Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
f3081789276e612fe1be31893ef97670_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f3081789276e612fe1be31893ef97670_JaffaCakes118.exe
-
Size
428KB
-
MD5
f3081789276e612fe1be31893ef97670
-
SHA1
6fe24da86139379f3425264c3b99e652efba3ad3
-
SHA256
90403cfca4bbbb8845101fad657ed47dce656aa2f3d332284e03f69325e950f8
-
SHA512
c3d9aa6df7a815e2323b6f774e6f36d583a52b7c59f98d958863551c5e58cdeec7cd748dd8f2d0d4d087928187ff9964bdd706ceca8d18f4c093a8b61ef03a61
-
SSDEEP
12288:gDEwAQkxvEFI5wkYCoJoAQ48l4ewCN3EMF:gDEQwvyd7JtV8yehUMF
Malware Config
Extracted
cybergate
v1.07.5
TAKESHY
takeshy007.no-ip.biz:91
76H3DV0FS0D315
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
driver
-
install_file
win.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
hamza
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe" explorer.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S} f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Restart" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{8C1G31CC-53S4-BG57-80E3-02R2TW0Y528S} explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe" f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\driver\win.exe f3081789276e612fe1be31893ef97670_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\driver\win.exe f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2324-11-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/2324-71-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2632-78-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2632-168-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2472 968 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 184 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2632 explorer.exe Token: SeRestorePrivilege 2632 explorer.exe Token: SeBackupPrivilege 184 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Token: SeRestorePrivilege 184 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Token: SeDebugPrivilege 184 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe Token: SeDebugPrivilege 184 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56 PID 2324 wrote to memory of 3464 2324 f3081789276e612fe1be31893ef97670_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:4632
-
-
C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:184 -
C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3081789276e612fe1be31893ef97670_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 5885⤵
- Program crash
PID:2472
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 968 -ip 9681⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
225KB
MD515ee06cc13c059927bbae13a8f54aa0d
SHA1157fb8b9e28b3e26f6f792bcc4abf93c55e5e419
SHA256e2f52aeaf44b01aab8d01b0b5eff3c314e9f1e5a7c1d044026cce2c216adf6dc
SHA512f2d4ae6a310783b9bb2a533fd591709515f4e645b65e636f0fc6afb05938687176e6095dcaf85b791f6426f64b6b4101570fc2cfe5ae2fc6e693062b8709cec5
-
Filesize
8B
MD5b7e2cec09444847fea46a2c372b83a2d
SHA1816e538552ebceb44751c8a6bf50618639b7894c
SHA2565b51f80184fe8c374cf68de4c16f026662c6863f2bb2829a0cbe80803d7b172b
SHA512041f1855675f58cf6cf5c211c71bcf1b926488fd3db98442a992d18efffa03211de7386b939a458d2c3d9f8920ca1b22343520d4ff90b13626501de812908adb
-
Filesize
8B
MD5bff3ae253c68e6eae3437f5cdf15ef45
SHA161f3a6dfe4912a6c69093c9df813674b080d21ea
SHA2569cc5343320332a0c4f0df9d8a6b54672773853559d6b8fcbd2ec0d1d0f12a3b5
SHA512d5bdc96dd1db39c53173e2cd6416448ff9b352cae57798de189205b8aec6214cafa68ba6136e356e8f813bcd04abb5e27821de36b9cea82b9a84ab5848fee68e
-
Filesize
8B
MD517b5267894b85631d194e00834a92b44
SHA142fffd648a65c0b753f3e67afc3f7c50c615e29b
SHA256a6f14eb677b10bdc5ba825b534df8dbd8845c3a3b8208f95d3b3b668e82fbd84
SHA51296c5bbccdfddbc6b776b9c8c33a703a05076bd7f9d91f4ede3507b4794a5c34279574a099a0a8650f904c61f78e2e409cef3cc7dc56ad2f64fcd8ae84730ccf0
-
Filesize
8B
MD5c0d14e65e6f3844bc85998778d77a263
SHA15f9cffaf87c2717060877698645996bbcdec647b
SHA2560bfe59a91ddba4cb5a853645e2f6b3fe2d6ea4cd1e48d80ff0c8c0b4cb178a3e
SHA5125aadc88d482766b720985f87c6449aaa6fa9f666d1fb42a7863a4bd3a8d2eaf3a7ba09113033006d0056a65de365cca6135f1a409d8f43c6734ccb433b4357ee
-
Filesize
8B
MD5e73b82d28c68e6385452bfbf94d11134
SHA1d48d3848eff86e8f2dfc3889533b1e47c3e72feb
SHA256aeb5c263631f64f9d894261a6daa945cf0f3f3c43505ce837c0b77156ab0dfdd
SHA5120f8dbdbc4fe4d9994d14ff6f89e12011f05c85b55d40acd876aca3cb2a0551c16378997ea01ffb066f3c145ab9ef6cfa9b17dccfdb3b0029437e2337a9bd5932
-
Filesize
8B
MD5ad5c7eb7f0d32267cfd2017fb3ad2a4d
SHA1d11c076dbda3e9e23a676989bb7363e459c76415
SHA256ca5360e63d90c6b16c57adad88c4c8e44d1adb99af075adde406899d62679665
SHA51218ba24fbe6c1b0efb19a789895a2e5269a075dc52075283d3df661d8d318c82e4ba1e8579d222768bbb598f3ea620cf532ce4efa340119e0091137820966abf7
-
Filesize
8B
MD54fc6b99a7c55bc87b5896308a8b06b4c
SHA1bd4d7070202b55fb540eeb42f3390e8b87550cdc
SHA256c9a048b440ac3f4d52ed55af31298b4c5312af4ac9442be8735ae62f11439960
SHA5122ff19daf9844d801f69ab121de2af95dcc70a040ea96050c592b1f0f2c08e57a98afc6bd4047f05b3e1fab9595983b821dbe8a4dcb90727bfdb4c3597f52869a
-
Filesize
8B
MD5c94df3888d114a3b613290640367b4fe
SHA158287662282ddc5f5ff6229d4e86ccd101e53ca1
SHA25606230483df9bee8652829858c6eb806a57851621618908f6f31d6f5a976c3d28
SHA51292766521fc184ba8a8f1f74488f773e70e8a545ac5ec70f9b2b9b2dc4fe5ba3fee60a3d90b5b6cacf45c425b5ca1c0a9f914392d9c6f11133d61a00b779d161c
-
Filesize
8B
MD541e78c5ba30b1ba03edf8c1afcc9b1e3
SHA1fa5ca9afa5c3f97b9bb8fbca5ec896b0a97de003
SHA256db8d5454399560cb8ac7ac88f6e47d1a86e563d8d2f2ae68bde54a9da202e819
SHA512ae1e68653506de8c1d5c6fa3bd1c5d34cfe61e35d87a70bd0f87c6b2cef393b2c9ad0f6de6e818c71f08fd271330ff0dc37b158e407a63f73b9fbad6d262017f
-
Filesize
8B
MD54f15639bbef423afd4b565b27ffa375d
SHA1b725b33c087a2ddc8a7badfa7308acd899ff177a
SHA25610c90d9ad95fe6903207021e82c2757a7c6b5248d6896de0a1ed5c09e5311867
SHA512597b731b5974006a694ec5df997eb81983d2fa2f284d987ffb0b6065ca76b5f91296e4cdfa9d5057c71fc3f12ac8593ff5d84dd3caada2f36c64cbe2dd6784a8
-
Filesize
8B
MD5099a0e4de7265ff0ffde9264dfef84c4
SHA1f8aa961359aa2e0affa48aa30eebebaf414bf03b
SHA256ba1a361d1bd42c00eeaee5ab815a22c2873eb6c0b3d9bc8cb705d5abdc8cba56
SHA5123830a120ee88abc31dd937ac89a49e95820e23e8101354cc68f5283e201ac9a088b45b264cac84b7c0ff75a346d4927c83cc1b784f847e86d41dc16d4bbd05fb
-
Filesize
8B
MD596dc682f6d7b58580ca318b9fbefc0c0
SHA19c44535a65f9758eeabd96ec5560f1aa7cb627fa
SHA25620e029ab283365a3993ea1dc45ae8bb0475a0b46776aadab8c429acdeab065d7
SHA512b313fe35bb442b29a17af1288baccb3c46a0f8956a65ffc140e55e7a18a54f8e7623d921596969fe6061266b346b15cbcc90dac4d75791df96cd74221513837e
-
Filesize
8B
MD5b4ae361d2152e6f433b9d7028aecbf70
SHA1bc9bd058914fe48405bf22579a5a0fa924ca39f6
SHA256e5912067bb6b9c7f00277d1e8100a80851e209fd45e2ad6eaca1a146c75fdf61
SHA512092a36fe3ca98db41aea5ee59c7b38c79b03bcaeea4b34d40a45135f024c448412ab7852c6a8a20e325106fab6c901258552d9aa8d1de606ae80e93926d7b114
-
Filesize
8B
MD555a7533bf3d86a2b5e4ddfcb48944e0f
SHA10d073a4c248319815a6c4cdab1e6db892f030eec
SHA25606b58354ee1c2e7d0639b9fc3b88c5390110b2e5c69e0b4ecf13fff769e6ad18
SHA512a17232ae71060fbf56e61bf25b5f1bb4bc379a6455942064a99bc8aeffd5e2ccfb7c66a8c2336c9a022a0a4a56da7648b959bd6418a8bbe4870f07a0c5bb978b
-
Filesize
8B
MD5f89e32297a3b927270b16e35610e1d9f
SHA168b3568703d35cc0336db89112cec671e45f8e19
SHA256c43b63e16b932a67e15611135eef39c60b6e71504aa3270ee824533852825d81
SHA512b640f5a519eb9b4734724a9825d4fb838740292cb41daca26d9be368633dbe80c721ffdbbf9089f31421f12b6abc172d313f9e88e0005a1a3e8d50dc7bccb5c5
-
Filesize
8B
MD536c412896acf7f84d3d00b35a3bcb4e2
SHA1b62328186a83f752b10b8f071022650f9810a92b
SHA2566d362dc903d151fdd4e98757ba066f175dcd53a2a689f7f5ae1636f77cbcdb2c
SHA51284e348d2e2a40923cd540fbc1c64677f35cb7785033dc4a1f1d7f0e118cd586fbdec286312fa0d1d1475a9500b130b3d8ced295de815aa30eba61226503cb6d0
-
Filesize
8B
MD513c647173965da51a6df4fd82179ad16
SHA13877ee21726b55d7a712f2d2fc1b8b41b695e752
SHA256f5393333c5071d9dfcad953813fd3d39d1b38579bad5356cb2a6fdd8e141ad6d
SHA512d90c49ac8a85abf3a512dcb6ce90c6763ca249f0416430323d704a4b314626423540055401bb7b7389dae1561177da6eff483074e56ae083a5c5e09fb83bda18
-
Filesize
8B
MD566dc44970613d9c4cd72077e68fe99b8
SHA10f6ec813cf7e63a43faadd37d1ef4d8fde837e69
SHA256718f3b24124319c16f6ef64c17a13e74a551cc7baeaab7857ba56db4d42215cb
SHA51217ca67f491b7f196025e87aa2863c680ec346aae38045e20ef2cb024c1a3ec7b374befaadae3fad6a9541ec8bed5f11a41b20d98652b65366df43f20b50ef19c
-
Filesize
8B
MD5e6f8f2d937ead3c30eeb6fddc0394ea3
SHA125a6565a7380f2ec482e23617621fdb7a874cc9c
SHA2564781537627bc3332822f3deb1902d8928ca987aedb3a67c1cd42236fe998da06
SHA512ae9b0b176552d7ca783410b6c7aa33b38b8ef5ad00d4a66d372fa0c8704be62d0b5b2593248e96a24d404ab341f2e29af6aaf5ac4e6db18fe1a71044758dbba3
-
Filesize
8B
MD5d6acfd2b4613d4f83864e9c59afb3102
SHA101e3dcfe249817e9e046c4e6197444419e59b2f7
SHA256f0f23758e7fb2231ab12965774ecc5b1a6cac6fe8995812c15e8bf052b8b2a0c
SHA5121d224233decdfa24b1cdc5020e182a9b1cdd2eb6793ca752a3d94bb229802827f75c0349512f5218eb6250e80785cbd1383718c371865812cc9bd2c58418695b
-
Filesize
8B
MD52ed1462b6a930d6efd03608d0ddde00d
SHA13555382a6aaa9c3b09ca3b2fd1b589f6bcbe34ce
SHA25680ff00d53f28aa9e1b9dc08de28d47aaab57151877b5c49c8634fb73c587de80
SHA512fd69a7bcb7023ab2e58b670421eb117c70fdbd5a7dffda861fada631624d4e9fe0733e9a4724138bf9235b89ee2f8727c11c7311430e759db3de1d3fe7ec221b
-
Filesize
8B
MD5c65017da70e2d44367a4db0b89b1a551
SHA1db61c0fd733b4ceed2576bdb18d151d2ab282d25
SHA256274c91722379c6914a5d06cb957d5b5547a7606a774f4689d8c925922536e2ac
SHA512816465a488e94640999c2284ffc6a917c32e05f496e83edb81f52bfaee48053c856c6b702d28d5b51d6a864e2c386da3e9658c254cf30450ace9d1fa8b2bc0aa
-
Filesize
8B
MD5a44a32ef8b8361dbfc3aae5fa0d0f387
SHA1736c769df0b67fdc65d704c57b814233c5b748c9
SHA256924d2cbcb4410d7d7defb9ee8f74586bc0dc909ffd4572dc88b42745f37a5fb0
SHA51284aa769bd4d9ec0bd47151ff5acfa1221e4f79f29ceadd66bb2244481b3468764d26f4c0c6bf1e7a98a701cd70d3996b26add38c1fb575f5983787689ee9cb3d
-
Filesize
8B
MD582ca24f3180aeb6bf3466e277aca8561
SHA1a90c4019abd360a166786fab7f0803e3fc645141
SHA25610fab40b4f42dab762f307fe39c91a8bf0030149d8dadb5b3c89679321eed604
SHA51216e82ccbee02ce8c2136581f4db1c29a2fe36f9093a98db5a11a7b54bf9a74409967b86184f44ddb14f11fa270dd60495056e1ddd831e4e8f580f3927e734aee
-
Filesize
8B
MD595fc2373d1871c2b913604a4ddabd14d
SHA187b76b9afb311277e5357bc647f45eb9aaf6c98d
SHA256c9f152775c23d82e011111c1f2a029d60c9e3fc08131b1f4b07b496b5e231ea4
SHA5124e85effdddcfd63add948c8dd9d8d4c55e01246e09d2073593f8d02e6c9d4a9116ffced07b9f522c2b6029944813aef9c06e3f82b946006d3eef52cfb13f0838
-
Filesize
8B
MD5f1458758c32bcab50347bb73e5524f32
SHA15a0ecdc8a123662bff4fcb21fa119ac16babe92e
SHA2565735080a77000cc62c5ea8347460ce48cb81684529b61c82f5efe2e8944af231
SHA51216aad5d47052fcefa0aa2987cdaec4a8c55427684b3fe9d535dc40f626e75442d8c9d12b95d5e9502f0800d4f9ec38bef698fd0a5e82ce3afab9f43a53102439
-
Filesize
8B
MD5fa056995d112221fbfc9c2bd4a41b93f
SHA130d4875287f7f307d55d2754ba8836288562ec07
SHA256caf13a7824e351718bae4e6a9e2d34b9eed4b7b1d3060a4fe307b938964596dc
SHA5124b857335d21403ec3188ebfd4ac2f53d907ed4bba4f03380efdba7b0404fce60df161a19893daffed20c254c34ad830a189f63332c73938ec397cfbc72a35205
-
Filesize
8B
MD584c77648273bc77e7186fc009769a453
SHA1e662b0eeb17549a87fa200c98b7b71e6ce12440f
SHA256f94818016d427d21c750f07daf7e1fb570cde75190daa958a2ccf01c39ea3439
SHA512887dd93b2e6a847266cc0c7c7b39ca1200c070dbb4554f6b480231bbbc10a9e5980a5e7fa3eb356f2ea6556477e16ad83e95e7e81be4e941cbee51d806fd2c61
-
Filesize
8B
MD5541ba29aeac8399d77b1770714c78ff0
SHA19ebc92d78a7bfd5c8d231da3d7fc81636f81828f
SHA2561cceca230348d1253abf68d6d2c527c03d4573b6e34cdf2a644b27d7ec18fab4
SHA5125f52629bf7eca28c7ab2d50d498f2198bc2da9e38e1ec53423cdf8f37e82d852d3f73658cb3ee72fc0639049047aecebcf0968a835449d368f2c72f9ee068ee4
-
Filesize
8B
MD5ade02688fec58ae6a054339f89fd7c9a
SHA15443a98f30e95fab3c21d05dc988bd3b75643f5c
SHA2560e0c2d171bdfbb12ef31a2af66cc55a3dee15d101fe0701f845ad8a66e703370
SHA512ba6ab2d1265f431ccfac2828a00d25fc7e09ac4ffb15c359ccd3ff4581eccf4d220c99cd6a5f7c7d6a324fea1cdbdf46628beac43a4f0ed5a98ff0addcdd58d0
-
Filesize
8B
MD5d125daf48262124bfd4a46e86c900a73
SHA1885ed1e409de4a222abfe012991ea40c0fa0fa01
SHA2565cec9ac0fe3c6fa3541d9d0adf2226d6fc33af11bbed6383a9b169ea18419579
SHA512dc1ff5f084c80835d4620618be0d662a87478af81bfa340239f89c4ebe090eaa6e73b32ca891e14610d117f17bba4561570de7fe422b0a918b4d92192cc96ca6
-
Filesize
8B
MD5c3582c011c4fb3afd8c23d11ee3d3537
SHA1c5435a706232e94d2c6236944ce24f550c958f8f
SHA256bf182e38013f78634a215ea6e7810bfbcbc4ec9081c2949dece98d8b6de37b6c
SHA51299e030726dfc660a5af80ad0417150a44e651ddd3917c55a624eb08dd30664e96cabc1e12d307e3eb905a3617699bcbec1cf3f3abdadb8629f692a608a6503db
-
Filesize
8B
MD5e8c3282aa7b7477eaddc02964fba766f
SHA1a0cde785022b870837fca7d0286af122c4801669
SHA2567cacd432cb6a3e92783bbe127bd840e5e12d08a749710f50cf77f0f83b70829c
SHA51264a048c6d57b7d82a14a2d20e94442f1e106b11c6f822c9a2b2edadf9f7f3411513278ed475d629f158a628652bb8372243bdb358185397713a52f678ec252be
-
Filesize
8B
MD52d6306754925943ef75a0115f7b92f8c
SHA19c630520b4efb887cc9eef7b7123d6af43c15fc0
SHA25625cd87405c74284a77460923f8e77159e5ec0ce158f84a30f83b90476caaf510
SHA5129917e4d09c20d9a620962ff6bd173d0093d539f25d5530c9b80dc6e2d4d5a28d0c2aff5351b0398d83f21739764e04db2e2bb008eea0611782729fefcc0ed8e4
-
Filesize
8B
MD5fae779afb354673654fccb0b6d8473a5
SHA1068cb2b2e47aa451b65dc0bac2b8170dba583cef
SHA25649009c76d5082ac719a530d26d541bb7d04c0bfe685d02008ca8c304a2f3cca4
SHA5120f0e159862538919a92adda495932a03d5d70fd36231084e26314a7af9939ea2e00d256a552955536ce326572370d53591081b05584488e96ac7d17eecfeccb1
-
Filesize
8B
MD5be0d4aae9cf740b96e3679fb5b305844
SHA1de7813a48b811e2b20ce31dcd4f5b29e552a35a7
SHA256e0f386c8206469f5aff0fd03e4c2d58de8fe3284934f103270e47eb8ea017093
SHA512616b1283c4dee371a62aef9ea6fadea1418b30642f56eff9d64f5b404b31724dbebc9f75162ff1286ef46c15c1eaf6eff6b8de7bc3abde3381034131e259ccb3
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314