Analysis
-
max time kernel
118s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe
-
Size
317KB
-
MD5
a0dffd0a644a6454364b5a466c99ab14
-
SHA1
b5445107743830918c3544d56c2755d23bf5f663
-
SHA256
ebd767714eaeb627c430dd1f29f7e3e54ce99fc1697dbc90f34404ab002ceb45
-
SHA512
bd5e5434a1c4fb663e47c7239b01f0b53fc6c7d1a4b7818830c026e36f806cad74b492ba4cb254d6afe1e476cc36aa752661717b7ced6e47636272e94760531e
-
SSDEEP
6144:eBylvANvONAB/Xc9Q1+L2U1Fz59gL5WIHZXqk+mB9rptOVpl:eo45n/MjZFPgL8I0xmxtO
Malware Config
Extracted
cybergate
v1.07.5
Cyber
tinyminymo.no-ip.biz:100
J86XK6HHG7L212
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run tmp885A.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" tmp885A.tmp.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run tmp885A.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" tmp885A.tmp.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{34N46BCA-P311-2144-8GI1-I31RX7IT4QH3} tmp885A.tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34N46BCA-P311-2144-8GI1-I31RX7IT4QH3}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" tmp885A.tmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{34N46BCA-P311-2144-8GI1-I31RX7IT4QH3} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{34N46BCA-P311-2144-8GI1-I31RX7IT4QH3}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation tmp8618.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation tmp8750.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation tmp885A.tmp.exe -
Executes dropped EXE 5 IoCs
pid Process 1820 tmp8618.tmp.exe 2376 tmp8750.tmp.exe 3920 tmp885A.tmp.exe 3816 tmp885A.tmp.exe 1872 Svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" tmp885A.tmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" tmp885A.tmp.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinDir\ tmp885A.tmp.exe File created C:\Windows\SysWOW64\WinDir\Svchost.exe tmp885A.tmp.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe tmp885A.tmp.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe tmp885A.tmp.exe -
resource yara_rule behavioral2/memory/3920-46-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/3920-108-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4564 1872 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp885A.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp885A.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tmp885A.tmp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3920 tmp885A.tmp.exe 3920 tmp885A.tmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3816 tmp885A.tmp.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4872 a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe Token: SeDebugPrivilege 1820 tmp8618.tmp.exe Token: SeDebugPrivilege 2376 tmp8750.tmp.exe Token: SeBackupPrivilege 1776 explorer.exe Token: SeRestorePrivilege 1776 explorer.exe Token: SeBackupPrivilege 3816 tmp885A.tmp.exe Token: SeRestorePrivilege 3816 tmp885A.tmp.exe Token: SeDebugPrivilege 3816 tmp885A.tmp.exe Token: SeDebugPrivilege 3816 tmp885A.tmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3920 tmp885A.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 1820 4872 a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe 83 PID 4872 wrote to memory of 1820 4872 a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe 83 PID 1820 wrote to memory of 2376 1820 tmp8618.tmp.exe 84 PID 1820 wrote to memory of 2376 1820 tmp8618.tmp.exe 84 PID 2376 wrote to memory of 3920 2376 tmp8750.tmp.exe 85 PID 2376 wrote to memory of 3920 2376 tmp8750.tmp.exe 85 PID 2376 wrote to memory of 3920 2376 tmp8750.tmp.exe 85 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56 PID 3920 wrote to memory of 3544 3920 tmp885A.tmp.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a0dffd0a644a6454364b5a466c99ab14_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\tmp8618.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8618.tmp.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\tmp8750.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp8750.tmp.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\tmp885A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp885A.tmp.exe"5⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\tmp885A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp885A.tmp.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 5968⤵
- Program crash
PID:4564
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1872 -ip 18721⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5e95d4f45fbb330d68c8d1a22c1fd2fea
SHA17b7c6ef23d205f34880efc0604181dd95443bd0a
SHA2563947444521740b0e8686451c5b722257f1438b8ecf9b49c69844591c432ad9a1
SHA512c225ad6f017f053ea90fe8fa4fa460d9f446fa1b829b839ab052e4bf97747e68fa83ac8a4b0fa3540c52872dcdebda0f6d38daacaf0200522768673a2ec45f57
-
Filesize
8B
MD523695b2ba72a55af184b278a4aa1fbf1
SHA176844a86fb1f93775227d750280de8f5381ca1ac
SHA25642f4c3fad6412cb87c29aad6d237ff26ca8cbc2aa3b450997a3e7633863a863b
SHA5127f54c7c5171722ea514a60ab913ac5d0d5c4c7357edb47cf3fc977967ef347fc7622939538e9d4df45e033f95a2324f3fccb2864d5e9e1852ca8a3299f3bf4c3
-
Filesize
8B
MD519f5c030f9998620a2e5c33aa96224a4
SHA1f5b2366ff6547a02d42135c37458f9de52dcb79f
SHA256986e18e358cc13083c28ffae59cce9d3554001c12d829560ea18b930a4ba5f43
SHA51206f618ea69dd7c87fec972cbd6eb9501984cd09fe1c4d102077d4c99bb8d4f884e85036069f94af5f3033a6d808ae5e8db8363be5d50b06ed95f200c879646a7
-
Filesize
8B
MD5e777c711988d6f62bd60f551cdac8468
SHA155c08babd9a3c7a292218828b56ad45fbb59f2f5
SHA256d2825d4d8787585cec6e35b2b7e475f1401738da5a106044512f772d3d65c018
SHA512f7028d1d12c3538ee782959c739d39ba45a900889c41d66eb1071f15e9bb2725efe9030438c9ba5808a5162af611158d1ac5e71445298ebf03b6a79967ff75a7
-
Filesize
8B
MD527eb6fac00c445b0e618f62d4df2e21a
SHA1c067a12bbd202be1ed69ea7ff0fcb890546c8675
SHA25697bd5bb9a614faae463eb829b8b676c6b82cdbd1526d85ae7b273ba71213388d
SHA512c6a16a4362e886b38fed7ae9b8cee4738089651bf2099e4fbfc1f67ea229a3f475e552e7a909abd2b4ed915dc2b4a963f556bd4c6538e78a0806ee1451b7d4a7
-
Filesize
8B
MD56b3d530295212391bf721f3cfc280fba
SHA1e0cbd764564d416d990b1266800d24bb4bc53112
SHA256413c026a92dc0aac348668cf6bbc71f01c5343a0d89ff897a50c6845695bce1b
SHA512a589cff48030aee8c2b7dc5d90d81a85f780fcb208bcc6fa0a95135b38d59fe3961a3a4a0a0ff980047bf7e3bfa588a1dc24e14a5c536b7e0ac9f01fe10c4fe8
-
Filesize
8B
MD53dcad518f478fb49722aea0a44ea859e
SHA177e17b9d31c5b8adc7ce67a4f639ecec302d51bb
SHA256031499914a2a591de394e315b183c834cc294f2b2b421f9840e3ed1d86fa8ad2
SHA5128b664cb667d3a2db075eb2a33e3c92c86b1e98ba02fd3b99be7a9e60abe93014696d32c0d0ee7b2f7eac1afcf7e9649def1618ca6aa91b545948f001e0627792
-
Filesize
8B
MD5e3e3283de638521c06ba586bb2d9833e
SHA146cdc85c76617535799027a837e839c61e22c3bd
SHA256dd960fc48a6ea2b73fc5a5cc6cd363e2485b0a45ee4e890e7635931f43a04f31
SHA5128121d3fe8524cab098590ed3adfc005b7f4e17acfc761ccae1e4c98f8e4b8294a01b3f71e6dc7521c1001952891714aed24b4a8392a64c388510459c832f9cea
-
Filesize
8B
MD58eb9be4a495704f30f9344a8fd1869d1
SHA1b12ae1c0b376a1e16d1d507b4c13fc24b75de754
SHA2564405e9a64acda2fc2e5f79620133aca968efdbaaa9b38650aa4d515c95ad8922
SHA512861685330e39955a117ba42306120b4df607775a2165894f86a269b169f08cc754b59dffd1e6fd4552ef2f5caa7c9c6ef4145b87eac10e87b2c428f0390d1e5a
-
Filesize
8B
MD5baf6052fc8ec19f38fedddf1ff744a4d
SHA1ed9b36d00e45d4cd41585013413afe2d532ccddd
SHA2563aacd72fdb7d9645d67992ae5efd28ed90db90e82121094955831ee3ed3949aa
SHA512c0f651f8c1dff43272e36955edb2f536709a739c5420e0ea489b89cb99a84a81a4b62b1171649ef6a74d2b70646ef52aa14602041227ecf6b404bf1be5e5c34f
-
Filesize
8B
MD5540f39e88eace102879d2fb1ba6a1084
SHA1da2c2447dd126a85153a1a40c5b7aba3bd07f5f8
SHA256ad983b1e51325baed2c78b19680f7d2f3d7481670b5f33e943db0e0313e2e8f6
SHA512a601c4fb0d0bf87d2c5e986acbd4512578013f62a7ca41b94d5b950e43b2fa32b68019d1141b570cbaf134945dfbca1c6a9150ad924921858137b59072e9f754
-
Filesize
8B
MD5499053571e173878b31edda96d3eee2b
SHA12d246336082500f263d35d5f50462f862d9dc87c
SHA2564454f701e7d8e3a57e73a5dc19626060f36d637c7f42aeb80e757442caae00ce
SHA5120ddbb307f85a26291a1c9388a5d6e346dc0280c12f26f88f98cc322a8243dbc2dc3cca90120c8444d302c6a43902eb1d61759488947989ac3752dfa886e1f8b3
-
Filesize
8B
MD59fd1e3af5ecb311a2b38ff6127e7e36b
SHA1d87ab4010854444f470baed218954c1098564b3f
SHA256d8a212fc27afc77436c47d0ed52cd164f64e7e43a39d4e01b26038560e0b2dbd
SHA5126b31216d9fbe186988960b74ffcc295e2154de2fd3d60048b7c498ce74923677bc6b12c532fc864b2ae298459e1e5f97c5dde5c60d9ce955d09586290663ebee
-
Filesize
8B
MD551e815e8753da6b0cb58fb1fcbcf13b8
SHA13ae7230e823854367d633cea3eadeb123b06e27b
SHA2566412bcfebaa143d08274ad9918ff6cf0c3fca8ca0d7827550894e5ddc57cc557
SHA512147eaf91fe832c0c77251fa4e14db8fc98e413c08a31e708d121cda5a9d5e2937b4d8bf76ddab6a2e5719b166fa746189516ac6c89180e9c99c1cc8c66fb037e
-
Filesize
8B
MD55e7901b2a37d50dce13a0bfc2430882f
SHA14894b51407c7bd7fbb0c631eb5c07f47d7e88772
SHA256f8bd2c7d6f4a537e478dc88c349f4d201ca8a164c017527b40c5d604a95ab184
SHA5127f7b0b32199337fc080884e1f54d8f0d28f911496cd42f3ebfb6531b21df45d8e93d2db34c76bdc671e096e00be0c3572a32701edd72b6d20d9152ec2fe90ce4
-
Filesize
8B
MD56474a6a477a7fdadd0e54090175a0a74
SHA13b5787dd9f4b178c58380528ae2b1a69708c952a
SHA25655e648e4da2f5ebc78cf0fbd5aa2099726cd9f5f1d2d6fee0a2eccb0543b0339
SHA5126a14cb6ff8c9b6ba4796ca7b83109c5d3b132cd836766e9e0170083e277a0449977b98f420f7659d1a49c1054c5de56b7503772f84270b2c9b1a088d169e697d
-
Filesize
8B
MD50294b1a8ab4cc8416595922e8a778e91
SHA1e440575d28e070b2e228e92005a3d5146ef91734
SHA2562b5d608e8658d481bc950064c246095a9f0686548847a9a120312551be5acb94
SHA51283e3b97db29f8b6b9d19e2e09a003ed48494b7a15b90a705e0404c046ce846dc9f5220c61e8b3e61c165a1547607bc35398f8e33984871cd448e74ac5e1df6e0
-
Filesize
8B
MD5e55148520f9bf8df9a58742dd5ee694a
SHA1db8f02bbe7f1af6d06a8e38fa1fdb72feab4908a
SHA25698b42ae797c05e55882a3f53375242bc392820f168bbe134ff116341f165cddc
SHA512dc0e9672fa5d1e4f063c1193180e12040f86ae51cedb7b267f8384014e0b26f321c9e6e0cb33a70ed11dff821c318a6b705a2989c627a0c7fff534d0ac22b96d
-
Filesize
8B
MD5289f35be665528403c7a60994e8061a4
SHA176d7f543f236cee8d7d4f673c1a7ba6c565dd262
SHA256acf33fe1ac658b318e06094d4ef2db95f848719c0f1cea7b0d0c5158d70633a8
SHA512a9a163c40e70f866dd90a5ee5440265e61dc0483cef5c147916365fa710f097df82bb05309e180c0c9f094cc0bfca187bbebab0b4f098053d2c72b391fe88aa4
-
Filesize
8B
MD50bd96f53027b0f129ac0132dc8e4a88d
SHA110e149384734494b121cc65ff3dc58d05e08492a
SHA2566edf4bdcd26dfd6c500b9621afa1f29dd1c1ec9a1d65ff826157c6681cbdcaca
SHA512f9f7644e8063dc911cbca9d1bbba7a6342edf8466ff79f78ab0bda42294b528e049ce809cd0a09247b8a9b162be2d93e76f6f9b6a097fd3db6f106423263ba2e
-
Filesize
8B
MD5f09624b46c1212381108adb9e4bac7e9
SHA12cb1e567dff3631cd621b5e2b949dfc631a7c3bd
SHA256eeb1c950cc7041c1f8e8ffb1aa818db41dcdfcfe3d5d3a5b27eb7c57db932aa3
SHA5128a070018115fcdbfecfd11b5a03a2ecbfe73a3b93acd3e208d9a470dd6f84613b340dc244df7decb4467fa9f733971fe45c8f8ca7a326b8cfc2e583b490ed961
-
Filesize
308KB
MD570b587b81f55269db181349a1b0a4dd2
SHA1f75cc3c1352d5acd35de436969a7ca134913cc67
SHA2565e7f8b8cf274709e45b0c26cbbbf899668659a49747ca29a9411de97cba68215
SHA5121b0a66f79a36392494937f917048045034a9e16981a2c2c43e5b68a93d9ad7c0c66d4029864095076cba5584b43bd63148ad055a5c501b94bc911267ce35d3a5
-
Filesize
299KB
MD5b9eb469e1255121c399e785e0bb4fa42
SHA1281035db917e25c4fdb54df26bc407857459ce08
SHA25656cead34c53a980d0daeb27bd30125a0c1589626aeeac735c3724eb9b1a19ed0
SHA512bc7cb3d907f2027c6d76e20dd7aa5c22e63c33a23c37871da51eb88a73d7c298c24d2e947e79ae9ea201744276188a81be54e324b1513cddcffda41939afa21b
-
Filesize
290KB
MD563976084b4c862f2b33edb5fc277b4cd
SHA1b544ffd189a5bd28eed2f75e18ade9c1fbdce8c1
SHA2564b5b33efa246df31b7e853667d943faed66ba15de74f0ed4f95584383fca16e5
SHA512fd83abd932683e52e7b076acfaa485100a0c0dfa3843337fadfd4a9cb54de4938f26d0036562ad6c6439585b880b60bca0dc0c145657505eb3b6ba528a54168f
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314