Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 13:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe
-
Size
724KB
-
MD5
21dc5deeb0b1558460b07a38428fbce4
-
SHA1
f865e3e29c0bee5cfe6b52df42d7f0dc4ee8a686
-
SHA256
a955575ad3d6d1c8a1e01cad0286689757e208d801acc4c71d268cbd66c46a60
-
SHA512
c4576fb0ffaad273e91c18927d32dbc52cbf55b082385b122190fa249a155512e582879ddcaf81bf2d731d159e6e80f06adb208c6ad087512bcbe08fa40c5963
-
SSDEEP
12288:mv4i+8Eh0qmPtbt+grMmzM6tcrakrYlEni0OEzUjyfTEfrC1LZRel1:mgiIMU0hcr4QicAyferC1L+
Malware Config
Extracted
cybergate
v1.07.5
Cyber
bluthusten.no-ip.org:777
7833087416V730
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" iexplore.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{T1DED2BN-3OV0-P3XA-8F4N-38A66I4M7Q24} iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{T1DED2BN-3OV0-P3XA-8F4N-38A66I4M7Q24}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" iexplore.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{T1DED2BN-3OV0-P3XA-8F4N-38A66I4M7Q24} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{T1DED2BN-3OV0-P3XA-8F4N-38A66I4M7Q24}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation iexplore.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation iexplore.exe -
Executes dropped EXE 4 IoCs
pid Process 5080 iexplore.exe 4920 iexplore.exe 1188 server.exe 4888 server.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeUpdate Client 33045 = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\Gq4YdSdthLis5.exe" JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" iexplore.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexplore.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\install\server.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\install\server.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\install\ iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2140 set thread context of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 -
resource yara_rule behavioral2/memory/5080-20-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/5080-81-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/2004-86-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4920-156-0x0000000010560000-0x00000000105C5000-memory.dmp upx behavioral2/memory/2004-179-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral2/memory/4920-180-0x0000000010560000-0x00000000105C5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 5080 iexplore.exe 5080 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4920 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe Token: SeBackupPrivilege 2004 explorer.exe Token: SeRestorePrivilege 2004 explorer.exe Token: SeBackupPrivilege 4920 iexplore.exe Token: SeRestorePrivilege 4920 iexplore.exe Token: SeDebugPrivilege 4920 iexplore.exe Token: SeDebugPrivilege 4920 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5080 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 2140 wrote to memory of 5080 2140 JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe 85 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56 PID 5080 wrote to memory of 3508 5080 iexplore.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_21dc5deeb0b1558460b07a38428fbce4.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\fjpDBQ2A7kLZI\iexplore.exeC:\Users\Admin\AppData\Local\Temp\fjpDBQ2A7kLZI\iexplore.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\fjpDBQ2A7kLZI\iexplore.exe"C:\Users\Admin\AppData\Local\Temp\fjpDBQ2A7kLZI\iexplore.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4888
-
-
-
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD569380299df82eac98f58eea60a616a50
SHA1c5eca2fab35558899ad0271985fb77c6a1666965
SHA256468bb3cb4112ad5438bebd9f73708b823723957bb247d6b6e9fdd34b84543916
SHA512571aefe09770b73b3b68a513f2f84ffca4d51b37c1b6de74beaafe94aebbb03580f01cdf9122c03f151c7fb62310593e2a69bfecafa3cc6fb6f923db8048865a
-
Filesize
8B
MD570d64b94fde32d12252b20f31d79c069
SHA1c2c9cddefc424258d0c4438b20b87a521e209b20
SHA2564c940f52180751053c4b49a9670c63d2eff59bb3d9ff13eaa5a4d38acc693938
SHA512d5f96a21de5bd2f29caa7b69ce02721834cbca03d0a7bbd7d7f6b32814d9ec11fd4bab47a6ea8740a447d6fa32c1dad88365f900779a6ca525eb64b2bc96e27c
-
Filesize
8B
MD5b0ddfbd59ce74af0581a37f4bbcd5997
SHA1a9f3ca8fc6e7030cffe4773dcd49ca4203c8d910
SHA256b2157c1cab5a4c40b554826995750086015acf56488c7793967fda002b98717f
SHA5122ccf72c7e69f37872ddb5c425496384e9f35f7577ae0a5793b2a15131c0be4e6b8183ac84c1b6c53538fca745b04a178350afc64c17cf6fecefd6e5f49e36c62
-
Filesize
8B
MD54ea76690e232544f14fde0dea0eb5ab5
SHA1560e0140fb0bab33a43748f88d9a08e203d86241
SHA256cfeaeaaf34c5980f7b20acd257a53015e9af63d94023de3a4a73b0deb9875a42
SHA512768f5a833cd2e9ae1ebd211032dfcc48ce1e84377c6abb8e41ad9bd266f6f6198c5bb288f51dcce56d0d4db0157ca6d417744808d71f9ba012a8b75ddfe0a07f
-
Filesize
8B
MD5a184c7f5156fa546bc780af56746fa43
SHA15c2e05eaf8a7740f61f1d7ec63c59a0af421b0c8
SHA2563c51f4d034ffc40a8677282b33699ba79d65a25b1466501b478b31dcbd08246d
SHA512fbe2337a69a9a0ad437550b8c99b7b76c27f4cef5f19a6ca11d6411e67d8fc16f420a972c46dfd957d610b8c42bd733400d79fc684fef6b2e99012fd26326b1f
-
Filesize
8B
MD5db86742de430fdb70b58796c48407874
SHA16a1b722e411628a0fc4e51600e1f9c1dc0eb5c46
SHA256c5fe341d36294155d099ef88e8bbc0bcb37a919fe9ada3f5687e1e30b4db3e1a
SHA5126486eba047d8373016c97173d6e919b4a9db063e82570a182937208402bba31c350546e4f82903bceba7817cb167a1f10d7175596374371a8e06242a5c95d2bd
-
Filesize
8B
MD5b6a78b7e4a6a637121c7b5f0751660c6
SHA1613ec21a45fb978ab98dca7435a9c8c2fc831760
SHA2565b89bf616942984c207a3176ce58ad05900a4aa396d7a4741749b152c1ae1d71
SHA51231b55a1fb5a0c2352258d70d0491cb3b6d205e636ad2376a04d0efaa90e15aa9dec381bd81ac81b1648fac32fb9dea8db5aa0b9b5cf5577c28796e2e8b3e6b4f
-
Filesize
8B
MD52fa5dcf8a4fe9141891a22969cc3dc80
SHA1fedefbb6f35f1c1d6f913b4a219d62d283a53d3d
SHA2566b3750342509eb03ea52f36745f9f3c7a65505b34c5dcbd44cc6134d08e6cc82
SHA512af6f849912feced3cb6cb76c309e1ee3465b107591565dda8b5a5bebf246adeac41047e1e8bdeea22684c0b5f527f2466311003d11931714567f0c684850df36
-
Filesize
8B
MD5279dec8c136292a7cc9cdb6cec4fdc67
SHA124a2df412cece8c2d5cf1f153581559f28c4e071
SHA2567e4802c05ad8d6266f9088cd455b7631c479b8b987da45f7301b861a1adb97f8
SHA512cefbfd948e0867fd521aa90face44a5e75e32b146a09c7e918a514ba9476440c4cd5a0fe640a645a8d8b433de3bc52276f1493181130677059b275854b559b4f
-
Filesize
8B
MD54c818776ac83a3f9cf83ef18a5eb2d58
SHA103c6eb5178e549ebd04fc45e314d6e38b33f384e
SHA256b0e9d8f03845a51ec505549ed3c56ef7897d37b98242d06ca982c4797ac4705a
SHA512da9777fb599fdbe7962c655d280379ca92fe3f70b34f5d290b93429d4c059aa84f921dcef2c68147a592a851390cc6a369ea9569ad58dff00d94e68471d2491a
-
Filesize
8B
MD52fd2067234278e27be513ff2212cbfa4
SHA12bbece811e72b571c93f2f1fd7ec66d963da4391
SHA256bcaea05c3aa257a977c48f6f59063b2651ed2d64ccd3f62c919bb3213b1066f9
SHA512157ff10c1b3786fb0a097f3bfcb433f1cd80d0543d2d04a90fe6c01f4fccf90c3f5e541dd79d8284183433c622b5bf93b5cd5ec7d7eece8475e8a4f972932bca
-
Filesize
8B
MD5274ce2a54abc577366e2a0e5e2812ec8
SHA17b421b42bbcf23e5cd6039fe7bd13a149a54e6ac
SHA2561ed41acd78078f036d44a39b1511d06ff610f2d11f55a0581fa85fc37be33211
SHA51270d0c18ba450f47f8927c974b640f72ee0caea44fb6f72d8194bcccab4ceca6492c551213968f197d2bcf993a39f32e4e2adef8d9828e6d66c205075364a62e3
-
Filesize
8B
MD5cbe409583c808e29a6b09ae0843357d6
SHA1844d8517d1f4c833da7c1d995938f19a52598d9b
SHA2561eecf9d7fccfdf0bc1b1c4f6d21d841b6575571336978516835078458c452e34
SHA5120387a308011a5fae61e59c344e2c6c6a1351d4606a18c5c73d6d5c8abe362ecd339f97f6f868e7c8852cade74b8c587db0caad730e3b7e5df9cd2e451dab31d3
-
Filesize
8B
MD5c512d676c307e3e5518253176a66ec1b
SHA16128c519967089fd12ec50899f6a530874d575c2
SHA25692bb6e52ad118691a304e0845694c4c5a8a194197b5bd79421eccdb641ff2c21
SHA5122502d8ae78c0f18c845896180023e57f713a977da6902d59d88996a58d020cb579245830995186025d09f17a6dba34b7fbfd360c11120ac06a2958b1b435ddcf
-
Filesize
8B
MD56568dda32621ed45cad1d646623876e0
SHA10c8e34fb34c99f46dca292b5f21b061b464b4a5d
SHA2567c73d54ec85091de789a47be1e6323a8551aa6e32f6d547d68dcbdf009bfee1c
SHA512835101d42b57baeb681551ae46b4198a4f44df14c4ee87643684e6f7cfff8a94c0f4015cf4d8b267eb1c5a94e395abe4d7d9b2299ee80bd1a3cafb9448a08f71
-
Filesize
8B
MD58f4045d07381d37f2958a677e98a291b
SHA1cd07de19e40a717c006fcd16eb4ecfa3ee54eda0
SHA256d47f5e303b4273e77cddbb99f8697b94d7811d84c5da81aa65aee27ac62db2e5
SHA512bc16d62272b5d02607f6f259bd6dd5fb25fa6e75ba62a07c97b449558f254528375b6bf9a21c2a1cd9459deb2a2deb54010055640d7f501cfe26d5b626d8c86d
-
Filesize
8B
MD5057c98a3c682e0080fffe7683b4fd6a6
SHA1dfde9190545fa1ba75c3104e5d0cd4d9d9c85fb1
SHA25672faf41c4b62dda67419361d3d32fd849b3c7a4af212cbd402973a3c910d9d83
SHA51259d4b7eaed070fedb3d7b72a49fde42efc679427f0d8656b8308ce96928b7e3af125d10e76b8c8d072970a1b2c9ec5e96073089870b35ec6eb01e08bdba606c3
-
Filesize
8B
MD5fb7ebd5faae8addf33d7f496e2dced9e
SHA1c747d6ddeb4776fb315220dfc1c64f07d673513d
SHA256d9ee0c11fb38f2e207cd8686d755b01ebb3f52283a0b1d07f6079b4b8660b76d
SHA512fbf64efb0ca36cad96b82ea70e6e64d154620a75439cd5f357e30b63912d4785bc8f574da234729a6deeff86ec1ae52b0c995d0dcab31eb7a09b669b47300ba5
-
Filesize
8B
MD54999f7e7ce0b9e9d10aae9057b3316b3
SHA150d5ad235a44f13a3041144aef6826147d846c12
SHA256c0b9972282372b6fac89f048dd7507d946cedd9b74a781a7acf3ebb16905d473
SHA512e634469411a9f355e5a490ad6feb477d1afde6c056a952dbd84ccf71220efd285856b8015172adffa960423580482bc8930118c18f3c372a546c9c08263edc2f
-
Filesize
8B
MD5481fefbd534d0c5dc9da4ece8cd4780d
SHA10792abc00a9abe23a3213f8825eceb1ac515b87b
SHA256d40aaa0baa768367a445dcef76f58ef5a9860fe8b5906b9657733a947b8ce306
SHA512bba535337ebcfbfe08a6f6cc18068655a920c3dd94daafa24165fb55ac1c4b79833067c77e81ba9e569cb725947877946fdca547506d3787f7a9e70d7caca747
-
Filesize
8B
MD5a4d17e1e854a49ca420e1cdf54ca99b4
SHA11844455f9d99c27f2c0bcfd818a89e71d1872190
SHA2560c570970bdf97db25ac94efd7ba21278ea1fc6529bcff8169f25c5fc84acebb6
SHA512986929b882fa92577d36961ed659142067412a8bc20966e42b3587f903cb0e6da6ec6a84a43f0aa1a74f7abf1c45387efd0bb823523c3fbacd332c9b5b92f3d0
-
Filesize
8B
MD545a56468fbf97753fcbf33fc30dfbab0
SHA150e9cb15b004387c09d29033d81119774c75bf5c
SHA256a65c738150edd6a382fc32bea08e80b98ee0aedc75cbffb43306118acdd6fa6e
SHA5126b3062fc08d7ab335809dbda241fa3e46a48db83b25f761c4d30ed44147ffd570b2e22a822287ba9188bf095e5303e3adfc92e0eb1427726854edf44e5d7f91b
-
Filesize
8B
MD541f95cdaece531dcb7629cf529cb5942
SHA1fcb1f42ff4e9e3cc9701bca9fc744e668db9ec44
SHA2569926a96ad6cd416f27a51b656fe26efff2742dca12fcbe6b4bdb522872929298
SHA512464f6107f09aea0cfea46eda6449351fbc92e45205e4c69dc7eaf4043521af955601676963f255a8a26b6a60e8b11fba530c673a9976688cef8229b629a9424f
-
Filesize
8B
MD588490934aad068ff2d2b6ce9af5f9ef2
SHA177b01af6c49b9cec94ebf51a301abf3211e956ee
SHA2566a94dd7a2e3b0998770e55d4185201518dbd2f89bfdff061fc0e667037551a58
SHA5121bfc0a47dea3c2e4a04a7cddbcf87fdb46300386b195f9377c1d1e397501e4009afac188fd2e62f51934f73226feef060f0905117fbdb6f30d36ac39eb4d935f
-
Filesize
8B
MD550a401e10088d65b86e0edbd4601aaf2
SHA1108a0607135c80e021aec9052be6adf59095bcb6
SHA256ab8adf440562db0d6659c08d2c9ea64795ee81e0dfa51efbb54c2a27e6c9d46f
SHA51209194c09f0dc4b072665f41b26b51ad89dbcca13b555b0952c81904927a993f7b46ea2eae4dd912b1f1c3839352a35380919afde0ffe756456f138f73a53e5bc
-
Filesize
8B
MD51e912a3b4f2f551b25b7dfd013ca29e1
SHA1a1e876516ddcff5252ab54f8293039e7eea08b96
SHA2563a80b09a8e1b611d953f9d756e99b62ad5ff84fb96d2d93cdcaa5b33a14d8d69
SHA5120c14c715095c322b43b0d2e4497d546aa36d87a57381d669542ef500d5cdec71646369805bd4ec54a3fb1a19b99c9337ab07f14d3d0fcbb16c537b0ec3228585
-
Filesize
8B
MD59c38a88f32f9bc690848949c67a58af5
SHA1281d942b0e4e4b54fecf9d949716f35b092bbe86
SHA256f32b3776077eb053b49be33f56c4b83298cbe0d8a0dceee1719dde15761fc5c4
SHA51262016b44ce8ec4ee5554d28f5af9669f6d99b4559a838c598ed539fe810f874636aa4debe4827dc9be481b48a7d2f80656c4a7dd5ac724cdd2443ec1a29dea4d
-
Filesize
8B
MD5bf49d88cbbab752fe5c83d6d481bbc62
SHA1c0c53b94766063a637cfcba8a1455d8a0f2b205c
SHA25626462c6b5ad1e5842848198d47aabbb18fcce4f5b9d0cc3e38c080dcaaa930dc
SHA5122f60124fb144d689b2a79e1b0624537757369515c8d3d233d86764131cbb8a00d103c96026b26908f85ec3e3f1d86895122cead7255ccacba8480d34490b2926
-
Filesize
8B
MD5120b81c12f76a058bf0c7a9ea86034c7
SHA173aa892a6f6342c0ecc0dd08e4023bf8aabbbd5d
SHA2566e197c329c2928622bce7ea205539865daf23baf9bb3ed12d27e1e73e82227c5
SHA51298a20a8f27b5a6fd8d214f659e24f32470f10ac931125045533cfa615ef9eece084a9b48407b37dab2855226901cac9c1ab0e92fa34fa6af4cc27382fd2c915d
-
Filesize
8B
MD586716e24aec4e7b19159b0c1922398c2
SHA1ae7fdedeeaa6ae60e517839913a20fead475c17b
SHA2563536d601727b27b9d013a6099b5c2ac9c0758ad68dbc56745c77b056fdaa1dbd
SHA512007bdcf41e2d8946650e247900d1fbcd7789653b386003076c32877fa92df7f8555cc4acd669cf627c61c83be9b5755264ba742b3180aafb4fe6141f741e5f7c
-
Filesize
8B
MD571acaeb6e4c92d892103589f4cbb68db
SHA10422098e1ec0126d9a8e26d12b205bb99bd91d96
SHA2569dc139c8ef88c508eb86c1af3cce797df2b7ab19fd0aa7db23148f8d6714b12d
SHA512efb4f2c83cb3a511d44788e895c9dd8960630fea6e150f27fb7947f3e393657d72c6ebdbd9e8adec40ab6da09fe1aad8e939d49c49f083a0bdf86b230855a530
-
Filesize
8B
MD562cb03d264a5717ffdbceee8fd42bc47
SHA1a187248d67bbf858128256f11faf9bdb3e31d73d
SHA2563cf33ce0b8009216b28917583ef057a2afdc1caec6f94b7d3a855c251ab6ceb4
SHA5125e271d82df9f0094447529efe850374898186e1eb5d2b00e5dfc7299a23223e8fa451b66311ebbacfa8cae465c37933fc001bce4c3f9238b3b2087d7bfb19d15
-
Filesize
8B
MD5be81c8e1b0660074d21fde4620c67533
SHA1663441e9df84734e91d0050a1b5b18af60118e6b
SHA256ab8b429ca0ce40d8ffb20dbe1c0c5c12ce8e1cbca05f8fe14cee9bed71c4eae5
SHA51203d297b53c6c5e214e92394f2ace3cf101af8080d93c35f2bcf9f9f13c1b1dde147be573cd6a3d0a8e1cd094ffa562710421617c483adaef8358885fe1bd00cb
-
Filesize
8B
MD5c6756c485f50fee3394eed0e25f89dd9
SHA13ae157c9a4540ee55c29889196d9266091ac21ff
SHA25631cf47e9c9c161d9f37434e62153d718450500173440ab603e928190164c994c
SHA512a5561001482bea78ead8091539e65d7a9c48f9f923ece5ab5fb7a6cb69ce86b8b58e952cee7aa7fa5f1b34d733957cc370f6a383f57dc16732161f99c878e2e9
-
Filesize
8B
MD56c498c8fafd614ab91ade88e4a0435c6
SHA15cbc4631624144c45c357973fdd5b23039b0fd3f
SHA2569bc1549257f7bcc9bba24ae6adaa440314c775f41b34ffc8e04ce69000e7193f
SHA512e70f4b5b5791f8deae98bf56e6605cdbc7e52fb3a6c5cf41c0396b2037f1383d0b68c4dc3f910710e0282dab959027d93d4e2debb3c9b82dd9557244178f1120
-
Filesize
8B
MD5848086d2bf9cf21eb2bd3c88332f734e
SHA1f910ddda3da7c187c5fcdb20099fd9ec10e08e10
SHA256769190e634ea5375698d699c93bdf45948ae158f0b55ed9215920ee2f507f02e
SHA5127b2405d5d088cf2d52788a130a50899a69cb9f32db16c2a300d56e3f2d93bf42c93414df96a4419cbac28149d78e618414ad377af57f4a374798cdaf4f55bcb9
-
Filesize
8B
MD5173092807aefca9d565cba7703455c7a
SHA14987c63918c31b7d27a320699a69979cab70dc07
SHA25691e1a21530d2b6f8772834585b6e5066d00d6b9d72ae7cdaf319ccf8ec30dd23
SHA5122ab1f10557dc1eb6923150d2104e129903a63bcc86823c771d2b6c40a2d357bd6f004c0094575ddc591c49ecf8bf16b3c226683fec81f8c939832669ac3fc424
-
Filesize
1.3MB
MD5532b41463ca3a1d79c89f983c293d2f8
SHA1ac28d9984216c31a8f5f901e59debb01bdd993e7
SHA256dd142763ae90362a7505e219f854ccd8073f06af202ef607e6f686c62123a728
SHA512f858e070de9add91db56eca17d3e7373abf0842c6a60e5a107bbdf6d19d1fe0b7fed90a09ef04737f0e57adb48806d82313b0a4329d87c95585b66a894ad899c
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314