721f73aba4728717e13e7b86cb08984e5407ba875e669c979fbb711b8b828e3bc0396063cf7a93ed3fc99f3829be3ebe91265d590cff6c2b53041
-
Filesize
8B
MD5c51a392507f1f068f8a83df2e34b375f
SHA117f28a54fd4b7b5fefccecd69ae4df9b9a8f56fc
SHA25609ee45e1279b6baa1991eede2ca1c5f65a3412a25d14d04e75720e18ff4d4736
SHA512d778be421242eff4e7863fcc3d55ab425bf6ddde8b6605e255110e849ba506d948461bdcad608efe9987b1750501f448af3ce23b51d2dbe7dd1a906b184776ba
-
Filesize
8B
MD5c6e756f15be82e76eafd173928658e4a
SHA1947d0b89c9a039b6fbdeb493be5f22201d362314
SHA256f9e1a9c2b32d605ac80da34939dc54927ff6c959906c1a35d77f4e4dec5d11cb
SHA512ec7e83885336a89439ef01fdcb451c32454adc316e1010b5652c87238a50251e9a50d66cb11ba8801fa9a10d6bdc9785e937eed16fcdbaae8cb0dedb954833bc
-
Filesize
8B
MD5ca39ba77406fa489db68adea5ff76e47
SHA1822ca5e25737ee510bf926121248f4d8deb6c177
SHA2562ebe827dec97ee4c1f0baf976c592f4ecdb00776b32bc59d5a51043b5ae05631
SHA512846367781622a039711992777e8c394703b1530e95c862643c4e7244755d0fa4de288d2a8659ccf09d3a7929fa7f481c7d0164ee864dc9927247728420cf653d
-
Filesize
8B
MD515a8be2e068a2096731621ed4c26c88f
SHA1974852bb7329ad0afec2fece97fe9d44f454c2d1
SHA2564e515421437b86b73af62cf7ce33311c01889d9bb6c9076fdb6be06e2dc6518c
SHA51285e98e9b133ca8ad3a0b1cfc6a3be52f474eb68633b0d422710c47d94571f53538369e98f1b2d694235858dcf991d36151629fbcde2b91b8d138ccb334ef5420
-
Filesize
8B
MD5c443acd27b1876b11d0829cf8e41552e
SHA1b909d15a44f263bc9c06c4c17119050aea369dbb
SHA256f00a63a3f63fa828fcc636fda315c19481095bf6146f6e0cd90c9a7de07e6543
SHA5120f2969decb84379919a48456aa30b893af46da34dfd8fa7220a391114030478dd7e0e3911443d45d957620c8be79cfa7f9fb40851c45fd22014968ca850d626d
-
Filesize
8B
MD57033612cdeb3e00ab115583acff74335
SHA103c1b1f08f585eb8e412e9e6a96fbfbea54f9212
SHA2567ab45ae452d469a040eb25e78ab1b2fa44ae41282a9921aa045815aae601baca
SHA5128d9a98af6963232c23ae25730d75555cb160a9156e1c54ea0e7db66ec8b584d48637c8959446f490183b628cb743fd077fdeadc8f4dd82a37617fbc33621f5f4
-
Filesize
8B
MD51849b7d631c50a4828062bf9934d5646
SHA166342ed9039360272308b2ef8d2a925ab681c5b6
SHA256c5a01535f73c43cc1ba0bc8251036ec762fcad219821d6220779bd263f943d80
SHA5124a13182d4d33bccd5a0ea051462a40ab3c9f1ff4a22d6b2f6a25768c9ad6a09d382a3eac34e69aabfbab8269dbb5b4ab020a7fb8396bc39a45d255535716e09a
-
Filesize
8B
MD5146ac8e7de89bc574da77222d010f9c2
SHA16497d03ef108384e10946a530f58f59462172a2e
SHA256108b9159a29c3083a966c9c71f6611b1495da0bc354b7156048c49bbacf7a907
SHA5121f0f39e4a8d04d82d1a6ed4f4836be80776bab02391c80711dcb88c66c0373436a5f8a22b1661ab819bc614427a55b4c44015ff3e9a9bfa57fff3400791abf16
-
Filesize
8B
MD520000e5fcc4b99c21820558f8562e9e5
SHA1098a6f5ca67906d1e4376f12d43e58c2a3249dd2
SHA2560fc67a5ff34892e788903e7650514da167e5378366c1f2147246f028cc7625b8
SHA5120e51b5edd462ba1d807d48255576872b745b2cc85d117e16c1304e7e5a89a698faedfed533b37f5100c29a1a67323ae07f9f2dae84e915baec054e4dd4bcdedc
-
Filesize
8B
MD515db67bf6dd865818b052ddfb475ed1f
SHA15fecb210fca3396c06b22a2d4ca0d96f194828e8
SHA25627438e5d23a5d390257d33e0f1dfc4206d7a0a8f74be9466191d21bbbf860a6f
SHA5124ae15914d14a1ca5f559d52716d80ad7f546db16cdb996d0ef464715fa1f0a2d7f0da4b84243f742519c8222fa7053c29ad59f13eaacca68f6f89fd707bc4d53
-
Filesize
8B
MD58862cce7c178762f335ca40c8a2fe3b8
SHA1889aa91d2ddcc077d48a3613c7e36dc1e41b78b9
SHA2563d0142155a9c381539daf52bc4548086959550500fef75864dd1c5cc07e1f2ee
SHA5129663fde48cc81c7db522bc608ea759c3d7a16f90a9b59ad2a9f183757c34cfb6d151d904a51e8bfa6534d08c2add9a305eb1f074e31c7c3c9edf6e9fc5d05eed
-
Filesize
8B
MD5173f2c1260fa3e82756c22407d883ee8
SHA184a3160ecf9df490619900a29d3adc4708902779
SHA2563222222bae24968de0fbfe06efbf4d7a8e926dc84f896952eb8dc64d5646ef4f
SHA512df29b80ca9ad882bbe13080ceef9ba99169d1b489b4db15201ce1e8fbf55558438eecf8c7a325ed959a5c451f1ebf6851c5315447efa9835f481b90bd3e46804
-
Filesize
8B
MD5d8b75dceb53e7c8bac2edb325e81b62e
SHA141e34f1ae5df2ebb875b07ffa89228e601529a07
SHA256b22f589e235d9e7a8de21a64eb8822984f5fa7d3cb96a67ae6e06000ead49396
SHA512867f02ffd27e883fcc0ca6ce3d7745f9cf44f4f9e25a0e23da3b3b21d940c87f9d2dbada5f954a138a1d8dfcc4935b3441e1107306cb5b7f772670bf8e8fc94c
-
Filesize
8B
MD5b1fd663a4945a240c19273b3e4659c1d
SHA1fe79521a759736e4da8d1462bec52e5df9076c1d
SHA2561e25853e612c8a1e6f5c763caebd3d4f1016737b6cac3b67dc27dbcfbf9a890c
SHA51277117913743459629a0b18a16f503a43e9faa2a3b63b19e4dfec2771b5b74c3ddc5224ea06d2740b3e7020ca033b4aea3cb82bd2c46f553926aa760546ffb79a
-
Filesize
8B
MD5da074c1d5627f16c816d185f9836b171
SHA1ab2c8841fa945409bd9838d664595a9c9a0966ec
SHA256137fed578b1a8292199079a61ec8a5ad06dbafb2c10ad16e20e92f604a1e9b81
SHA512608ae1b88789c39d441e97393fe7c0f4321f8bf9e91f9e295ce2eaafc707574885aebe4a8cd64ef6bd656accca3c1408df126d8b19f279484caa4cf6e128eeeb
-
Filesize
8B
MD5b7f1be39b5ef927fabc357b3edd8b3b7
SHA17054c06967efe06fe8c13931ff5964e9fa2a4072
SHA256658bba95cdda5280e5ecd2932e45e2d72f379db0f0a3b2ffc714b96020236c98
SHA5126e03a82b1cc4a0f0e5f7981b85ee1693c139b6e67a9c3c920b62c3eea5b6fb54273eb93c1e205ff139321a2e431aab49f2b0f33889cf1020fe4f3138de601bc1
-
Filesize
8B
MD50bd91d18aead43913b21bc6636aaaf5b
SHA1cfb3dae79d03b274ab33e1cd0df3ba226149e0dc
SHA256b0704b4b4ecc9002af602dfcc29c33841f29ad185b61159f32fc3ab6480030fe
SHA51214d46f2007b58936dc252067ca2e0c08ea3d836f4cdc39dc7d41320005826ea37549a65f3a27ef2c9cba854fc9b38b1aa36a1bb72ffaff467c86d7b3d2adb2e1
-
Filesize
8B
MD533062fd9c57202a57f0f4b4a2aba7ce8
SHA1f1187c8ae484d312cb4da68ca06f3fd814622e3d
SHA25648de647a26c8de46b3868736d70b40090a51a0d8869af0f497dbcad4f4087c22
SHA512affd245f134cf41cf7b7141bae2629a7fd7c3492750c55e99953eb55402cca5f7e62727c4f0333bc3dfacfc7ca5fe3e1d5e74a4866b368ac8d05636e7267d5ba
-
Filesize
8B
MD598a856d3259f4cc3063f0cba13641234
SHA123e6932be4f635d8f96036ba187c5f3f3756ff40
SHA2569cec7f97e829279866b63222b5e3c28aa5f1245df0c566c008250198e8000f6a
SHA5128665323aac9c725a01e889a186fd6bc34a14e0a8b5316b3886a22d0f6d353d48e86eacd815bf1d5d3a814d4e398bba5cd43fd2008803f212fca2fc3e6488155a
-
Filesize
8B
MD5b0db864f56b69b0f29507b26e8a2f99e
SHA10a3521438d0462c495caa689745e1423cf02f764
SHA2560d9300f8d5893dac772e949e7d28ba982ba18b5e12cc84e333cd4ba4482e41a2
SHA512ca05b35c08b95b3132a34093c4f22eab148b86e1b53a5e3f41a6d23695eef0877174c83362af0d7b55f7e25991e6f52ba866c689981143d5a2d037024705b0d9
-
Filesize
8B
MD527d14be57eda712d3a90d27c64a8db1b
SHA1f77d50ca4d0a17bded187d709b5cae7e53afaa24
SHA25648b84789b7388f33131ccdc2439773221f06da2e5009169477f759912ecf3034
SHA512741fa13f60130681c8dd05632b75fc69e286e3f8aa31de60ece11d60e3da485ffde21cec13c27670879d3f86a9df0d063615f021b9a7931f4d28989a84031314
-
Filesize
8B
MD59bf2e364e39cbf807aae21807c725120
SHA15817ab4d16bc5501d88dbceffa05636a978718d6
SHA25667b9cabdf84f36ed9696384c4449e35ce86d9eb68aa460fd6211e41352890767
SHA5125e966df1c33c9f687d17eaebabfe95d94a32c1988857a7d69e3ebec0bdb235428242bc193ad8e182e8bb57c981bd3f8735cb1fb427160e1bf4f2b229849895e0
-
Filesize
8B
MD519552d097b0f682b9c3eef42ba75e532
SHA156a2b5127d159a40ed1acff49f4b2f9aa0575600
SHA256cdb228cf4f4bb375b1abf0249f4214ba8bccf5396a8300638398a7d89f184c9e
SHA512728a63ec9aabb94f8f5ce0f9a3c2bb0157ce5561445376c63b17ff3cde0e14551af5de0481af6e4c777187a2e448d7567e6cc8c43dbcfcf330ae8adcf234692b
-
Filesize
8B
MD59ee480d31591bcf5cbf55d0495b90684
SHA15034edb21d866e658cacd3b01e4b0d1d104dc1f6
SHA256b810cd2a59672cd0cb394b48e6c01f23eb359c6e9c1a1704d1203f6067cce62e
SHA51234510451f444d78129b9b9f9070227ebafb6e640e4d0d8d4914a3aba7134b94dc22bb80c6332cdf5c6bf40aeb871a0467c792d69bade6fcf62b96fe1f3ab111d
-
Filesize
8B
MD559806aa0183a6a27f96119344691f383
SHA1a90f7463e7507ce41521dbbe1910493f8b27d44e
SHA256ee08208208d8d36a2a3e6964c7ae94bec35003feab41db4187769695dfdd8bdf
SHA512b43beb6440a83bf4db67aa72baf659e69c2aee2779047377acd0c6351c824c3194ae9b982367ac08b1aab8ba41d973606eca9f1c5bac42b437bcb6db65f537a1
-
Filesize
8B
MD52b9bdeec224eda285f6f99409df1f42d
SHA1dbb65d12e479e226df6427c43cd58e79117796b6
SHA256c0c2f667e47fa43f07b47d51d6f1aaf5141d5cca279cdeaa746d132f5a6ba218
SHA512a66ad125fe1548805152cc998a1a9ce5f026a3d072b7660f09b4b89e0a8148c3e70e63025a1b5c5334d4a5c529028e9ad17b1fb296ee7038e9d7bf3418ff3e00
-
Filesize
8B
MD55ebb4ebe667717b2b162e811a0528011
SHA141850c803f2d25d4f3a8f2eec18c68d3103ef859
SHA25645b014fd67a49623c840c0fc484ca93ed638aff812a364e3721fada8d2a8bc06
SHA512f3a98302355616620145ae887e63afa8cd369297f69e871ab2333faf454cf7ecbd90ed71cd8c25c2dac402111e20e7f60ae4d5ffeb394cb9caf2178d3a07cbdf
-
Filesize
8B
MD54fb60ecf103a261429d74b480a0a7409
SHA189a6d37c089724b0d5338ad9019350517319f2b9
SHA256256148c687eb10f80463ca8a76068336377532ed0bad64d3d64db968ae22a7d9
SHA512ff0f7460848c4d26259b76c8587094b5322d926600363d40c890623988235a39ab547cf24d97f23507989a8fc5b626c12001d7c3dd1617c8672cc2fa35fa0c75
-
Filesize
8B
MD527b22bd31ecb0b2c094cfe63ff3cbaf5
SHA157f0c1ff6a33f05a96c2b456c82c25c2ef2627bd
SHA256968d74fc79f928c6343159667c019832977e828c069f11dbea8cab7138be2b43
SHA5128561728945d7888d0c11b4078e78b1aa97803f10eca622691ecc480977468cc0d03d862ac9fa21cc5653eecae6a36b33ebc96442ff3234c677da36745e61021b
-
Filesize
8B
MD544e62b348f078b3b1c0e0fa4c5814939
SHA1a0e81dfc7dceda6524c72a119a4ce81ad20f0bb1
SHA25605e0455865a0a4222ce35797189f4ed2424b2a6a820c9cf20d6ced0b6f3e0ea8
SHA5125bbc707d18be752acb3def53f6cdd4810a9615996e931554bd8b45cccb54f7a7fd49c4df442d514a233a21a8d9c9c4c7e7728927defc523ebcd1aa6cda053831
-
Filesize
8B
MD5f6622f362cad538f676eab238dc4886d
SHA155e739fb31123e95469600035966c25846a27561
SHA256de28a3dca38d0c778632b8331cecf829dbda3ede70ebbeaa62c53fc9e8b891e0
SHA5121c642b2a69d047e0ef3724aa54c583eb1f1dad245134b38319e792bb1f095b69169e8198968fe052e0ffc37113f024eea5f9559f82eebe99df110c175210bbf0
-
Filesize
8B
MD5a5e6f2d923610a345789b7441a933e4d
SHA1b1600fcd2f33d297c2c9855e4bb8b3c771074e41
SHA256a38ee8bf85a2f7d5fd6ef920245f912133a46a1a489b55f202719b77f2325f15
SHA512b4542cab750f32eb9cf8422b96eb3b9cc84a3757e04c77e73084ccb79c6f43b6c59b6c780e6620c712d0e76dec582ebf5884888cabe37a7c533bbd786276d0af
-
Filesize
8B
MD5271ca84dcc493064bc98cbdf2fe8c4d4
SHA128f4c57025f35a4e4bf219e7842d4c335f5d6801
SHA25636a4a2aedb779f3e4641ae19190f85e6a65cfcb0e04da397680018185d505d87
SHA5126f7211922aeb31de4cac2ad73f63b328eaac91c2f1734ba9727d3d8af0292a5c27535a49c170a5c887039ef63544617e809b552ee47c95f7eb4692d85f90ccf4
-
Filesize
8B
MD5bca0b118ac826f07eec0fb02f783705b
SHA1d1ced985e717c7906ba7929d4b2404400a9724c5
SHA2567f8fe27be0347a2d49d2964616e6efe2daef059978f2e2fbaa5fc684ed56e82c
SHA51295d628e421a106e6a04953591d611ca578070ce702fdc5822b48edf20134ab01da88066696a4f248a537ed50c2b6444d40bb1f9a297b671cc4573a81886ffda4
-
Filesize
8B
MD588bec0950c7e4acc48b992c085d6939d
SHA128991953eb3ec73ccb60b0d18e85b8d36dbd340b
SHA2565a6436cd83978d1378a8bffc12de9f598770fce10e218e64b65756ace2987bf7
SHA51203d4f5c8e6164f485079744f01ec1375429e663158aa4a5448410c547489329a86b1d73ddf3cf4acaff9ad2b28ae87e4e78cedcbdc1d794db5f712d30154de1f
-
Filesize
8B
MD511d423d892ebcb9f35077815c7a2b71b
SHA1d8377319a651787988811bdce8c92f8aeb22bfbd
SHA25669b8260c1094e3c5141db437e398456d0b4b8e4b3d5455c2fe7f770415896245
SHA512da21f74c38e0297326272506ed8c16975b25fb37ad471ca87eae2893e7a27b998e6f2c8614a005d5ef49bd56c9f6af15066683b36b7fe768575842e4d04f3b16
-
Filesize
8B
MD571e3524f544f896e720d8a44b37e695d
SHA111522c29f117bb70d93333932b391d9821bb6145
SHA256e2f0981851dc1caabfcecbb0328886878d762f0bdd4050c055dcab484f2aa26e
SHA512dfa56875b9561011b873e93c1989b183bf7693317f32d2277118913b719a45752f03638a9d309ae4f081ce262e54aaa1242f78425916fd1455324fcebcc20e0d
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
296KB
MD5bfe3bfbb897f05c95106af87d06967d4
SHA1ad7191aea7da9086429c5f5ebf0815e84b6c7276
SHA256461169080d87e806c58c6a5ceca189abccf252f594d22fa0ef53103a914293ce
SHA51254186901cbaec757bbd145ac7c0bcd53a54886ea1d1f75842afb9f9c2c242dc00a7362b82734a074b68416ccb7e77fa6ee33d50666a9eb5af9b336818e92fe36