Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 14:54
Behavioral task
behavioral1
Sample
JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe
-
Size
274KB
-
MD5
b821fd148fdf894ea49d3b502f5ec263
-
SHA1
547b42c676e2a162e446f050bb3e24bd8f5810a0
-
SHA256
d1ceaf8655f1b4476be390fb3dfa8b4e457ef197054ef7434332f66315aa3b18
-
SHA512
82d543d90b024a5e5e4ccc8c53929743cd649c79401c4dd934b40a6835a395ed6a68f35bcdcb2ea6216ee588e7a32dad7e18bcfab90acf33fccf7e00499970bd
-
SSDEEP
6144:tM36x2dVuGzJWSdL288vpEqB6N7H/n4JhVB:tVsdVuiL2dpvYN7H/n4JhV
Malware Config
Extracted
cybergate
v1.07.5
ModGamingPro
modgamingpro.no-ip.biz:100
08WLD7PFXAR82K
-
enable_keylogger
true
-
enable_message_box
true
-
ftp_directory
.//public_html/
-
ftp_interval
30
-
ftp_password
iloveoreos
-
ftp_port
21
-
ftp_server
modgamingpro.comxa.com
-
ftp_username
a9085323
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
iExplorer.exe
-
install_flag
true
-
keylogger_enable_ftp
true
-
message_box_caption
An unhandled exception has occurred in a component in your application. Click OK and application will ignore this error and attempt to continue.
-
message_box_title
Microsoft .NET framework
-
password
iloveoreos
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Gertha\\Documents\\install\\iExplorer.exe" JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Gertha\\Documents\\install\\iExplorer.exe" JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{NBMRA3J2-0166-04SD-25BI-8BPWKR06B732} JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{NBMRA3J2-0166-04SD-25BI-8BPWKR06B732}\StubPath = "C:\\Users\\Gertha\\Documents\\install\\iExplorer.exe Restart" JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{NBMRA3J2-0166-04SD-25BI-8BPWKR06B732} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{NBMRA3J2-0166-04SD-25BI-8BPWKR06B732}\StubPath = "C:\\Users\\Gertha\\Documents\\install\\iExplorer.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Executes dropped EXE 1 IoCs
pid Process 4228 iExplorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Gertha\\Documents\\install\\iExplorer.exe" JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Gertha\\Documents\\install\\iExplorer.exe" JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
resource yara_rule behavioral1/memory/6040-0-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/6040-3-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/6040-7-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/6040-24-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/6040-65-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/3176-70-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/files/0x0008000000024240-72.dat upx behavioral1/memory/6040-140-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/4832-141-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral1/memory/3176-161-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/4832-162-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/4228-164-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/4832-165-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6084 4228 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4832 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 3176 explorer.exe Token: SeRestorePrivilege 3176 explorer.exe Token: SeBackupPrivilege 4832 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Token: SeRestorePrivilege 4832 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Token: SeDebugPrivilege 4832 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe Token: SeDebugPrivilege 4832 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56 PID 6040 wrote to memory of 3424 6040 JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:6040 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:4800
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b821fd148fdf894ea49d3b502f5ec263.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Users\Gertha\Documents\install\iExplorer.exe"C:\Users\Gertha\Documents\install\iExplorer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 5805⤵
- Program crash
PID:6084
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4228 -ip 42281⤵PID:3940
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD5c1d539d713e2b9fa93a02cdc7965d5b6
SHA1768a2bacc3415219412249e4ab5522da5bf71cb9
SHA256fd62605a52b41edc7e22a348ec9e3308a7874c90c46603054f1d16fff5526e59
SHA512d3c56db18b88aeb9a5895e57d80aac02e21dba189448af380ae8662f448533a45590b67ab42da99b39bc66731fc57d4d47a59e64dced693281ef01823e424276
-
Filesize
8B
MD5e2db363f28fb7b3e22691fcbd61a3edf
SHA1e2ecc172f4bc90a2574910d908a83fd7a8a64aaa
SHA25615cc51f26c7cba712108105dd8d722312b1f367cf0b0ccbd5a12908a94e4d700
SHA5121b62e106cf54e771a7f9336d6cb83e15e49327e45adfcbe1ed9634a14823e8fd246908b956920127c400735bc6a107cf114e59881a47c2f8b71a6856dedc8f59
-
Filesize
8B
MD5e877ff91beceb4ac590274f8a07b1f5a
SHA1beea151bf1feea4d48302fe840c25c4aee09d6bc
SHA25603a3f6f75b3c58dbc93d1a06a72491c9eee76b71debec4fc78c38bf147d04204
SHA51274837ced19a82abbb86fc739a1e9ba378a3174e03e76402ab7684d86de0de42a9f1dc464174b8f05a63da39df97fd4c311fe240589a807ef7fb3589d6347c161
-
Filesize
8B
MD5d8d9b0af2193433326a72ce1fd6bee1f
SHA1bd856daebbfbb88c905938bc815ec97a816c4414
SHA2560d64c198abce253f1bc791a3864004b707c27689b75caee5070b5615568b48aa
SHA5122cf32741979b02a74db22445a478e24b0d7c7cd130c8cdedc44ae83e71c9736b5c55374d82023c2c9d92e0f0a1365947cb70df3325b3f0dfcc46f3ebce21bd04
-
Filesize
8B
MD5f1ddd9ece97f6be0d283dbf1be2deb96
SHA1e157a8af461f3c8252ff33336b1712a3b280ed54
SHA256d48440823831c035059c229da64cd7990c4d379a6b5b4c9abcf912971dc7b907
SHA512422755a056b46299644923706d9f767dc42a00096a27ea29c12a767f57c1b1af1c993706a052ae1d999f3711fe78a58bdae22bf7064e9e93b3db3dc57f8c993d
-
Filesize
8B
MD59e334711037a3a8b3b4d5ae29b76f478
SHA101fa4a72cf8ee5918f543e15b2d8c645844adbd5
SHA25642c65bb6583dd06d45ba378e4b98bec559071bb2ece726103f9883baf4bcf7d7
SHA512afd5f583ff06acd1198e88044771dcdafefbff9fbe5d5c20a3176d420bb0e060f7b839c6a1cd32ca6be92ea0364ad24d31aafb6915debe3705e405cb2813c9c5
-
Filesize
8B
MD5a7f8a70ddc6a4a00d9f963bf4011270f
SHA119b9fdcfdf2222874e6840fa9e99ef2c717112ab
SHA25672f97b6396e52cde6efc1f6e888aafa9aa064421f1f70da2c199f4bbba3ed3d7
SHA5128a9c6458ae6b23bd239028a4002dbd35eca6c308fdee59e023a9963976fed960998d331ba2eda8017fac25bfa3f6aa7805c186b74962ce5afdbdcd37662713b3
-
Filesize
8B
MD52bd5ac5af76ad50412b5542f9837414c
SHA19999d810be279d708d7d5571505c3b2622b5bf92
SHA2567e82a22bd27be07ff5237fcb9a1735bd3d80eb49fa9e096771bc04f578a128f7
SHA512c028ac7685a1529c6ac362899c6918ed00feea7c6a390b18f33e6cd4dbfde9cd6331e2a8a8bb80addec253450b5b9151fcb02e119cac7e900809e243fd7ac4b7
-
Filesize
8B
MD58ca14e8f5bdd25263c2e2320ec968147
SHA11f0187c74c477b7e0703d7f449d9d9277dcb116f
SHA2569feeee2049bdfea2241bd16a8ac27af628116122fdcc2b81ed9fa0a45a61fc63
SHA5123e1f6b86109702ee889ef11a2c2180d5a20570235ca9657ac2ac3db7f59bd3ae968c30946ba180ecbb170f6bc1bae90d2b80e2e16b976ac4c85cc5499d4854b2
-
Filesize
8B
MD5a946d74746989c5a9b586b04e4f296b5
SHA1aa08e2dbb4ffe3f1d68817fd415caf049debf73d
SHA256e72e8deedaf579de93bca71f139eb7cd51ca8a545028588af6d3a9af0477ad97
SHA5121b6e0be90e0a8c71f7ac6ff408334389730efbc5753ef4c89b14628dbb3600c98615801f74b3f6df5fd4b99329483aebb04ebddafdf7dc6604a1cd677ab51fcb
-
Filesize
8B
MD56f71c32598795ee27d7c2672ac34a881
SHA111160c92ea32d1ff2296c36857e8487b91c64b5a
SHA25604c2b3ada286fafcfc5f7d335f73441ac1a3fe88022425ebc42b499252841355
SHA5123df126d5d3ffabe1cc32b5da489babe4cafa03e28aeac76f0d4d49840905337cb01f70bd6d69771a953609923dce8516dd46e0cf0cd03746c817a0c11a605cd8
-
Filesize
8B
MD53e8da1e5020b6d46f8a3a74385c27441
SHA1c5044c70afcfaa19c6427d9b1453d5a808fc64bf
SHA256a62e6aed62a85c00e846261a17b94524bbfbc19f3097fdb883c44be22372c35f
SHA5125ff4105fa8bbbfb4bb2331f0c973d0455c5c32ef482daec31ec98e862a4d7529e3ad58d4600379f06bb36b89388dd6e61de5461dd315293627209fbbf29fca05
-
Filesize
8B
MD52a364b23abbb488cca58332f1c788295
SHA16dc569a75478742d70a497600874638f13a87770
SHA256a1ddc893ee06a88bfab2fc2a6dec8a516f6140d1bc37a5c5ed5502ec23f83dc7
SHA512eb62e55d70e1aff6a5cadb72ad71575766ae125b6d35a36317443ccd88f7c3ca4b4275da116ea7c075814dce072465681b07798e221ca11d1e259745734c9a45
-
Filesize
8B
MD5442571684b435bce96a9020d739775a8
SHA183451dfbae415282e77e5959da7af2a1c5df9058
SHA25603434b0f36eb50e8e481f2e708aa63669ff3ad1b47f399a2184f3a9aa6bc1636
SHA512977bae9dd40dc85f648037b283dbcc57a0700df389c561dead51ca034b994964cfc60dc147546fb31ab39744814171cf432d8a4cd09cffd52ba5adfd23193828
-
Filesize
8B
MD5056e540cb0046b0f27aeebed82e14a6b
SHA1a6999bf10f233f262f9e6e37915928361e9debb6
SHA2565a9ddd83e6ce12a347713c191a042a25ece7e9cb505d31aa8ad89bb11bc189a3
SHA51241b52e5d4e79b10431dd0a8c64290eb93632e9c5eb739a654906b593843b67b76547ba73abb03f26aad0746ce9f2a98a3e617f1a21e4c96046ee52a45e7e0012
-
Filesize
8B
MD5e96f9bba330695953862afd9df1b9e87
SHA1b89ef2f43a25802397913b89c4e59374eae4bca8
SHA2562a19b45dcef9effd2c252b40109edcb44f9ee0aa657bbb9ffb24ae91626c5b5c
SHA5126dd427d1b9a13eb1edf986472a20a73635b25a69fe146850beb330e65d20fb7ce18dbc12062f0da1a67ce675dd42c18735a4af31ef08a0eae496527b8365b4c3
-
Filesize
8B
MD522ff9213ec2657fdc0e05c1245a63684
SHA1f675c36a1f7fe77eaa7926e1fb34f22608944201
SHA256f00a9958a7272fbc8afb9f894e9a9f525636d90dd00fdfbef842cad8a03c7ff7
SHA512f41b33a4ef3de0c21f39670db84cfba70c1264671692f53cc0ef55fed58601c4b0253f6b351b306e8c7f67b810b683f358ea23e8dc226b5bd547be85b63515b9
-
Filesize
8B
MD55b0060e76bfd6db717709070f28d586c
SHA141ed968ca53e8e1406c19c699df8bd5f87c63107
SHA2561388d7f200bdbc55da38671a611422e2ddca5fd90d833f644a502cd9cd76e357
SHA512a71ac8830be75568a075666eca46e86abe0dabf8d4d1b2529e7c2a28e80ee560adf00167f4e3f38cd6e95743a48bdc4aaa336df859631932667edca425abc728
-
Filesize
8B
MD5eb798a96890a63209bcbd99e7d7923df
SHA1be5a19d2cf1f03193791816682ccbb182b83b6db
SHA256d1a64a418261a11621b81b01decca2bb54876c1b945b9a50a8b7fcae797fbd80
SHA5128c484dcd540f1d10c896f51409f8945a13b1734effc6d84e0c1a15740996d9bf1ac62bda75ff517c5df6d6a9df8edae98519a737895aeb9e1384a131e8fa8f19
-
Filesize
8B
MD5db0f28a021199411b2de21cdc5a35239
SHA13c5dbdead3c756cb433af5628607ca80107f531a
SHA256fc768af097693724481eccfb19110ec1d71cf195d02b5ad89422e87a1fc2971f
SHA512ae27147523ad9a3abedf913a24a732100e833c430aa5a1c1d984b497a37bde2b601dd896156a162ce4188cabd3cf884cdce335f9b31f2ae2f917dd768411f48a
-
Filesize
8B
MD5bf2538108e24fbe1a15b4724fd1e0d65
SHA1edff8ba4eff0dfb05de5e48d609a8295aaf90b06
SHA256ca7e3d00e0b35ddd3a444024a9098633335b69012851ad91fe8ad947e1a9ef33
SHA512f0ef5e3e371530493688b25ba92bfc689767095a984608ab5629340523ba64e96e234b2f49a928467252284f9aa03d0f5da0231d9851a1c39e6bcd2634f0b08f
-
Filesize
8B
MD579715d28a8882b7eeed532aa79336a4f
SHA1fc8ea7584be4a9a6d7387ecdcb76d170c32aa191
SHA256964edd7156a48cc9454cc8a79400c48920210e6a6782b2778859a776209c4f43
SHA512a6a23730716ab9c348c26eef42fb4ac7fb2af57cc544c51e1c7cb0cefb6c541dce1c51cbc6c46aeea23e4574f56040e2cc0927f56589cda8671cecd5dc1fbd0b
-
Filesize
8B
MD5004659f22084f845ad858467e117e883
SHA117178d78dea1f041adf80e7d9353879540d00921
SHA2560a73e25134f205f4d1e843f833aed5f18c52f78de08344cea9f9db1c7bc49c34
SHA512744e5e4280c2c7d169845352e74ae55343193897ba01b948d77284e763e8ad488069748feacd034b14f9bb5fd65c59c5b22d2fa9b40941e9cc2f51ea2a79a533
-
Filesize
8B
MD515848240104bbe1917592648d3e98e80
SHA16623b32069a855f2a8a09a6c9c10a21372c3d685
SHA256ffcea6bc9d3a4c9d78b09920ddb7be91b31c5bee37cc196794a97f38ab728f3e
SHA512fdd2d37974b1d767c10bde04a2c8dc042b9fcec88159f04b57e40a19b4ae2c5fa0a50f7946d6c1a34682e4f507b35c294765064777067408b9067b0ed6394d68
-
Filesize
8B
MD56c2e6f7edb735563ecd4834a7240d7a1
SHA1e49b2da9ea5f64de30ae02e567dda717298b5882
SHA256bb633da671828349ef531f4bcde96fdf7bf73719abacb7b3044a327331a39906
SHA5122c2cea03bda4a0d5984cfb9521495dc62199beccb748fdbceb99f235eee694feea419fc9e566be481f9a554f05389e6cee68fd6c438cbf8981db8831ec483686
-
Filesize
8B
MD5be449518a4223a46a8e4d53f2d94c8cb
SHA18c8222a1df620ea3e0767797a002da22cc955518
SHA25671c8fdaaead011bfc0c0896df862d1b2c70a0c3461bb23ecc039daa3aa27e6dd
SHA512fe5067b3408fe6299f454030b5553192f7c3427acbad8ff4bc3d83b2fb8940c432202e9a5b1cf0d550df7597e410377a3d02cb998c472726d1ce08e4f487de46
-
Filesize
8B
MD5ec53ba9824aa557590d5f6dbd39cd19f
SHA1ef6cb969ebaa61e39ffff15391751804f915db67
SHA2563054b3e37fe657df0d967fa2a4ef39237c00f60069b10832872441580060ec6f
SHA512a56a077f4ec25056ec648d761128f2e0127586b9527661b1626457fd8c2e12bc1b2c1d2a7a7bdc978852acc32679e3c2f906c83259b0175c6aee7f7abf580648
-
Filesize
8B
MD55e1ccd46eb120653218ad4462d27f881
SHA1c63b6745eae93801e2b0b5ac8a505b2750ef35cb
SHA256bd8b15182ee0b1dfff326629f018c155f87e6456257e9bfd5084e7f43d193808
SHA512db46d40634f3c106ea3176ebf03d4e675bf803711cb0884365228e31ae37d9ec5f7d304d5a692fff5750816533ea398d117781a9e7da29a8c4e5eb6c6b4e99b5
-
Filesize
8B
MD5c8b3a2d5d6ae8c94155edd5a7aea68a4
SHA1c5bdd3615ddee931ac90a4ae89d8b53bb25f7a32
SHA256f73737d2e883878a3f88ff632c36ed8d3cec40aa5d4fa0990c43ee547399e3c9
SHA5124bf463c8b04252478b22c0e2e54b2d482b3f17532183825b1d08d5f71aab8357ea5351ede577d815aaa6bc720d3b10bb7d998c960b6007019e829fee2a67d2f8
-
Filesize
8B
MD5537cac4cabd1b0eef9a65c47d4eddcb6
SHA151a5b4e6f2cc430d75afc07a4f0c23ca6f2a160f
SHA256a0f98ac9aab6301619473e3213e6d1df857fc5c3101137c89abe819d45609db6
SHA5122d5bc2386adf31f6ed99bd9ebcd31a4f729d19aaa5daca459ad901e2f7f48d10641a807589d7f25923b1d28a736432d8201f8135d746fc10ee180c7d9f983373
-
Filesize
8B
MD515a6adb75fa9deeebfa4d2cde4870912
SHA13d72c7bcd3a46bad9016b8b11fede6bb8f9f09ce
SHA256026cf2f3ad446c74ea656cbba0a305a51f372606146ef3e0dd7c3cbf424cf14d
SHA5127952c6b1d37dbcd39742a029d016a3854fdb2ff40cebd3ac172a92adb4051d24b8c865bb0ae7528cd615476295d3f8adad7993bbc30869a1cb06424fb223982b
-
Filesize
8B
MD519ae3323c514782a006df9711cc72368
SHA194fecafe649d1344ed523aeb55252cc418ac0d1e
SHA2565fce38b0bc3b569bc9a3154e5f2734803165097bd2fd3e216c64253c3ee8c4d9
SHA512b6ceb6789ef9ae0b6b04d07f0b268db06bb9870f4fdca0cee31aebcbb66b6abb482781968691cb13151353a31829e5a0ace1c398e4e0b0204cc7cf28aed7243d
-
Filesize
8B
MD52e5a2a700eb8304974e673fb61b7e63c
SHA106ce23d475acefd4f3a0d3bf1e780f949e1e19ad
SHA256f5264b70dbe840fe6ebd416c7de461f3515dd6b0b42c06df0dffa363c712d7c3
SHA512f768a96433150552acc74913b9bc24c1124f8dec728ff21122a1d7414f9db5fc85b2898091a4def74652105ee2f7d4ea099a126789d6386b766bbb3bdcfbe483
-
Filesize
8B
MD587a151f46799b3f339c17d15a6c0b0b5
SHA132fe9f75e38f375cb9ca0b70f3e6fdecead47770
SHA256bde62230a5b1d5733d957618523ff75d9a81d98b02ca424a77f0131d5ed9d41b
SHA5127950668c1647762bcc96eebfbaa87cbaa1707482382ab6185ccffe3c4b8d9af6e54f289301e4f9135162a123b7156f0927e23132233e3e08b592d4ce671903ab
-
Filesize
8B
MD5ec32f3a52a2880f9b179fd71a8e838c0
SHA1a0bb75bddb6c4b5c1cea2f00dd0e86bf8064a7d1
SHA256b34c0c5275c3e9fbd426449e8205f477c21323314adeb7a850d8cef3ef1aa104
SHA512aa57efbb6a6d8f50b67c1792dd4dbb4aaeed1191fed98ee349d47f1a19f6bab8d73de0b1118a3f078b2f71f2e6b17acad23ba41739647774956665d80120ea49
-
Filesize
8B
MD59e48d21dbc4ed384653b52f8b560b7b8
SHA1f2dd30dd935ea6bf6e0cf1536beb01085122cd35
SHA256ed9e21f99c2bb733c9153d10b58481fa45992bf5f0d62ac887ac87c1c9b03b9a
SHA512562b659aa408df842398083fd0f27482e73945fc7e3347576434ebc4f9f594d22b282c4138b92179dad018d6f68555b4b24a228772abddcb859d13768542659c
-
Filesize
8B
MD50209cea514c01463604b724dfcf6651d
SHA13f9c4dd3de98751cec5df40fa1e0ae874c991ffc
SHA25668ef1746e9ee1d1027038d59005e02e3b16be88f4c4a53feab31d4be44534c59
SHA51256202c0fa9b71cac056182a15e6d0b8a61ba3f4ae59447ab16ce3920b7563893d9cfd18d4d5ece6a4ca990989df9d56baccd46f56323b8beec0630f3cb02eab2
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
274KB
MD5b821fd148fdf894ea49d3b502f5ec263
SHA1547b42c676e2a162e446f050bb3e24bd8f5810a0
SHA256d1ceaf8655f1b4476be390fb3dfa8b4e457ef197054ef7434332f66315aa3b18
SHA51282d543d90b024a5e5e4ccc8c53929743cd649c79401c4dd934b40a6835a395ed6a68f35bcdcb2ea6216ee588e7a32dad7e18bcfab90acf33fccf7e00499970bd