Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe
-
Size
311KB
-
MD5
8e871c321952c7b067d992e523bdc9d7
-
SHA1
fbf6cb8ec2d184f9860103295da2459481ec14d2
-
SHA256
2450bf3410141c9c16e5df6a2944c5b1882b5e6632d3e54e69cfe8822fc7f8c9
-
SHA512
108d9d80e65d8a60e284f5b53e2fb904fcba79ac8d07bac48e2d8e03941f29ac300ebd054bb8fbd9700dc568cb145158c62881a9a4bd35d53742f569cc25148d
-
SSDEEP
6144:fD5YZFgLTvSUYInb0m1fZQYGL7HyoR+aq/UYBQisCGatqK8r+eDnt:7n7SUFQjL7aaq/UisCG+8BDt
Malware Config
Extracted
cybergate
v1.07.5
Cyber
7upkarl.No-ip.biz:100
BAIEB2FG5ON44Q
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03} JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03} explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 3040 Svchost.exe 2148 Svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe File opened for modification C:\Windows\SysWOW64\WinDir\ JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2800 set thread context of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 3040 set thread context of 2148 3040 Svchost.exe 36 -
resource yara_rule behavioral1/memory/900-547-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/900-917-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 900 explorer.exe Token: SeRestorePrivilege 900 explorer.exe Token: SeBackupPrivilege 2520 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Token: SeRestorePrivilege 2520 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Token: SeDebugPrivilege 2520 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Token: SeDebugPrivilege 2520 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2800 wrote to memory of 2816 2800 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 31 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21 PID 2816 wrote to memory of 1196 2816 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\WinDir\Svchost.exeC:\Windows\SysWOW64\WinDir\Svchost.exe6⤵
- Executes dropped EXE
PID:2148
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5f17f53ade61f67d51d2c7dde99660a9c
SHA1b8a05314c3dab85d7f4ae329bac2ae7038bdc6a7
SHA256e1fc1ee68802760457fc1ce5a673a951106ab6e1f6309427f1083fc9a1301480
SHA5128f422391c1bae73c2d61049f39379f8e1e4811fdc457ea95f769b009e90deeb715ffbd6afd890f8aaa33ab29909617ee35f6d0e71b7f0999c1bbd898f323809c
-
Filesize
8B
MD56443e0620025a23dd75d9d52ae644cbd
SHA11eff9c4eb3473dd930d8262aa35c17692bcae564
SHA2567ac06c04feeffbaa0c3d441eb6ce648feb2fbfdc47b93c92a7005821f7410261
SHA5125c8c08264d631e59fb0a790d98a9643aa74d73e8ec86a945e7569f5263440c77bfae1c67621cd56294fa71ed91bdf7e55836d758bb5c2677407091949bb73e0b
-
Filesize
8B
MD5cd165c9c17ef8d6ea88af4c1e30c0cef
SHA11c5ddcd0015d6370e86edd3314f28687d82e9bae
SHA256b4605a592b151cdce017287828eedcc405e35a5573bf413c4204c51727adfd4f
SHA512b4cf6d69b0ed8c352351845c06e9aa333fbf57877561c785ecc1ec159e69040ce0ecc4f91674133c5721276f12a6cc4c556fa12100b20f8a10efd9d1f062093d
-
Filesize
8B
MD58529eedc7432b73668e4cffcf620a74c
SHA1e3d80da8157666fa57fa6ea40f25d8f84baf1f1e
SHA256646264ba99b4390c6994ef43ca021373a68860ecf8439090161b6aa1916b9f0c
SHA512154523ffcb72b7f9c44d804bd18c92d348c3134b0619c100886a6caab74f216adb57897a2e561208ef6264c517ca78a957e81bb5edb25bb619c654e5c51b8fd3
-
Filesize
8B
MD5fb9d754c2b6380de5dded7bd783d19ed
SHA1ff891056f7804b54a7b706fa881b126f49eefdf9
SHA2563d6c658e7b27f04406896ce01a0ec632a37d20052cd9bc61efab17a51d80dbc8
SHA51286c0582bc4c6e46156a5287dd15f1bfe16d17fac556507f4acd434b6a284aed7e2ce5a41fb7a924d89df72e1988c8312331040e02ac875843763e1e4a0109f50
-
Filesize
8B
MD5b274aeafa06ac31f0479a8434389d8c0
SHA10fab6bf7d545663641113f2310a1982c3852d889
SHA256427d9e9baed9837274155a090b834ab9ce6fb440e7e80d294202f9aadb29b26c
SHA512062bdf572ca55f61e4115b67fc2223435542a61e3a8062501acef8a7233b917147d8ef13b1ba40f0f8f237acabd22353b13825f4ecb90d1dea75787a224cfbe6
-
Filesize
8B
MD5179df9b2121d6df744513247ab0a944f
SHA145cc76e8055cf42f9cf5e72346898ddf6deea6dd
SHA2567baedd5b8f32bc72a0c59329e2b95a9f79604100e8135b736339491b0a27bb22
SHA512c5df231df69fa574169c7e184f8db2a3f0d4a02596f56b76edbac63e05f85c553d9a02bdf6f33481678373bbbcb8b37842ba3a6d430c1132b47918dc1248eaf4
-
Filesize
8B
MD55a11c7ac06fa1be6e67a54cbb07f94b2
SHA145a4bfd2065f1327264f8017fbb92172d21c9640
SHA2562920c567b72d3fe5e3e2558e88546923685612f3a1fcc460eb1389cbac00f8ca
SHA512bf45e9089a4f7231423d8b07673e6b89de36afbf429a35e189f6a0beaad7d63d7f2765c92b1c6a6b8737ce1d7ba87fbeca2acd99da70188a42033593b5de81e5
-
Filesize
8B
MD52d5436b67bb199bef044373aeee9592a
SHA1ba167c1a3cd8da2bddc165905527e4ed1d24c617
SHA256d1609dcef843c6a5296cabcf3277d737f5ec86149de87a1e49c403634faed1fa
SHA5129a7088c21e73579950e3df193c560212a85b1cad304568dcabe56333e45e60f735a1162a5700aa86c3ce963b6ee86a1c861974cb7eb15e8ae827b551d2b80944
-
Filesize
8B
MD5327b3a71fbcaa6791772fbd44b34e835
SHA157205b66f12f6577c71b494a3332b41ec3480d5f
SHA256c16f324248bed1432328f9b41d714219e55bb6af6161ddae52361adfed3fc042
SHA512c55f8cf4d1059fa26d37f8a3a9deabc4b6940d9badbf522f827f764f15fd79a76434b5e2edfc0136f43ba582cb528940aec687aeea238206b93f7833fc7dafae
-
Filesize
8B
MD5766fc22be18f441450ba8ea2ac406491
SHA1c937449729900eb2defe046705c4d862f253552e
SHA2567982e03a07f78849ee5566fe523375de7de118a1987deae6276e7b778a489aa4
SHA51254886dfef31023cb13eb0c527b3a8bb0dee56e2e457c57405e6f34a3bfd2893f64ce9c113fc9963d8bcc484c429f7dd122b976f6c42098b85b5be4ce6eeaf795
-
Filesize
8B
MD503fae3ae36125429fd04939bc094c5fc
SHA135afdc2d4602ebf3230eed45e58089fe76ff3d80
SHA256ac4d38cf62fc932a929744045b5618ec27404eaf74196e6c8f114061cbc4980e
SHA5124866223fb57968c3b5bf29524bac4cef5f46d1f7a8cd812af49bda5a35abe85a7d17da465ad8319bf49c8df36c875dd56d117fc98a447297ac9e351522b369bc
-
Filesize
8B
MD5a872fa671fbdd0ebf226383d221e31e1
SHA19015f2c5d70ab5e8dfb9e0dfe193be3ec781fcb5
SHA256629daaf45ab495ebdc4746bb5a684b88af45f40a4ecadc4f1c7e07850fb5a34e
SHA512285b1b15e62e7cc07bb21112fb631b6c85ede9f1de96cbfdfac1bc0599cc2aa0c9ff1b66651e85a48ddb1f32eeecda05f9e67331923ee447a44ec6e89c93deac
-
Filesize
8B
MD592afb7c83de039b1fc63a2b63a6ae3f8
SHA1baa50f9c51f8418920d564526ee079c130a6f7be
SHA256c2aad2729bb559478c53e9e083e9722ec48a5266385c5615109a4a90a5d4153a
SHA5127d8c55bfc5185c6d1f45b178e42362f13a99b4aeacca08d74376d359d2c19a02e4d44a5d4adef50298414fe7b0fe44f0bcb02e39efadddeed6446a85b185e16f
-
Filesize
8B
MD5b0966951f2dd9515bcab3004564359fe
SHA13e94209de9e0444f7e60966c18d2e153e0f7b3e2
SHA2562414c0187a7878bd050ee82da0604b711e240a08f1366f727bff5505e746ca1d
SHA51252ba45dff0fa078fddb52e910375872de697bfe871ecc89a2128477374f130ae504d0513ae7a25dc180f96fc6ac65c3bd0ffca185bdd9c4037a98f3826a0362a
-
Filesize
8B
MD5109e443c3497020aac96769ae69fcc99
SHA116d29c3efd1542491f60942b3819eb7aa8c307e0
SHA2565b775d6c2744b988edd74003c2185cd40b925cba5b503c464cd0c73f719de3f7
SHA5120e37aca02bf08df1fd8560766c4dbbf50c9c43bf50126a682c426d702839205b489031c762e71d8152cb47d10e934effd15ef2699048807a32376c8ef2500514
-
Filesize
8B
MD5aaacd40b718c0858b9ecf26b1a5b0a76
SHA1ce3613c38d564fdac4e406f4ab7f65fe548c9fed
SHA25667969aee34700d559a4d186f8720a90dd6f4a7d7025f163bb371bf3235ffd7f0
SHA512b03711b2b69d53967ebe82c6f71a8e0de7642736bf0a3ba2ee2971dc2b7a794b68f807c52855b016a83563c985e07783bd4ea41f2798907142223b4d6851170a
-
Filesize
8B
MD5bb6e02c3187e5c4d9c0c431e186dc28f
SHA1d726a3193f6cec75d86cc03bf445c1f62e415eed
SHA256a5a6b0a5b224803258428bffd7ae70284e98482b66e7714f10f2f6625a17108a
SHA5122855855f8ae2c7faad0ec5e686e9b410378417c0f4f711265bd4672435f805b496610f40a2a11ae91f8fa7aba57c85caa514d62a5f1d7b0d10c43e253da50f73
-
Filesize
8B
MD52fa4959d67f2e8c1fe71d7a7b2ba85d2
SHA1a18e5ea2eeb1d262fea12c733425ce98e2ea754b
SHA2566f122924f1f18e69206d6b973085e8c61615e30f392bd5127e763089c5a7f8b3
SHA512bc34f214c86671d6f6ea4044cd736f44ee3291f4d920596b9825d05971e6bb376f7f3733428ed3711869aa1b1e1ec3a0f7e9b5c0aaee1a9a416841333fbcc82b
-
Filesize
8B
MD5da0e5a523bc965f2843bf45ef12b8bf6
SHA1f6405e2718f8c0630e96026e0d80f031093c2100
SHA256a90614a3c3c1875f1df27dcc2335214468586edf3b459a61c8497efa5c3b0c87
SHA512029b4d49e96ba21473c50b69dd879f55f13d5e4143e0705cefe9e5a33463388e9a4b670319e48db3f462b1956d2eae90bb042a9265b5f15a7dcc86c6ed57181e
-
Filesize
8B
MD5d658352ffc25e149c707d9f588a56f7a
SHA1122e5b30d5ac5ffa7236072c9849ce8bbac97d7d
SHA2567b24deead217aab18d82abf0eb7bf906c317eb75bc1f86c98151f9ecd727eea1
SHA512d8cbe6055e4649778f6f7d20686f71a427649c46e08c1e6eb557992cf123a27863f2ccd283bd2f4e97818b3fb5e8b0814ac6efa90bd6fd0e0bf5fff04af6cbf4
-
Filesize
8B
MD5747f5b70dfdc691a6ec3b02e1c011ecc
SHA142574789df0a6d86ef38fdb709b6667398f08bf8
SHA256b5808469e472760ec87ada43ee6f3ef26b88d81546f712b50a32964de1705749
SHA512ee2179eaf55e37e62a89f3d1707181bb65b05442546456a991dd664c800bd801f8365502e6bcb940ba38e9c630b9cc7d28f767c2327b79bbf6b81a3daf0a4950
-
Filesize
8B
MD5019f81e21aeb8778d466e7f91ef42af2
SHA133dacef330e1d991fcc8d318316d3e3fdf1a62f2
SHA25651923acd411c10694373634daeac8f3c5aefc520b4265b06dbc5b7736d115076
SHA512ed4a5fdbf326ddbc6661529da8bc65d838100d1e34abdb7a9b28025bf84f0795d958b410a9ecc1329350a263ea77e84fdbb02757b3cd369cfdbfda809cadd86d
-
Filesize
8B
MD52890d427ef1e28925f7eda4b93607351
SHA10943f6bae55245722fa58326360e411aa5723ae5
SHA256374fad1e394527ef58b00274e6bbdf3de4eac022a0fc30c67dfa7353432c8197
SHA51248e6f1ef107d84cb96aaac2c181207df2f24ff3599c1cb150dec4ae75be2225dd5b95b3c8598082e67cc539acd8b071192b4f0b193d567a69d7928c92295b0bd
-
Filesize
8B
MD5d9df3bc42c76fa5e1988adfc0ae5ded0
SHA1c2c0f46bbe94bdb0d1ffebd98f3bc6d8dcb16123
SHA256d6a9e810f98e894a8bebfffad4b06a18e67ce67a79ca2504b37d0d9e8bd3fdb3
SHA5120a2732b0a76cdaa6fa7eb98a5c215c1c0b31ac9dcbfb82ecc0f9bf4119aa5bdd359d9fc9f4aaed3b58a74ced0b8580e54c1b59327df4a0b2c0253f6bf19002b4
-
Filesize
8B
MD5253e53e9ff5578021e1dddd613f77a2e
SHA176bdaf2f063c0ff33bc2b1df9f014ae0098bb2dd
SHA256b9671e0df1347fc247f650d30bff87dc27e7f50f0de4d3f89862096f78f302ec
SHA5128d3d576fe4fc3de8611e3be25acd650ca212ffe121c4a30acf49640a33242bd5c9d5cafb45ea438d1a886a80ee96b1d573ce81b7341f8724182b2ca89ccf1650
-
Filesize
8B
MD5b88e30a972fcb60d43d5b41f02d1af41
SHA11c4f2197495e9e920d199f4ef6cc342f2f8edb11
SHA2564df5766429582b146704cd7b0c276649431e2640342830b2caee495c2501b457
SHA51225883738d5f2ffc43899a715aa34e4faeaceab15326912d5185cf695026a4179ccafc43a24475018dcf2ccf804f2266c3cf340711f0feb1aec72ab7feaf56c75
-
Filesize
8B
MD549b4df74bbb535a36501e62412594305
SHA10f75ee98bdb42e61e72862b71b759a8735301df7
SHA256de04427c45ec284312e53a777024f4544a18104826f180fc1e6dbfa9c4eba839
SHA5122acffee1bafec9e553e25aafcf08c3390ebedd3955f8c1a20d9fdb34125c6e20b6753c8fe1c19a19e10f2a8c990d1b8c28c9b1a3c7f7e8558efbc997f6dca038
-
Filesize
8B
MD55ec79516e33df1f572e75d95748dfba0
SHA1d511ce51f9c5ad81b772b5a5d885dd50409ded71
SHA2568a818337793dbee6853198dda31b878128e18de5bd074301b8855250970aa2b4
SHA51221741b8b74ce5ad1fdafd34f442ef4b6c7b00f1e6952eb7cb88646dceb335d711d0d33f8ad9e3c31f21a4586f69e4965bc911a76f35235666d669d8ff5499ba2
-
Filesize
8B
MD51c429e5136084201cf024bd728ab33b8
SHA1d361cbfaacbefb45b19168308b3addcebf35a9e5
SHA2568af11d0625feec444cfe997a81068e2de62ad0bceeb31d6d6d61a5ad60fab584
SHA512cf861f96328fd5cbc76caba0b85b7849780a0245cea66a8ba7f7ff97332593d503b92eff7c17dd6cea3e507611157f5fe3786fffd4fcab7a020ef6babaa6d2f5
-
Filesize
8B
MD53178985037c9f762949014e9b4a80097
SHA1ad99b69d43bb2857467c1ee7e039c61475d7a393
SHA256fd79cbadb8b4870e98412a5d51f3dd023a296cf44b98fb6fe0926b738659cf6b
SHA51245fc13c9cb0d540683ebf59057beacdd0ee1859e4189de5d3f2e86a1c75c197a65e06af011d4431e98f6cb8cb136b1e87f4f1e647864249c0848b37cb8f73644
-
Filesize
8B
MD5399466f8abf1e4053a9b562ae34753ae
SHA1af8618263b287223cc6b40547dd9399cddbf800f
SHA25650329c4dc1f875a94f087edff4ee7f92b58190cb3094ae84a13ae11d96de81cc
SHA512c4b7ab6d3cd65d747248338482707895e69638d8d61cb2b29356f3f1f1105f0a7d414df1c54d84838b4415fc795a9b950511d863608b147b445e04665dbd2586
-
Filesize
8B
MD58190faaac9be7729172d36a3ad6b3eb9
SHA1c0a3a4556d1103f2996a43a214af94937671c6bd
SHA256ec0047378b6e59e7e28a9a47ede7bd6f7fe1458005141b0464fcc2410fa9974e
SHA512f8e0783a2f31205530dd41aaac474a87286cd0676ddb70fd7521ddd1030b77f41e8df61066a0ddaf6ec0dd10aa2a19a670df409e9d081f7f5c5e172258c274c8
-
Filesize
8B
MD54a6808d398848e14115c2363463c7b5f
SHA1f62dbc217858ddc3a7a94bcadd072d8f1a5b6999
SHA2566f7564129832ab342755b0363fc1df836a90f91ab535475da3220f4c02e046bd
SHA512c9b692972a5921b874d591137a45c2a1df2489e7712d96cd45087bbac9a6d49ba4b3445fd3623a5ed52f97df2eeb62baeccadfcb38e3898934f67fefb784d6a0
-
Filesize
8B
MD5a5c816774bc6ce8e103b42a4469f79bb
SHA1845ada9e837c31f890f4f05ee3f3f1346ccc4fff
SHA256bc35b246cf08b61b704255913a2b282ab1e189479b2eff2eb8ddb7548174821b
SHA512749bbb7ff97bf82992cefe270cc399e64a913c2ed4d8f4edff1eb6198e6419fe285a06cdd0fdfbaf2f6f8cd2ec9725029ab930529619ef9fa0521f47bf2a7425
-
Filesize
8B
MD5c2bbba9e2e6710b7fb398e1d516596ee
SHA1cb1a8562f07635af7b0ecf0da330a608aa5272e9
SHA2566f18e0f0391122a55dc330df440743d216efbfb806d55bea06679af67fc1bc6b
SHA512d84aadaaba6c1b8bd7e49ef3ae88ee8bb22499718992b5e96b4bd28de76d854ee35bc50072fc578e1b74fe9e6c1df3c1f58da279ba4c8cec24c0cba3a66a728e
-
Filesize
8B
MD56ecfda095f4f37b7d86a89b79d297f90
SHA13bbf503dfa84ef1ecd487cfc21785159336734c2
SHA256675a9d075292be19c2383d9bd136d847ce423cc62e40aa7b02e8a6017dc14710
SHA51241dc9d7ed5d74f600e2877576bf8c19dcf3d6551cf9634e4c0c0d24e7854b9e295fdc5d2747401153d8ac37486b1f688bc63249f8021ea90e1418730f3444fa3
-
Filesize
8B
MD51efc3d69ee9bd4d53e6ad7d2303bd569
SHA1cbd3ca14d32c7c9cf589bc6d4aacf7002a8e8d5e
SHA256c25172de54624c5add0c3750db4e9f33637c16453e7b7ebc01c5c283c27cdfff
SHA51209ac3bed92a72d6890f3018f4933398fe64bb064ec0f2d65586c2fb79743b59b7aec06e18d9f048a53e77bbce0d2902a254075ba31bcd32e36a7816040da17bb
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
311KB
MD58e871c321952c7b067d992e523bdc9d7
SHA1fbf6cb8ec2d184f9860103295da2459481ec14d2
SHA2562450bf3410141c9c16e5df6a2944c5b1882b5e6632d3e54e69cfe8822fc7f8c9
SHA512108d9d80e65d8a60e284f5b53e2fb904fcba79ac8d07bac48e2d8e03941f29ac300ebd054bb8fbd9700dc568cb145158c62881a9a4bd35d53742f569cc25148d