Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 10:40
General
-
Target
JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe
-
Size
296KB
-
MD5
a9abbdf376ed653cf96a63b56de897a1
-
SHA1
2cbff767fa88220ebde9bdd3e588ccf71576c946
-
SHA256
9b625fc031efeb89996e203e44bf9cae4e876df822aada5f6bba7f7a037b1fe9
-
SHA512
85062bc46ac9d34c618591c9daaf1571ecc4a1cf078f15ab6f8e82d58bbbe84d0dc76fcd948487b5524f56c7ab248f07a286bff13e8846e1e8209ff23a89aeff
-
SSDEEP
6144:fOpslFlqxhdBCkWYxuukP1pjSKSNVkq/MVJbT:fwslmTBd47GLRMTbT
Malware Config
Extracted
cybergate
v1.07.5
Cyber
purefighamod.zapto.org :100
H27SA7304IM4L0
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{RU5NXWC7-6331-0K76-XLR5-5TJ66F26UY41}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{RU5NXWC7-6331-0K76-XLR5-5TJ66F26UY41} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{RU5NXWC7-6331-0K76-XLR5-5TJ66F26UY41}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{RU5NXWC7-6331-0K76-XLR5-5TJ66F26UY41} JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 Svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinDir\ JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe File created C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
resource yara_rule behavioral1/memory/408-2-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/408-6-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/408-63-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1140-68-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/3624-138-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/1140-157-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/3624-160-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5708 2700 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3624 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1140 explorer.exe Token: SeRestorePrivilege 1140 explorer.exe Token: SeBackupPrivilege 3624 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Token: SeRestorePrivilege 3624 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Token: SeDebugPrivilege 3624 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe Token: SeDebugPrivilege 3624 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56 PID 408 wrote to memory of 3460 408 JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3912
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9abbdf376ed653cf96a63b56de897a1.exe"3⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3624 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 5845⤵
- Program crash
PID:5708
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2700 -ip 27001⤵PID:368
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD54924d4c4a89dfd20de32651bc6bf39d1
SHA1c2d8b66d4f2282eb576408aff3f8922a2a6f8868
SHA25604f4b194c46557cbdf193fc0357315d6865a3a8551a1eee03b287b872e38cc2e
SHA51227d5d13e8209763dea8b63d143c7d27ad537cf2277a34f22402514d7a8f6aac3300fb8e3bbf52bfbd49e535b1137c0ddec29c1d79cc8fcb72e31779ac5befa85
-
Filesize
8B
MD57baa6b146a7fe1d9313e6581466ff6cf
SHA1f4644188b13cf9b90764509a4a49612303037b37
SHA2565d85edc869e1d4f1d01ee45e23b17b649062bfb5a81e07c5e7b95212beaa5b9f
SHA5129b3644d4179d19364a679ad68df78c8497d27589916f752ff586e2aea14787d1ba23463efe1de59f551a969b754689b09554ffbc05d62e27cd41585bbf32d07c
-
Filesize
8B
MD585cfa4c06517da2f14cda6ec0a3cf586
SHA1b39f05c34b7063fddfcc99f54dd259e801486523
SHA2566f68f489c945336c9a846f21e4453f8de7e4f37799a61f8ce00be745227059e6
SHA512e59402f2b4c9b09252afb9dfdc5159f0905d060100e5cd85de3935cbe9682234e16d124f947dcf51b77582a40221f5227c252ab0c5c0c3f2523a63e15a46cf32
-
Filesize
8B
MD53008a029921e405098b55882234e4965
SHA1f471edbac44f200b97b8f7fd733c894de2082dd1
SHA2568cb2ae1c62ebaeb9d12771b4b2c3d0e06da60fd3118f42463f6bc4648a4f5eac
SHA512f5a0d0a96531ca832412291e33924ad7df5746a5edfe59bec761c3f82a66baf5ed55a37556502c620f3663aa4a4a648a38b1db87a9199fb704298170c9152fd8
-
Filesize
8B
MD5a37959880db867bb53a008ff95be913e
SHA1b8de5b863138edaa92fda6b1c345f3a3a0af3f8f
SHA256bd408701db4a116d5570fd7c4532c3c202fad9b0d67cf0e7090df46ea9d65b5c
SHA51204c0b746ec97c785c3ef86b8629afe9fb731260b1371c4109f3ae26a986882aa87cb3a5e12436cd4fa15f227423bedd46acd148645bc69dbe970f54226c4595b
-
Filesize
8B
MD5b98f229e9a35c7675586190d59eb3cf1
SHA16773411e44e4410bc484ecafb57c1c7a0c9221e2
SHA2561bffa426a05e2a47556ef37506cb4b75d7bc3cb7063574c7d764cfab17f71e10
SHA512fbba26a5913c4b2133f01163313ef1cd1da20bd3017d3a217fef974d53148c0459c7da3ab3504e48c0707084d9555a250471b541d97401a11ea081c11414ab8e
-
Filesize
8B
MD5a0393d01a6d37a5165d723f94a7f35a5
SHA11ef6f75a8bd818f7288a7cd4388135ef9d8b00b9
SHA25650568d4a9323acecab96e692a9bf01e4a6507adaa03f4fb9766dbbad6c6031a2
SHA5126217d99692e5bb2a58fbc27e7ebc8e182cd8d0dfa46a879259856a25c36673c7e23248193cc6d6c696ae1dfbaa42611ee914c85721296d9fe6889b0ea58564e2
-
Filesize
8B
MD52140dddffaf40c6177c61c4caa30ba3b
SHA1ae008a6bd42346a1a1aa97f667ff46604795c80b
SHA256d17e35296ad985333a578b20af1b9dc00ac4a569f2821e6469a2debfea06ca62
SHA512261aa442f9e1412d0048febf66f383ffa168bb8470cf82eb434c9ab3533773158f25b81c75efc4cfa733fb094ef487f62b32427656d9d6d905db529391c59e26
-
Filesize
8B
MD59a6212e54a4597871c1700d1ec7ee9ef
SHA1f7af5f6d93bff9f29a51924dcd98c7b42839a30d
SHA256c9e0ef635282359d3953405c9f7ff1affa1868d72abe77c7308712a86321e247
SHA5121333a153bb2071d51848238a7b06bfee72ca40f00ad49d0db4a3483e88cc3637998c17b1c8a959f0b8638e3b700c95468ad597205fda6de88a059472e323ec02
-
Filesize
8B
MD57ce4b8e4e1655f2c8821703f2b971a96
SHA11b4fde89d823a9a7691eefcd3ea3f734933bdab0
SHA25657bec556995d00d98eb57426f0bcefbbd12322a7449fbbb5814b2669a7b9bda4
SHA512a98e5491709092dcdeb44cd1310a9b82db3b7e2d3bd0a8b854de826df40c76bf3d576dfc1fd21ca69a25a976f9ad92d958ba1e67be2789a921c4c86eded731ed
-
Filesize
8B
MD57619702aeefec1a2135f7e72b44cc87b
SHA10fc8aface0ba62ffb5b232fb97ce6423bd4de85d
SHA2564706a9ea57c9774554e65a63f77b8c831cb87f10b57adf5ef1c88fe84d25d6d7
SHA51202137d4bd484855c0029f2d51eb4cb1c970a32b4383f273d8a72b05e3905741faad684071d085e6f9dd92cd8a280a5fce54ae2a5d313608f05dbd6cfb36df006
-
Filesize
8B
MD595b382184fd7bdb4e8059bcca7f1db60
SHA1550e921244cb9659f783d9a9cd3dd3e5c35c74cd
SHA25691b144208c8f063b44f88fb057466660a8a6337dd28c66c1c61bbc257c985205
SHA5120d06fa81a15ff2319aebc969351f4fe6aa6c5b1847c2ae0d024cdd1b2c4122a6e61c116bebfe78aac104be10ce576747e0d09dc882ba4074b8711c4ffaa89eac
-
Filesize
8B
MD5c014f573e94cee1473c71d27bc5776e7
SHA19be75f44ed06381d1c5a42c5f1804221ad4359c2
SHA256e00ba9f640404e448b1315adbca044d823f642b90f85acddf3ed11e430c25cd8
SHA512ee5f52f17f439fa5cf541314dbd0519ac2290df6577ce718cb251d7659634297014e90432daeaef7a762b6edfa839493dfc1e22a7f192873d276b6e89643c05f
-
Filesize
8B
MD566431af0c7928e9ef5e6166fd8b1b1f8
SHA1802455eff9ce809d0f44c56110869c0b63500caf
SHA2565ab3a9790b330638dc2a6999c8691662374a547fc656b953d676493508d69b1b
SHA512142253813e6b06d75d113f993e2773f1e4729c62ec519f7a4a302336586ac1533737e0fb17e933f44da6d42cee1b0e76cd52d0212970a1bead0e283cb49a43de
-
Filesize
8B
MD5579962f8a4b19e2962084c23dc6f36bb
SHA1e6c1eb0dd621b331ffdd5fb63086f4bbcfb9a4dd
SHA256bb3fdca35b3c660be1b7b79236246b8ca24f5e47e800a161ba7b941d799b4b9f
SHA5128314618180baa3083b25427921959505132fff76de036f60be5c79973e36220dab3b8090d06e9f705b9931ffc77b9ddf7828f99dd719f754ab6066a5a5e545ca
-
Filesize
8B
MD599f99464cd72ab411285f6a50479b6d7
SHA1ee623fcca68e5f33278241f919cdcbb704ec820e
SHA256da4e334e2f9d5b5f4a1ad7b1d70cf23307c828dd497f55d0a19d2f2a7274ea03
SHA51218588ff94d36941c6a738bda0ea6c4474d54d63d5f8236384cbdba67b5c623c5a6e7f81f1e7fbc94a52b83b0fdc5b7318ea56929b5d1197d2baea296790c943d
-
Filesize
8B
MD595708f26ceda13cf5d4b93494a528c44
SHA1bb9e9ab87087cc2a41c40dbf710fccec42641c7f
SHA256388fc2889c23a9a0db2c5d6ca182802f712dd926615025b51030517c7043e8a7
SHA512c4332d7759ae08f337d8958d21fed74e8cd9e527f808cd5564e798bbb4334c95ac5060492e811d1a5fd9324a1dc2bb7f2c1eae7bc6a6b750144a85f0a132dac7
-
Filesize
8B
MD52b15b8c8357f9d9ca8c3e81302a79d6f
SHA151cbcb5ae3d971bea1af297373848588e52e38d5
SHA256d03f674dc142b94189b885ffe2eb01e4d92479e0906b96cb254d5877f8532b0a
SHA5126297115aa81230badddd1cda656d9b0a39fcd2ad74de517911e1c927d85206a072f8bff9ea4fc92b2013a036c4799adaa6bc594a380577cb3e126c6124b00fa3
-
Filesize
8B
MD5f4364057969ae33d2985636752c93fab
SHA13b2c63c15281b248521f09ea9aaae80d861a1324
SHA256a592f498cbead45c69eab7398649cb09cb634b964a0d9196dd56e596d413caaf
SHA512194b8c81eb244794c45c8ce1662c3fd48a1031649b2c72d592647469be4e98b5a1a2830f5a73b74ea4456f6a6acc34fb2d3ccebe3e5920610febdd6661bb57e4
-
Filesize
8B
MD590572832f7073e7fe3b0d67a8762de5f
SHA1de8050641870e3707ae61082548494d31d69644a
SHA25689e22e8611b5d6335e709a3f293cb6500fac022c5eb4b267c70c0fc36926b2e6
SHA5122cd4d190e37517a5b00985afff52e6ee55277a1b785ab8311942085b88b72eeeec9b0bff492160479e6b3d9f3e3535e90cd7ef89f9169b30f62d1b23f704d2b5
-
Filesize
8B
MD5660bdf11efeab15fe95c8f8c7cb1a931
SHA1e8eb154ecd8cdb2e96ba52b0e56e6fe48e01f957
SHA2560b42f70806840fc99777dd12f8fd4207d92a6fb480bd7d679881123281064db2
SHA5120a26b968eb81d2d7e88032ec6a2b273e7461cd696a4552d3e1fcb2144f6db2ce0d1d1b23bc0fc73bf96f5d516b1c100c10f6f36eab98e72a567a872380971d6a
-
Filesize
8B
MD58f41cc054e4c51f4e367a8977b2cddcb
SHA1b21857302bec6c72971040db4935d7b680661cc2
SHA256a4251837ff09d55db79fe4313fdc1e5551b2ee0df71bb9c1bb7819c56bb7f2ea
SHA51239738849100cdbd9e775effd2c61c281ac916e56f84b2fe3405a4c9e0cfa76320b30be119ebf34f3322e9f9a052f399550ee9057ca61b6ba0ca06a339c0c90a9
-
Filesize
8B
MD535f62d76de70438a2ccc5895ecfc6b00
SHA1d58854799e58d23cc70c5994d22378bdcf6bbf06
SHA25620e84b7f264856fb46db213393728d68891cb5834ff48e871b88c8541b28195a
SHA512219c0d05b35caf87c3767bb5bc3a6d0e232947c278db629048e3d382f49ace2a89fb46f6889c6f1b3fedb442c06286496d05ae9e7188dd1b9cb1b502d9c12c65
-
Filesize
8B
MD57e71be3cc04220c593234dc75cda801a
SHA1c5286b76dcbce88b1c2c6ca6de170985b130c904
SHA2568c558e08d6c92f384d07efb19e7bfcccabd99d18fa8ad08d0b9ba2c868cd40b0
SHA512a22ab457b5cc359c4b827954beaa5ffdfd6ed20b782457b708fde3649b583d006115ba4bde4df45d2c123bad52b85b20b4803c14f49e22471f38f32aa3ebc407
-
Filesize
8B
MD59a62ce3352756dbc6746ffe5a0186136
SHA1e49723e4e0e0a886894ede1b2cdb534b1f6bc900
SHA25642159049ae772716d7277c5e1330c7886d1b12ff7ddca9304bdd3972896b5017
SHA51220f8cb2ec0fe650c2f7fc907d6cfd6fff45f92458070374dfff041fd9af1e99436bf4400d99ac0f04071b47c5905fa0a6caa9a9184cd3d1d9123254ec69431f8
-
Filesize
8B
MD571a0d094c0824b315fb59b0560e9480f
SHA16f69331f68db0c9c27b10a2e65ac851e298ed3e6
SHA2565e7a9fc960c1373770c81e084723ab7052a74fb3a0deae465a8db12d9e8cd327
SHA51231499487db15de5f6dfd4f0491d3ac6eb2ecb5da05b0a066d559b0434aabaaee246be5782f82d75f4fcc8ac1d092f356a7f5c71e6c04c758586ea3be58e6b696
-
Filesize
8B
MD5af9fa4f5141d26cca9b555ae784a5bf5
SHA194e72b2297726e053305c1fa76a5b28fadb52f5c
SHA256ba0ef268939b05c5e895fac3f4853857a1f7dc6fdce2597daa7c3c7d3da7a78e
SHA51206710298caced36eb267a911d616d9e51b3c7db96c1c18bb10cab81a75e02d1dbea949d959a81b155bf68c289239b8013861e5c167b51a732654ac24926a109e
-
Filesize
8B
MD5bf511a13f8b44cb357694252ad67edd1
SHA1b8efad961bf83f53f896d3d0a66de843938795f5
SHA25629b9304226001b61c74e2dab2763968a385bd0dc40b2b343ebac2d84d7cb76e1
SHA51294d5ad22a17f7983dfb842c2e8a80f6c9fbf73ace6db3e4e797a5e66ba199a4277a48e6190b5e60a9bf3cde2d1a11509384dee5d5e57167622b9fe01d7c08e38
-
Filesize
8B
MD5c06a8bf082d477c3e65299155ccfb0df
SHA18c69df5872f7adb0e4d987c55aa9ce3822654610
SHA2561c9f318d3faddad39d4a624085c8195475776278f8fb2e5a04174aa9c8b8a915
SHA512b843d4ca924537b0b9a3fec0e07e1677cc0dbd376e9d3fc1e1b8a1fd8c098b9820b6d46d396d8b1d3cee34e7cf7050e1eee289f9510278c4fb5fd391f4a5a6c4
-
Filesize
8B
MD5ea69ebdea43286286939de2791aa37a4
SHA1efd442b1b52a76944bfc954dea8af33f5990ae85
SHA256c2b5d8b72802e8b685656b729b88666dde2180192e3039175318ae7fdbdbdb61
SHA51206a862804e69e6d1d80f3a94fa5e5e2620f61eb8e39eca34548ab69723ba40d70ee4c4232d5e5c17de67428a9c41db83e46eb35db34dac4d92ade6bb4f97a713
-
Filesize
8B
MD50d2e27edfb84972c72d34db91e195b4d
SHA1968a9016747a75e251e9c6cb8ab30e6c6c3f3756
SHA256577ed3c73f42b5309f52bfc62bbd088e9edcdc0f40040da4efce63060f56ef8c
SHA5125f8649bd65f44783b3c25361224107f0bfa53de4b9f34ff2681cd2ec44abde3b99afef3b15d1ba025b74693b0f4ae080ebdcd14c112d32fc488746e4a2851045
-
Filesize
8B
MD55398832d2bffaf1d2878f9979c60d68c
SHA1a63cbf91071161530bafef78d8516416d19cd96f
SHA2565cf8caca78fa71c0692c771f9509ad93fbf8a055a8b73aff8d95b8bdb980cd9f
SHA5127fdae92a5fc871f187a96c2bea029bfbcfc741941e04b56345be363d51da2cf2f896689be86b68ee6c9b3c6815862a959c11642bbc0889ef652f9c5fc69bfd0e
-
Filesize
8B
MD5bc6d534fbfa49d415d6b3e09f95e5dfe
SHA16af5990d9c25278b6e0b6b49b4bb4945c19fe092
SHA256d71aa00909d3fa6f5c5791a47b992145cffd8cc0e873ba593209fa5d2ba570dc
SHA512b980875af4359e4d43ea14a9d667a7e80052ff573057b463cf41cb92086598133230f04245247dfb56f06a4a2737ec587c28c1dcca13a0031c4b1e76e6651ecf
-
Filesize
8B
MD567bc29934eee0ddbd5d71c903e82b562
SHA1b94808ef2bcca3e7d874bca0fe7eac9677c4aa26
SHA256cab4a591e9b386e0cc01b26289439bccbe135cdcb218cd52823f416b81ec0461
SHA512b5977c5734ac1a649794857b771d532c58ea4099d2e9927190b1ce5af8e460e63e5cc548bc388f87e6623ce4e26e011c6eb447238fffe58e35eb92374c4622fe
-
Filesize
8B
MD5c144aa0c81e7b38bfa86cc98b52e907f
SHA16706342374eeeac447ba48823b1e6c6965bc4051
SHA256b5f8c5ebdead3088412cfb202609dc58ac547c4135a65f54d2c2bc020fc31611
SHA51224d673849e2852991dc1fc78acd936a664cf43d8d2614c727eb5f1aedf54a456fe911a62d0ba411d7497e97ab3169f0d3018ae23a1fb697ae7edabf1bd7a2e25
-
Filesize
8B
MD594703a157c1fd194c313195ed7434e35
SHA1097d69ddac2014921dc7e35af4c54785bda9890c
SHA256ae1886c7e2e13024c8689c6366b8400d07a5fee72886f2f2df4e7143f530bb65
SHA512b9a48f8296bcad4d4202f8f9515fa9e0a75bfbb84af1f327b8a5f077a4a925ecb0f50c1711894dbb9d2fd97d62f703d87511723d24df88a8bfb0dc614fe1d1cf
-
Filesize
8B
MD56f9d0c901356d9e8e9c73e1d09ce01b5
SHA16ed9a052397d509f3ebad4e4b668081d97f41cc9
SHA25620e71d565648d4076238da039bbf2243d79932cc1695ffdf7c2d38403741a599
SHA5125876103367a0827c426163fefd958ce43856babe36e21fe616c6315cdb4ac3d079349d9531319b62b90dca5507ecc2c9f9ecca0788dc48bb75ae76b92c75e1e4
-
Filesize
8B
MD51449a4dc99e2eb83ffd3c519108e7838
SHA1dabc1aeb92c57ce4ca5effe0c85dec1beb499845
SHA25604b3b6041c9ae117f755b1287c957497227417c60d7e64a766d4a35d4efe6250
SHA5123e372d908fbd6d1dce12830f26e15f4ef85c5aa46687f669598edd23b162f03e8b09044f04b7436ba73b518e5117fcab2a0f359a21960982a73c06540048f066
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
296KB
MD5a9abbdf376ed653cf96a63b56de897a1
SHA12cbff767fa88220ebde9bdd3e588ccf71576c946
SHA2569b625fc031efeb89996e203e44bf9cae4e876df822aada5f6bba7f7a037b1fe9
SHA51285062bc46ac9d34c618591c9daaf1571ecc4a1cf078f15ab6f8e82d58bbbe84d0dc76fcd948487b5524f56c7ab248f07a286bff13e8846e1e8209ff23a89aeff