Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 09:07
Static task
static1
Behavioral task
behavioral1
Sample
ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe
-
Size
816KB
-
MD5
ff414f1309d5d515142db2007e5d46c9
-
SHA1
efad0212cb6a13af7f91da3377a15aff4f5fccf3
-
SHA256
683066a289047e0ac2dc1045625ca7eca3a9182593faedad0e0b9380a56bd95f
-
SHA512
7d789a8791858e19220cd830c2be128086a7d7e7f7e1e6d0f57c7e6c6f0b06de95552cebfaa6fa8beef969724fe16acb4d478b8aaf833e3a78dd5e842ac3c30b
-
SSDEEP
12288:fOjvNofe8KpiwQhNx0miyC27IN7JIiuWaFkb0U2pUWh2uXolEeaVyTZp7pdiaMEO:Aoe8Kec0u0UfWa
Malware Config
Extracted
cybergate
v1.07.5
Cyber
chandlerhost.No-ip.biz:100
chandlerhost.No-ip.biz:82
8PMU6F737J1NEM
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{22TH5X57-F45I-O078-L4XY-2K65OOV4788U} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22TH5X57-F45I-O078-L4XY-2K65OOV4788U}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{22TH5X57-F45I-O078-L4XY-2K65OOV4788U} vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22TH5X57-F45I-O078-L4XY-2K65OOV4788U}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" vbc.exe -
Executes dropped EXE 1 IoCs
pid Process 2492 Svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1276 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\WinDir\\Svchost.exe" vbc.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\ vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2156 set thread context of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 -
resource yara_rule behavioral1/memory/816-25-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1616-563-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1616-915-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 816 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 vbc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1616 explorer.exe Token: SeRestorePrivilege 1616 explorer.exe Token: SeBackupPrivilege 1276 vbc.exe Token: SeRestorePrivilege 1276 vbc.exe Token: SeDebugPrivilege 1276 vbc.exe Token: SeDebugPrivilege 1276 vbc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 816 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 2156 wrote to memory of 816 2156 ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe 30 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21 PID 816 wrote to memory of 1236 816 vbc.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff414f1309d5d515142db2007e5d46c9_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5c25e82905c266fd9252211e60c4ea182
SHA125401559bce06705562f39e36404afe3bc0ac40b
SHA2563a064cde7f612bfbc48d77c65efe833146402a1df6730d733c5103d4081ce1bc
SHA51250df26d42bdd0ee38f595d093f4fb32b641a4ce4eeeab81e7eb3974764680f9884f4899a639a381189bbd568849b73f953b321f72dc4435df6b0e2874f41ecb2
-
Filesize
8B
MD51d13753fe4a189e95005bb412068f18d
SHA1b0da74eb853b0605ba73b34eafbcd55093dcd492
SHA256d659e40fac9d16e3e87e052e0655b8d809eeaf27460185cab0ff843738ce9d0c
SHA512335437e29e588cea5ffc4ed826fdf05132706d5fa8cba976ceece71dd44e8b2ae0c51044bd58b6b664ced76dd33131e15faf0fd78e3f84547a4e0f0aeb646e70
-
Filesize
8B
MD5d737eb1cef6876af9ab5a78013a5d8c9
SHA151df6aa4f666f3e8873dbfe0afb551ac865e1bd4
SHA256dbeb47a76d7bdcf6e02194eebac4ffdd89ed3b7678dfeaedf7cdc13a81aec918
SHA5123f31f7281ea37280a2662b0323484676a2891f14f5d5a2dc2de40dcb254c8e703829ccd8d01775a603e414c121b5c08da2c132524e7e86806d95bf39e9b2bccd
-
Filesize
8B
MD583d7ebe1157d35e365fd91db091790f7
SHA1518b81157d2d5180dc6f9f46ded3499fdf972c8d
SHA256eaff06275653214ade914fba936c5caed9378903f1334fb7b8b2fd15d1444ef7
SHA51220c65dcf27ea221ec4fb10551a9b7806242e8f0f90f2547afa0ff6b56a541203434fba4b69c9f3876f75b2efda9183e82cb6f22d829d63b58ea4d1fc823c261b
-
Filesize
8B
MD51f55ad97a97c2cb8b8b6763198868537
SHA177197f8ef1ff878abce6d42702a1d2a82d81dd8b
SHA2563804e4cd8c04b3aea5082e5e4c2f1b49a80d8ccc1290a379d0a8c85a6b6236d4
SHA51214bd5ef2ce477dbb8a7cb1af025dabe6028e62edb51c1b59d136c9d65c81a4b3f68d3fc3860a7e032ce829eae836f7bbaa40b4a04e85dcbeffc44dc9f80d95b4
-
Filesize
8B
MD56864c77c065d3aa0cc7ffd4f61de2e76
SHA1a4402cb067bed7ecc980bca9060c0205bc0c2c27
SHA256d8d8bfd78d68a0f4105814eeb062a950e975b1516e1cad0d540bb37ffb5ec11e
SHA5128ca1f77a2688a951d194c2863d845dd7d975d915f2534031729aeb27104c0aba5bb1403b80b9b49fde3c0d588cfdc94106ca617ee4e660bb78163fab89f0dd63
-
Filesize
8B
MD5de96e50d62e647d9df7866e336b2d124
SHA18c06bb13d584e202cf5fe3fe3945bf21067b660b
SHA2564fdf4da369a6bf33a720f64c9d1c46efb173759d694d001f2d4f1d54f16cb24c
SHA512aea2b5aba6efe4b671aba7d2f78dd226aa7c124677bebbcdc6656252f7510edcc22c7361c37f37ffdc4728cb4808ef1b514f14d4a623e6240847789d9bcee3f3
-
Filesize
8B
MD56707073796dce2623a8cd71bcd920f6e
SHA1140d87dc18be9e3e3de61734594d968029ebd317
SHA256b9cd073ba445802c4baa2cf5a3909e755de30c617d5791088cf9f5a52025ec84
SHA512d69e1ab654df696bae0d85742c24e3627902edcf5faef61c9fd30e46270089c6e0a7e530d7fdbc030818714a50c1bfee77487960d2fbac9bd808d9509e14e056
-
Filesize
8B
MD507ef4ba0d8da3891cc4ee4ac498a1f86
SHA1c93460c4e19bc5224d9c384d3c230ba7d4886c6f
SHA2565242f919e69018391ed48c9ffb96ef79d9a76874544d63859c1c8f1e427a112f
SHA51252991d107c5b04b2f647268dd10fdd7a98cb2202bc91a7ffb82e21e5359c9717ae4f4c48e583427ff87e42f32df4e6ca0e705b82f5eb075b9a8970999cff4a50
-
Filesize
8B
MD5a7010b3497dbc639f59c541f2a7cc5a3
SHA1c2e88c40facac23484661230da763db09687b0e8
SHA256c48743f3cbe6ab262ef6d13372ab6efba6983d32faeb5ac4e451c62c7a694b1e
SHA51237b7d33a2d0452d1af785b7ff21bc4c2d6e54f65e4983353d2bc4261416ac2ab4afff09fe710d66e86dfa31cee312af50208f197371a5712fc746256adfecfcc
-
Filesize
8B
MD5cf033dd32eea0bce88b8e80258f84e90
SHA1de40ad449e1e3cb2dff79c3e65b0aa3996f30c78
SHA256801f81a9b4aaf93a8eb5c3297b6de3caa49d5e0fe8e2215cfd690d34d3a3d427
SHA51254a7cfec36c94487009f60d2459a4dd6e1cf1821615f14ecb039116b21ceb5160f894b2c3ff8c4461b3c8f7856c8582ccb9792c9e40529d484119317449f3db6
-
Filesize
8B
MD510ab0a34734e56c73de22ff9808215c7
SHA1baa9e282551ad58213079c0d63cb61da082ca1fd
SHA25682ed488d78fc7ef7f4dbf7b304203fb6e378ba028dc089e13456cd0f3d628ff3
SHA512b2952035e299807e3fcbdd35d997422d3f3c66968901269ac0c4a61e040f7900673cece0c1bd7b958b81807c827f6a4f1ada6345684ba61a211d82af2e2300fe
-
Filesize
8B
MD5017abae1fc1397a0ad1ce00392019b98
SHA1b6aeff13e0330f318346117c092197be8e7f3ad4
SHA25645b3c9a57ac51eb1b98215da8022c924b4fbea812e5205b63a5204c632e5844a
SHA512c8182b94b543ff90a849632d5c6aa0a448ad17d0dd068a02e3f6a7239d68cc3340ac546491e088d6ec2695978749f8d91533d7dc1aea735a49b9e73211cfe777
-
Filesize
8B
MD51a6f048dfcd3c19cb6a9836a70f10ae3
SHA1958ae779ee422e5bf2a30fb89c98761af9e8387d
SHA256bbfa5314158a28a1d3ede14ad12e105a99b3623c09a9d0f41915ff844c8faf86
SHA512851bc99ca2704d48bc1c41309e2babbcb835460073348b1831ade89d44566cfd6cad07aa812d8757ce907a9dd063d9e7829b3207578c3568ed35f0968096541b
-
Filesize
8B
MD59789c664a7e1d384b7c326fdb7d5b961
SHA19f4fa42e845bf9445874b306419737fde6d4d610
SHA2563c6c04cb08bffe108208a2e589d982a83d953626093977ae84a8d3569a4b0492
SHA5121938075017f9bd8bfe6a1f666ecb6f23f6fb4a2449deae4a0f6cdb5558457ef53a278272083bebd4918dea30bff2cc3395509da6ccbfee0febdcae62707f3417
-
Filesize
8B
MD5c7317791124a2067da6a9e6111cf0a57
SHA15f0e753ea4847e698a6a594b220dbaadd2adda85
SHA2564b4057f5f2afba2b72c1b0a94d9bee5cbf7d33fb683c23431691b2f49ae44aa6
SHA5124f4377b573c9193f21a7cd9d4fd2af0fe2ec7dec9cdde1592c7cbf44d4cf1e09493583895ea17fdb3e150d3a4e30dec8012855db5bb710ce73d37b752b18427c
-
Filesize
8B
MD54c7a9c84ea4116a28c7b34b50332a512
SHA15e1e6ec34bd0b92d4cd78d57f1481b99d8a01be2
SHA2566d32d0d6c0d261021926b4c029cf86bfaf94f9226426fd3d126a96419e9c3070
SHA512560a075f8e546051b0edd914e0988e93ecd9c80e0563e8ac5c767d782ce70296366d9299939552db9028f75330b647c03bbf26ab4684b16067fd0d0909968e0e
-
Filesize
8B
MD51a3ddbd6264db0402a2d823fe9e159d1
SHA1afc48e97bcb4b089f5eb8b6b961d8e9463f99f39
SHA2564ff6609ecd7485ba9319feb5d01cde99275b25a17b9b5e92fd93266c3b7429da
SHA51282ac2493b3e693e704b51589e7898b6539ec86909fa09d0fb294489f45ac392b341d9f18c357e0b3eba536ae1cf6e3e9e4798a5972ac72904ddb5baf69c3eda8
-
Filesize
8B
MD5e86c17818e095f9cea0a3b3b4fb96a76
SHA1386f1970227ceba40d232a1b46f12eb42b62b1e2
SHA256facd72f6806843152cc04cf46d197a3efc9c777f8eb44d6698337b3b875e394e
SHA512a40b7b2e86fa42a87d64456f89f6508f63c0a1e829f77bd9dfc54384004be857f09c92453069c8b155b847ef5215c5541f649571deded999ec2def773c86b876
-
Filesize
8B
MD5d617fa11ceae3c0fefdf875a1cce6c6d
SHA1e03265f137648a27d7ad3ee898805a0738572aaa
SHA2567c92c47d289d466fe2197b4ec2650c51b8b769f77f62d7b2bf3b396ab4f5a1be
SHA51234b53f7c5b42191928b13bb97448a2ca50c0236d0945beb327d8c58164d004a446733fdf24215ef235a58690d77badd78fe4bcc4683e51344cb53ca88d6530fe
-
Filesize
8B
MD5e535e963b051abb06a90a727fa094586
SHA1e29c92c5d831a8e22a623dc2720419bc89b0fc84
SHA2564844b9457038e9573f02cbe14c21be3a3e24de788230d3ec7ecaa3b7a50c9507
SHA512f8fa332c4d0a35c206c67fdfa011410822d90ce0225edc4e8d073a3f2c08d0adf24365ef3c9f8c1e80fb43cfa671894cc31aa468122ba80786182dab9e049603
-
Filesize
8B
MD55c51417780d2fdb285c5663201d2442f
SHA12a637d4a029273a5fd46a5ab7963d2c85e4d9759
SHA25692642f7c643594f2155fddae7e8a032131165622484249d740ac1bd8a7bb0422
SHA5123cf722aca7b8376521d0c799324065128456b46b31073dbeb3d0a3f059ef08e8a04fde1891423c8b3ce2d06185278f5622f9c1ca6e9e48be640f35eac1b88c4f
-
Filesize
8B
MD58bead7fb547784ffb9c148073795fe16
SHA1bc06ef92212d378a2e9403a1e04d8d2f6045b88c
SHA2569726a89ba7b839ed1d5118364b942384b9403d0f274077e9c3700cac4f8d3993
SHA5125378af5ecaaed1dd4de85662ffacacd43465aade1a3e8b814e2284f142befa21860360080138133e1831b6014c5c3155c77a996efc69a8799babf19e4e63ff83
-
Filesize
8B
MD5a142c2eba20ca25cf5418fa8c369848f
SHA1622f6af8e9e47d9598b2c08cf72b2809097d7790
SHA256d2cd3dc7ec67981a5dd42e91bd8919c4ff08551d894979c678fd8f749a2d1003
SHA512ce2329304552a3502fae9dbfc573e03ba5c61b5fed6f6b76028d60a335df03cf39137ce81bf154ec9aac461ab6f4cce3db98d11751ee4fbdaf3cea3ca0225f2d
-
Filesize
8B
MD5584bb25a58bfd4e66b7786ae388aa3fd
SHA10a9ed38be61abc5be23bf318bee936517b8408fa
SHA25695f21670f1fbbd589be716a1b39dfe418ddcbb5fc383fcabbcaa9c1d533bc23a
SHA512974f8612f62c83603cc6a1040f8b280e826ec2f2877df9ade9fd762afade63e493c3dcbbf25d4f639489dfecf123d924f7c5f966637f6c104b54b60c1a07ea16
-
Filesize
8B
MD55e715325efb1151249a2905ae8b6dc71
SHA1887defe4ac3fe26de070fc0fc0bf5e38bed69c84
SHA2568bde1b2e4cbebcf872db2f197ddc8953726f03ea01bf86da5c28b0fd7b95720b
SHA51278283dbc317680d794bcd9c8325a351397c37ef813928eadfaeb8ddfb5ca21c8a8e656e99a97b740e526b7b851e8c8aa3bc78924209dcc3e8a2bedf257d24794
-
Filesize
8B
MD592dd9f90e5225696ec4235b464bb8be8
SHA117c95f1de60e223aa29d1b043f809a8eedc228aa
SHA2561136ac7ff9f0c2afeaba1981e79c502e01a1adf11836644f895d83207dca35d9
SHA512d3a85962f53c9e6cc84474aef2fa1d7eda8eb9c7ce56883b4e29ede4753180a76ab7a77dcc3292c20da7c9f628763e60fcd3cf8645cd73492d7e4395aa230f0b
-
Filesize
8B
MD547e57913821ec9be3a680a2473ad67fa
SHA1d0ffe52f8870bbb3f63df7c47af3193337520fe0
SHA256f2f802c9448e35530fb28d6a1822bb8f2989ef5642f02a4f0021f99f774ca478
SHA512df218304f894a31de6ab4550f764b2a2b4558cc9958eb114208f6ad7cb4bbe3ec0c2773da9b27e0eed5b60ee2ea512d58598c83838b4d5c5adad8bde91354038
-
Filesize
8B
MD56ef8af8dfad3b0f49f5d728d1e488ffb
SHA11b09e35afe751a8279f53272f6a927c68d037414
SHA256e54e40c25bb9933cc0d4a5a0dc23fcb9c80cac0edd846f5f87aa78461a1c0ce3
SHA5127347695c67f55c5b165b58dca53568492b5b51d6b6fd183515582f7658447afbb73cbeb270c6a6f8e4ed8efb233f1595e815c95775c3bdb2cc4e32e4b80273be
-
Filesize
8B
MD51fe43b37f26413fa6b52ecfe5540ddc9
SHA1bbe20c8e5f450112ef43ce27fd3d25409fe50408
SHA256dfbb8317e0faadf6fc4770a06b5d6b417ca95b1df3be038425e5c50c060ee582
SHA51278ab609a08e0d53311d26a5fbb9dd1b47dbd378968d498b0ca6ccd5641e61fa3b2917c2794e36eadbd6b0c894f33e5a62d27a79e97702a3e8b1f4059261dcb44
-
Filesize
8B
MD5bc54d6b568359785cae6368be1a0d29b
SHA17c9aa4653b5cea0953841f5def1ed3fc55967589
SHA2560db7a9eb8c437b83ff4d40ae9fb7dd8490bf3adfc0ecbb8993c7011f6a9ab789
SHA5125aa6b0b572d0c88eae1c2e67a3d26894fe5df25f8fb91048372a490637cf72d3c4cd32f9c956ba656addfd7fdbe91e301ef3451da5eb32f38aa778f635d88719
-
Filesize
8B
MD59ed52770cf5125c0f01de5c4b8fa3d74
SHA144c4bd4a06b4a5a6533b575d680d9240e9bb4ae8
SHA2563c75cf625a9ad9087fda18bc25a6a081c304889d0f42daccc223e4aef29a3cbf
SHA51252507ae5168e63ebc61a6b9fc2cce488f5366edf41f56e33d96880ee1f87e1f1310a9de59156dd1e9ae6a7943383cc96424368d20527849118c2773a60c74351
-
Filesize
8B
MD598fde43a1599ac65f71cf08f0909fba7
SHA19f452a034ea26a611364ea6d95826e4f2b38b34a
SHA256fb66e8727ccdc881ea635b287854f05e7295e4a269499bbb7a68f2900547e618
SHA512035995cc1fbf9bef7bcfe53818d54a2b2a4ca4b0ff92463605bcb6e363ab6c85c795c3c39583ffbd2fad45a2844afdd32d432a2c7c26350bd84c506ec17553a0
-
Filesize
8B
MD579d3575e3e8ab744bdb2e929e095aea2
SHA104b765e04526910093829d1cf91a0e937aaf4e25
SHA256598384787c43aec4fdbb72fc945553a8e039c9b643eae1c0234cb3dfe661116c
SHA51244ca540da2a3b90ff41580b34de62dfd259afc9568d7bd31d5faad02442c84bb2c956a58a18f16955a356d1e67c03753a6e75870c30f47bfffbacaeba2b623be
-
Filesize
8B
MD5e3b86cde560485adb9b00bcdd3d142e5
SHA1013307cc846df09c07aea93de4eb7209e966c35a
SHA2566e56b96c3dfa4847fb0e1b343bce975c02043b72f45ee6036bf5478e32149e7e
SHA5121e75f2e2adff944ed58ce349184295e5394c75d284c9a9040a3cd80248162c7ce098e5005ce72659c6c6b3d267223a898ffb42d402538d4d88b787e84234314e
-
Filesize
8B
MD5136994f7d450123409edd22d6791251d
SHA1c89e46173963a9557f5cf7288653eac3d4e6b771
SHA2565e31d525fd2888530fb877a778fb9e61afba66a3096a054ef8a35a989599d200
SHA5121fc8fb52fd19e38a6f9583bbbdefb92ab2a6fe962d41383cce1bea46f68e595137bcbe1c0aacb95c5992efdb2a221288c95f409f677575e064533a375b8ea5f3
-
Filesize
8B
MD57ba3fd9fb7430824ca65ea335d0b78f5
SHA1a46c9c8f55dd694c01414ed8ef57eb9f7053e3df
SHA2569d02d2fb1a5e1e78d7250b4260c4c20ec26b162c32fedc2f84a0f108b555319f
SHA51293cda74492d09baf534ad8691e3c03ed95b65277379c7a760e1a6938e21e4cb9f649d7c34b638195cc5ee9c16deb4498fb26143b81be9e70de4961fd76ce57f0
-
Filesize
8B
MD597d32236521748dbfaa0cf9867b5be59
SHA1370ae6f45d76c357ba90e61e818c391b3645e9f4
SHA2562661c29550002d3efa33f8bafc03bb5197915ee3aeb6b25a041b65371df0701f
SHA5128d42eb8c5aeab4b5f28d31161e4c7699bf9d83e7110b0508e22d41b2ae67c647e2f00cedcaa52c7dce868f1c1e80dd1f18f5be7843723c42c44670080752b0ba
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
1.1MB
MD534aa912defa18c2c129f1e09d75c1d7e
SHA19c3046324657505a30ecd9b1fdb46c05bde7d470
SHA2566df94b7fa33f1b87142adc39b3db0613fc520d9e7a5fd6a5301dd7f51f8d0386
SHA512d1ea9368f5d7166180612fd763c87afb647d088498887961f5e7fb0a10f4a808bd5928e8a3666d70ff794093c51ecca8816f75dd47652fd4eb23dce7f9aa1f98