Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe
-
Size
311KB
-
MD5
8e871c321952c7b067d992e523bdc9d7
-
SHA1
fbf6cb8ec2d184f9860103295da2459481ec14d2
-
SHA256
2450bf3410141c9c16e5df6a2944c5b1882b5e6632d3e54e69cfe8822fc7f8c9
-
SHA512
108d9d80e65d8a60e284f5b53e2fb904fcba79ac8d07bac48e2d8e03941f29ac300ebd054bb8fbd9700dc568cb145158c62881a9a4bd35d53742f569cc25148d
-
SSDEEP
6144:fD5YZFgLTvSUYInb0m1fZQYGL7HyoR+aq/UYBQisCGatqK8r+eDnt:7n7SUFQjL7aaq/UisCG+8BDt
Malware Config
Extracted
cybergate
v1.07.5
Cyber
7upkarl.No-ip.biz:100
BAIEB2FG5ON44Q
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03} JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{2YW4HA6H-R1BI-7PCJ-2XG7-XTQ4DP007N03} explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Executes dropped EXE 2 IoCs
pid Process 5344 Svchost.exe 5844 Svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe File opened for modification C:\Windows\SysWOW64\WinDir\ JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2400 set thread context of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 5344 set thread context of 5844 5344 Svchost.exe 94 -
resource yara_rule behavioral2/memory/668-14-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/668-17-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4604-79-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4952-148-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/4604-179-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4952-181-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1808 5844 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4952 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 4604 explorer.exe Token: SeRestorePrivilege 4604 explorer.exe Token: SeBackupPrivilege 4952 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Token: SeRestorePrivilege 4952 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Token: SeDebugPrivilege 4952 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe Token: SeDebugPrivilege 4952 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 2400 wrote to memory of 668 2400 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 89 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56 PID 668 wrote to memory of 3544 668 JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8e871c321952c7b067d992e523bdc9d7.exe"4⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5344 -
C:\Windows\SysWOW64\WinDir\Svchost.exeC:\Windows\SysWOW64\WinDir\Svchost.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5844 -s 5927⤵
- Program crash
PID:1808
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5844 -ip 58441⤵PID:5660
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5f17f53ade61f67d51d2c7dde99660a9c
SHA1b8a05314c3dab85d7f4ae329bac2ae7038bdc6a7
SHA256e1fc1ee68802760457fc1ce5a673a951106ab6e1f6309427f1083fc9a1301480
SHA5128f422391c1bae73c2d61049f39379f8e1e4811fdc457ea95f769b009e90deeb715ffbd6afd890f8aaa33ab29909617ee35f6d0e71b7f0999c1bbd898f323809c
-
Filesize
8B
MD58190faaac9be7729172d36a3ad6b3eb9
SHA1c0a3a4556d1103f2996a43a214af94937671c6bd
SHA256ec0047378b6e59e7e28a9a47ede7bd6f7fe1458005141b0464fcc2410fa9974e
SHA512f8e0783a2f31205530dd41aaac474a87286cd0676ddb70fd7521ddd1030b77f41e8df61066a0ddaf6ec0dd10aa2a19a670df409e9d081f7f5c5e172258c274c8
-
Filesize
8B
MD538061f1ed8608643fb045ee67ddde513
SHA1c39036498f6f111624cf720f73f653a4a92238e1
SHA256b4fe14ff5ae0d460e019b837e1b801410d3749478172720eae9976a122756b50
SHA512ad1ad342392f69caa752510364d2969ad46d089616d806f3d806cb79ff250da00a6642bc38ee01058f852fd0ed15a7937d8c656bea80bdebfba6acf0f297b6b2
-
Filesize
8B
MD5a5c816774bc6ce8e103b42a4469f79bb
SHA1845ada9e837c31f890f4f05ee3f3f1346ccc4fff
SHA256bc35b246cf08b61b704255913a2b282ab1e189479b2eff2eb8ddb7548174821b
SHA512749bbb7ff97bf82992cefe270cc399e64a913c2ed4d8f4edff1eb6198e6419fe285a06cdd0fdfbaf2f6f8cd2ec9725029ab930529619ef9fa0521f47bf2a7425
-
Filesize
8B
MD56ecfda095f4f37b7d86a89b79d297f90
SHA13bbf503dfa84ef1ecd487cfc21785159336734c2
SHA256675a9d075292be19c2383d9bd136d847ce423cc62e40aa7b02e8a6017dc14710
SHA51241dc9d7ed5d74f600e2877576bf8c19dcf3d6551cf9634e4c0c0d24e7854b9e295fdc5d2747401153d8ac37486b1f688bc63249f8021ea90e1418730f3444fa3
-
Filesize
8B
MD503fae3ae36125429fd04939bc094c5fc
SHA135afdc2d4602ebf3230eed45e58089fe76ff3d80
SHA256ac4d38cf62fc932a929744045b5618ec27404eaf74196e6c8f114061cbc4980e
SHA5124866223fb57968c3b5bf29524bac4cef5f46d1f7a8cd812af49bda5a35abe85a7d17da465ad8319bf49c8df36c875dd56d117fc98a447297ac9e351522b369bc
-
Filesize
8B
MD55a11c7ac06fa1be6e67a54cbb07f94b2
SHA145a4bfd2065f1327264f8017fbb92172d21c9640
SHA2562920c567b72d3fe5e3e2558e88546923685612f3a1fcc460eb1389cbac00f8ca
SHA512bf45e9089a4f7231423d8b07673e6b89de36afbf429a35e189f6a0beaad7d63d7f2765c92b1c6a6b8737ce1d7ba87fbeca2acd99da70188a42033593b5de81e5
-
Filesize
8B
MD592afb7c83de039b1fc63a2b63a6ae3f8
SHA1baa50f9c51f8418920d564526ee079c130a6f7be
SHA256c2aad2729bb559478c53e9e083e9722ec48a5266385c5615109a4a90a5d4153a
SHA5127d8c55bfc5185c6d1f45b178e42362f13a99b4aeacca08d74376d359d2c19a02e4d44a5d4adef50298414fe7b0fe44f0bcb02e39efadddeed6446a85b185e16f
-
Filesize
8B
MD5399466f8abf1e4053a9b562ae34753ae
SHA1af8618263b287223cc6b40547dd9399cddbf800f
SHA25650329c4dc1f875a94f087edff4ee7f92b58190cb3094ae84a13ae11d96de81cc
SHA512c4b7ab6d3cd65d747248338482707895e69638d8d61cb2b29356f3f1f1105f0a7d414df1c54d84838b4415fc795a9b950511d863608b147b445e04665dbd2586
-
Filesize
8B
MD54a6808d398848e14115c2363463c7b5f
SHA1f62dbc217858ddc3a7a94bcadd072d8f1a5b6999
SHA2566f7564129832ab342755b0363fc1df836a90f91ab535475da3220f4c02e046bd
SHA512c9b692972a5921b874d591137a45c2a1df2489e7712d96cd45087bbac9a6d49ba4b3445fd3623a5ed52f97df2eeb62baeccadfcb38e3898934f67fefb784d6a0
-
Filesize
8B
MD5c2bbba9e2e6710b7fb398e1d516596ee
SHA1cb1a8562f07635af7b0ecf0da330a608aa5272e9
SHA2566f18e0f0391122a55dc330df440743d216efbfb806d55bea06679af67fc1bc6b
SHA512d84aadaaba6c1b8bd7e49ef3ae88ee8bb22499718992b5e96b4bd28de76d854ee35bc50072fc578e1b74fe9e6c1df3c1f58da279ba4c8cec24c0cba3a66a728e
-
Filesize
8B
MD5eda6fa779a0028fc62ed7ab2c383e1b2
SHA107ed334b54189e681c1fd35846c897962ddb59e1
SHA2563803b262ca4bd21e4e7e1cccae07d8f3e9e4d0fd40bd3d3db63919e0131a5f39
SHA512043b31c09304133aa6d4f1de440fa2ff03f49d7e335c43b9b5648daef73dc80bd6872a16513087bd3ed98b94dc62c614f337d3d6b6ae8ab24705cbbb942be8fd
-
Filesize
8B
MD51efc3d69ee9bd4d53e6ad7d2303bd569
SHA1cbd3ca14d32c7c9cf589bc6d4aacf7002a8e8d5e
SHA256c25172de54624c5add0c3750db4e9f33637c16453e7b7ebc01c5c283c27cdfff
SHA51209ac3bed92a72d6890f3018f4933398fe64bb064ec0f2d65586c2fb79743b59b7aec06e18d9f048a53e77bbce0d2902a254075ba31bcd32e36a7816040da17bb
-
Filesize
8B
MD5327b3a71fbcaa6791772fbd44b34e835
SHA157205b66f12f6577c71b494a3332b41ec3480d5f
SHA256c16f324248bed1432328f9b41d714219e55bb6af6161ddae52361adfed3fc042
SHA512c55f8cf4d1059fa26d37f8a3a9deabc4b6940d9badbf522f827f764f15fd79a76434b5e2edfc0136f43ba582cb528940aec687aeea238206b93f7833fc7dafae
-
Filesize
8B
MD533f1b942ef73ca8a9bf96789a62c643b
SHA103994978d076f736492d1410f11dcf08f338f920
SHA2564013d5dd3c1395a487cc8eca22c987b3816303f265abf0bfca1a9ae484308f64
SHA5126f600abc67981eba467cb54a21a9bef386f1f4d3b03001458ef7325d3c6a620f92219ad839a5261aad1973457f0b8936ad24e7f0d065c74522692c1413c18de4
-
Filesize
8B
MD5d533bf76feeca85ae531c1c50e015fba
SHA1e0d7923b48cb3c0e89e781afea4e4c1f8859f009
SHA25617384d6f48848cf021adcf783471a6ddfd098b834e203d868b2df928394860c7
SHA5120569a13c83f0d1ce043c25dec58fd89809c808a1c8f967d5441ce191d64f2134dab4eadfbb9c608495c0f86cc2a8310bab1843ba4b0ac09a7acd3861bfcf9431
-
Filesize
8B
MD5cd165c9c17ef8d6ea88af4c1e30c0cef
SHA11c5ddcd0015d6370e86edd3314f28687d82e9bae
SHA256b4605a592b151cdce017287828eedcc405e35a5573bf413c4204c51727adfd4f
SHA512b4cf6d69b0ed8c352351845c06e9aa333fbf57877561c785ecc1ec159e69040ce0ecc4f91674133c5721276f12a6cc4c556fa12100b20f8a10efd9d1f062093d
-
Filesize
8B
MD563bbf7b94342d8e68809964d8dbeb443
SHA17080b3d392d159bcb0bf3531792f6e010890849b
SHA256e6512b5559086fa26552c174c2d8c981db4bef6c3bbe8946eb5bc3ec5c6e8c5b
SHA512c212e7c0ed76f66accd00bfdd33b4c43121f5d8af10f1f7223fa329de85cc9e0613e103be152f20e42bde42d98c61cdc22c99528b8aed553640fddfa9e5dcba9
-
Filesize
8B
MD52fa4959d67f2e8c1fe71d7a7b2ba85d2
SHA1a18e5ea2eeb1d262fea12c733425ce98e2ea754b
SHA2566f122924f1f18e69206d6b973085e8c61615e30f392bd5127e763089c5a7f8b3
SHA512bc34f214c86671d6f6ea4044cd736f44ee3291f4d920596b9825d05971e6bb376f7f3733428ed3711869aa1b1e1ec3a0f7e9b5c0aaee1a9a416841333fbcc82b
-
Filesize
8B
MD508e4042dbacd558c6ff54bb608c7c3c1
SHA1d61b78e6ef5432841fb06be1d21d5ef57468f6e0
SHA25660faf273154827593c9097ca1a47c2c9a3e5b632bcbf7b619e7c06a77d30ae05
SHA512acf241be60dc8ff21f40665bfafc0a4d1033ef4cbe5bc1e4db5aef2714a3d4cfa2022df1da64e1c354f7d2c802e28ccb32301242daee3ea556e379daaded1736
-
Filesize
8B
MD5109e443c3497020aac96769ae69fcc99
SHA116d29c3efd1542491f60942b3819eb7aa8c307e0
SHA2565b775d6c2744b988edd74003c2185cd40b925cba5b503c464cd0c73f719de3f7
SHA5120e37aca02bf08df1fd8560766c4dbbf50c9c43bf50126a682c426d702839205b489031c762e71d8152cb47d10e934effd15ef2699048807a32376c8ef2500514
-
Filesize
8B
MD5da0e5a523bc965f2843bf45ef12b8bf6
SHA1f6405e2718f8c0630e96026e0d80f031093c2100
SHA256a90614a3c3c1875f1df27dcc2335214468586edf3b459a61c8497efa5c3b0c87
SHA512029b4d49e96ba21473c50b69dd879f55f13d5e4143e0705cefe9e5a33463388e9a4b670319e48db3f462b1956d2eae90bb042a9265b5f15a7dcc86c6ed57181e
-
Filesize
8B
MD5c7f811d8587bb4b60c5fcc662f826bbc
SHA1a60194097caffdf4b5c241696a19d82fe2214cbe
SHA256497c745e17702e49a2f4e5ce571b748c21a75f29ed2ed42f12e1b4e4905fa8a1
SHA512dfea00aa243b8639831933ffd7e8ea0a60f780101b69cbe78538a5dda3040422c433ac1b83ee620b8708963b01febe4c6e5f0bac5b0041364a8670218f34ee80
-
Filesize
8B
MD5aaacd40b718c0858b9ecf26b1a5b0a76
SHA1ce3613c38d564fdac4e406f4ab7f65fe548c9fed
SHA25667969aee34700d559a4d186f8720a90dd6f4a7d7025f163bb371bf3235ffd7f0
SHA512b03711b2b69d53967ebe82c6f71a8e0de7642736bf0a3ba2ee2971dc2b7a794b68f807c52855b016a83563c985e07783bd4ea41f2798907142223b4d6851170a
-
Filesize
8B
MD5d658352ffc25e149c707d9f588a56f7a
SHA1122e5b30d5ac5ffa7236072c9849ce8bbac97d7d
SHA2567b24deead217aab18d82abf0eb7bf906c317eb75bc1f86c98151f9ecd727eea1
SHA512d8cbe6055e4649778f6f7d20686f71a427649c46e08c1e6eb557992cf123a27863f2ccd283bd2f4e97818b3fb5e8b0814ac6efa90bd6fd0e0bf5fff04af6cbf4
-
Filesize
8B
MD51495305902b3b0ba6434ef38bf4f1638
SHA1e3278eeccf11151ac7c2caece3c818239320ca2c
SHA2569bdd2d9f0c309cf120069cc6d66956cc2d4e7b4014c86edf075f6dd8519237e6
SHA512b5da44a2341a92e420f38ba5b22683d16d377b147a58ad977f157571be9311c8c54cbb3d7f37c94423741e71ddf99e9a82c2c7534455b071e1d4ced2ebaffebe
-
Filesize
8B
MD5bb6e02c3187e5c4d9c0c431e186dc28f
SHA1d726a3193f6cec75d86cc03bf445c1f62e415eed
SHA256a5a6b0a5b224803258428bffd7ae70284e98482b66e7714f10f2f6625a17108a
SHA5122855855f8ae2c7faad0ec5e686e9b410378417c0f4f711265bd4672435f805b496610f40a2a11ae91f8fa7aba57c85caa514d62a5f1d7b0d10c43e253da50f73
-
Filesize
8B
MD5747f5b70dfdc691a6ec3b02e1c011ecc
SHA142574789df0a6d86ef38fdb709b6667398f08bf8
SHA256b5808469e472760ec87ada43ee6f3ef26b88d81546f712b50a32964de1705749
SHA512ee2179eaf55e37e62a89f3d1707181bb65b05442546456a991dd664c800bd801f8365502e6bcb940ba38e9c630b9cc7d28f767c2327b79bbf6b81a3daf0a4950
-
Filesize
8B
MD55e52de8ec963360f6151b1842897a72a
SHA1cd69d2064abab0e5bd9c96ccf94b8712dacee061
SHA2565116694147ac9c8f60c094c3c38ead6a4dd179ca380a5e5c16d89d44fde26e06
SHA51212ecb0b03d9e7b5e1c8c8b4075127daf2bab2ad1432823d4bb986eee8cdafcf8b054d554a0d17da50bbdb779e46e0f6af6d402670e10ca1680feead7835c9ad6
-
Filesize
8B
MD5019f81e21aeb8778d466e7f91ef42af2
SHA133dacef330e1d991fcc8d318316d3e3fdf1a62f2
SHA25651923acd411c10694373634daeac8f3c5aefc520b4265b06dbc5b7736d115076
SHA512ed4a5fdbf326ddbc6661529da8bc65d838100d1e34abdb7a9b28025bf84f0795d958b410a9ecc1329350a263ea77e84fdbb02757b3cd369cfdbfda809cadd86d
-
Filesize
8B
MD542440ca27c13b702722fd85f2d4305dc
SHA1857e71a35dc7cb01006e3d9fdb4768ba8bc5b024
SHA256ef1149f9ee95c26b24219db85ce452f29f2c3d46b5ce3c25b8128da2ef3c5761
SHA5121a1f981ee8080deb068ba546a6adb095b7ac3d1bfe96c7313123c3fba84dbf35b15a3251297deb41ae6a1fdb8965e71857aeeaad7724bd7080f89c9a6fa9db45
-
Filesize
8B
MD52890d427ef1e28925f7eda4b93607351
SHA10943f6bae55245722fa58326360e411aa5723ae5
SHA256374fad1e394527ef58b00274e6bbdf3de4eac022a0fc30c67dfa7353432c8197
SHA51248e6f1ef107d84cb96aaac2c181207df2f24ff3599c1cb150dec4ae75be2225dd5b95b3c8598082e67cc539acd8b071192b4f0b193d567a69d7928c92295b0bd
-
Filesize
8B
MD5dd4f23ab92b1509b5529127355f5593b
SHA14bca8e83347fa6789234017533d29c942743b26a
SHA256f7b4dfe11aaad4ec3259fa08f7125df5d60ca7468836283fa163b1f5b30dda8a
SHA51289fe852516d84eab0e8f53aefb38278100a74617da9b4ba8466012982358c25d8b485aac26350d8169a92ed11edff0be330ea47dff41afda6fe07c2f2ec1e385
-
Filesize
8B
MD5d9df3bc42c76fa5e1988adfc0ae5ded0
SHA1c2c0f46bbe94bdb0d1ffebd98f3bc6d8dcb16123
SHA256d6a9e810f98e894a8bebfffad4b06a18e67ce67a79ca2504b37d0d9e8bd3fdb3
SHA5120a2732b0a76cdaa6fa7eb98a5c215c1c0b31ac9dcbfb82ecc0f9bf4119aa5bdd359d9fc9f4aaed3b58a74ced0b8580e54c1b59327df4a0b2c0253f6bf19002b4
-
Filesize
8B
MD5994216d6646eb3b83c0b74db979bbf28
SHA1cf55f5e58eafe7d7c39810766ac558c79bfe3b5b
SHA256e173d27ee5d8beee5dd2ed66f056b5d59792dcd8ee401dbf8287ef934f4faa5d
SHA512d0f2f4643e47d4a67be4e44bec5a2452fc49aa9c5188e757740981658262cf9551690729d3f471f892dfe93b287e13d2780a0495a1c549615dc2d9a31a6bd060
-
Filesize
8B
MD5253e53e9ff5578021e1dddd613f77a2e
SHA176bdaf2f063c0ff33bc2b1df9f014ae0098bb2dd
SHA256b9671e0df1347fc247f650d30bff87dc27e7f50f0de4d3f89862096f78f302ec
SHA5128d3d576fe4fc3de8611e3be25acd650ca212ffe121c4a30acf49640a33242bd5c9d5cafb45ea438d1a886a80ee96b1d573ce81b7341f8724182b2ca89ccf1650
-
Filesize
8B
MD57aaf53ff97a234fd5f77066aecab4d98
SHA1e0385f15eec1a7d7608619193b0a13f4efa942fc
SHA2562dcc93842354392be7d764073a696289bb0bc6c7fbac07b52ef007e1f94a39ec
SHA512795d3c22a46ea026e54d95902f9d8cc79c2e03d024404d410e9201d46026c2c0fb612bfb94cff1b30b7484601171b6c2f6effe7b91127d04b8421554fc36cbc3
-
Filesize
8B
MD5b88e30a972fcb60d43d5b41f02d1af41
SHA11c4f2197495e9e920d199f4ef6cc342f2f8edb11
SHA2564df5766429582b146704cd7b0c276649431e2640342830b2caee495c2501b457
SHA51225883738d5f2ffc43899a715aa34e4faeaceab15326912d5185cf695026a4179ccafc43a24475018dcf2ccf804f2266c3cf340711f0feb1aec72ab7feaf56c75
-
Filesize
8B
MD5455acfe10dd0e32a298120e754c28958
SHA1061f29664691eebcb4077f467b92408cef72904d
SHA2566b018d1a48d901938cc7a42af79b1275f97b788668c878578388905340d1e223
SHA5129d3d3f180126f1651939a25abff07e6360ef6994f09bf168d540c0bc0ad5abc161a0ee0e142ed80dd679f93139cf9ac64b4388adba999845750ea60fdb1bb100
-
Filesize
8B
MD549b4df74bbb535a36501e62412594305
SHA10f75ee98bdb42e61e72862b71b759a8735301df7
SHA256de04427c45ec284312e53a777024f4544a18104826f180fc1e6dbfa9c4eba839
SHA5122acffee1bafec9e553e25aafcf08c3390ebedd3955f8c1a20d9fdb34125c6e20b6753c8fe1c19a19e10f2a8c990d1b8c28c9b1a3c7f7e8558efbc997f6dca038
-
Filesize
8B
MD56443e0620025a23dd75d9d52ae644cbd
SHA11eff9c4eb3473dd930d8262aa35c17692bcae564
SHA2567ac06c04feeffbaa0c3d441eb6ce648feb2fbfdc47b93c92a7005821f7410261
SHA5125c8c08264d631e59fb0a790d98a9643aa74d73e8ec86a945e7569f5263440c77bfae1c67621cd56294fa71ed91bdf7e55836d758bb5c2677407091949bb73e0b
-
Filesize
8B
MD55ec79516e33df1f572e75d95748dfba0
SHA1d511ce51f9c5ad81b772b5a5d885dd50409ded71
SHA2568a818337793dbee6853198dda31b878128e18de5bd074301b8855250970aa2b4
SHA51221741b8b74ce5ad1fdafd34f442ef4b6c7b00f1e6952eb7cb88646dceb335d711d0d33f8ad9e3c31f21a4586f69e4965bc911a76f35235666d669d8ff5499ba2
-
Filesize
8B
MD58529eedc7432b73668e4cffcf620a74c
SHA1e3d80da8157666fa57fa6ea40f25d8f84baf1f1e
SHA256646264ba99b4390c6994ef43ca021373a68860ecf8439090161b6aa1916b9f0c
SHA512154523ffcb72b7f9c44d804bd18c92d348c3134b0619c100886a6caab74f216adb57897a2e561208ef6264c517ca78a957e81bb5edb25bb619c654e5c51b8fd3
-
Filesize
8B
MD51c429e5136084201cf024bd728ab33b8
SHA1d361cbfaacbefb45b19168308b3addcebf35a9e5
SHA2568af11d0625feec444cfe997a81068e2de62ad0bceeb31d6d6d61a5ad60fab584
SHA512cf861f96328fd5cbc76caba0b85b7849780a0245cea66a8ba7f7ff97332593d503b92eff7c17dd6cea3e507611157f5fe3786fffd4fcab7a020ef6babaa6d2f5
-
Filesize
8B
MD5b274aeafa06ac31f0479a8434389d8c0
SHA10fab6bf7d545663641113f2310a1982c3852d889
SHA256427d9e9baed9837274155a090b834ab9ce6fb440e7e80d294202f9aadb29b26c
SHA512062bdf572ca55f61e4115b67fc2223435542a61e3a8062501acef8a7233b917147d8ef13b1ba40f0f8f237acabd22353b13825f4ecb90d1dea75787a224cfbe6
-
Filesize
8B
MD53178985037c9f762949014e9b4a80097
SHA1ad99b69d43bb2857467c1ee7e039c61475d7a393
SHA256fd79cbadb8b4870e98412a5d51f3dd023a296cf44b98fb6fe0926b738659cf6b
SHA51245fc13c9cb0d540683ebf59057beacdd0ee1859e4189de5d3f2e86a1c75c197a65e06af011d4431e98f6cb8cb136b1e87f4f1e647864249c0848b37cb8f73644
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
311KB
MD58e871c321952c7b067d992e523bdc9d7
SHA1fbf6cb8ec2d184f9860103295da2459481ec14d2
SHA2562450bf3410141c9c16e5df6a2944c5b1882b5e6632d3e54e69cfe8822fc7f8c9
SHA512108d9d80e65d8a60e284f5b53e2fb904fcba79ac8d07bac48e2d8e03941f29ac300ebd054bb8fbd9700dc568cb145158c62881a9a4bd35d53742f569cc25148d