Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 20:58
Behavioral task
behavioral1
Sample
JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe
-
Size
296KB
-
MD5
255c2cc1308ee29c26ca2cf109c57cb3
-
SHA1
2c154d29812d1acbdf7eec831169be40aeebaaf0
-
SHA256
db7f845d3ad1bf7699942137e7687f937e74503d05201817aea24f6cbd5ed97e
-
SHA512
3967a6a8f48ce4f39329368c2536ce02cb1f5882817b7a335db3966891260a6555dc340351ec1a59db750ba0bddc66808d653cd1e1398ff5249b6bf28d433dea
-
SSDEEP
6144:/OpslFlqohdBCkWYxuukP1pjSKSNVkq/MVJb9:/wslfTBd47GLRMTb9
Malware Config
Extracted
cybergate
v1.07.5
cyber
johntravolta.No-ip.biz:100
GUM035S5416202
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6VL18I0-VBQS-R31R-V218-K7A7UAM83JIW}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6VL18I0-VBQS-R31R-V218-K7A7UAM83JIW} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6VL18I0-VBQS-R31R-V218-K7A7UAM83JIW}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{A6VL18I0-VBQS-R31R-V218-K7A7UAM83JIW} JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 server.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 1988 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
resource yara_rule behavioral1/memory/316-532-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/316-885-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1988 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 316 explorer.exe Token: SeRestorePrivilege 316 explorer.exe Token: SeBackupPrivilege 1988 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Token: SeRestorePrivilege 1988 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Token: SeDebugPrivilege 1988 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe Token: SeDebugPrivilege 1988 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21 PID 2252 wrote to memory of 1204 2252 JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_255c2cc1308ee29c26ca2cf109c57cb3.exe"3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"4⤵
- Executes dropped EXE
PID:1668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5b815ebc926c3f0b07b7b4fb8d1ef02cc
SHA15e76dfe2703259ba888641fa9a5f843e9e4a3ed4
SHA256041c1930ed4f8a6a5d740feaa6950cd145497afee1f55439015850b4deef034d
SHA512930a46140a07c543e964ae9756d3d68c78ecf374052291cf9e00f1429bb02cda8f458f6c4bff99a9092f58a5efab178f397e9ffcdd839c31feba4f2e7d4f6c9f
-
Filesize
8B
MD5056a45ca61c51630b9a95679f87202a0
SHA161de0a607e5565230b41b85782353bda8fc5fa21
SHA25683f2b11eb3f888da03f7d3d34ab708d13875e5c1246abc3e49c5343ef174df66
SHA5124305b589bb2e84b84429282f2b2ece950fc1c629f6e9892365dfc50f5de0a641ab1c40238ef20c142f176d1866bb60f54c6d918179a11242303d5b27f8db2ccc
-
Filesize
8B
MD5726ae16458ed1d6d1521d070eae0dfb5
SHA17050d99d89cb0de21d62e7255916a5da7f166764
SHA256dbc550e5300bc71a664c2461d7475e12234144253ee103ed05f45b413ddf20e6
SHA512e718c852fefa72d974b5b9606390e5f9d713ebd100e0a5d581790f2601ddbc19d8841c93e395009884e4e6e21ec96b4cb6044e17d26f8ac00b6e2d8f2a78e039
-
Filesize
8B
MD526c46644beba4c8ea3511b33e60df471
SHA1910cce0adc1578780f26fd73b3f4d055ecd02fa4
SHA256b93b597971dd6b137deeaeb7d6fe6451da6ebc9a9d59a8c6b00f1b28ecb29c7a
SHA512ec06a36975d8c20a804d07b093ba792b5bb9afe0f14eff81d7c447d4cc819ffcb3082927313fd4c562945259508f01d500ee591d26ae5cd5a80808dc2113ba5f
-
Filesize
8B
MD5ea8ac5960ae15aea8ed9cb2721561e5d
SHA16cb32ce460d98f342b883f9a4cbeee56f5fb877b
SHA2562906ec83919e6e81bd74f3cc5acb7fa0b4931a83420c7effa98295effc2ca285
SHA512190a78efa2266fcb318e3cd75fe14580bb20f1899d7caef8f65710b18556d71f2a0912118070bd26dda64fa7ee5af1947dc02b280e49dd7b9a962b16709bf4cf
-
Filesize
8B
MD5d05876dc96638a4ae4b8bda66f57b7b5
SHA14e8d78ee1e4e298ee5c762c168bcc4333a258750
SHA2562d6f3e3b096d5f99d4061a4a61dd63b8b150095a5610fdaf0b395e48d0189024
SHA512ba5a9b20585d3814fb082ea9e702253fec30cd1d920809a7c626809a3150eb5aa588520c6528e1b70a942f7c70c02e73f7402890bac6e017f5bdc8825fc666a2
-
Filesize
8B
MD5088c67f0a227fc846fe399c818c573de
SHA14f1e2fdd92994b19611fc66b14a87ae5d0cac45f
SHA256ae05d33114bbbcff3155f79e9ead63c3b4445526a97ba0d2c7abfb7a072d7014
SHA512f2cf51319180e2a8f8be3cec26fe2e892fbf5d59d37c1f41ae827d44a6c41ffd1e396ad396c0d6b6f110d360e884c01d2dd26e4f68cddadf6a6ddda5517ee60f
-
Filesize
8B
MD5558814b79c57dba4b4259e6ebe8916ca
SHA1eec0c15bc4a17cf8db00454dfb273704ea74dd00
SHA256eca9db30bbb60d22f68ceead20a3cf047896664dc56c7d4df465c98c4e65c7a8
SHA512b397e89e47721f915f23f81d7e5d172b868974a730bb7db54529922f89c68672a41e89f7c4b02787cdc8d8087c311eb176bc930725994fe9844486df1fb455f3
-
Filesize
8B
MD55dfd35dd550f9c50bbfc51435dff053e
SHA1b015c31630df3ee5e461d1da13077a90cf6fb777
SHA256f23709ee3244b0906fa722d78ed42c79f14bbfea46dac746d6ff0f6c191faa70
SHA512d364e211e086ea4f588abfafe0534777f3a537c45bdafdbf84970efbd54ce4f411c084125146a85fadeb9851affdcbc471be4d1cb299ee17821d03406bbd0337
-
Filesize
8B
MD59e76c4d2c44d950f6c4ed7da7017b755
SHA110ea428906606796046cc17a60ab57f24cfcc95c
SHA256dabaadda3679786766e6740f43dc137dd9d1d77b1e1969d6274c099949055b64
SHA512f28a554c84772d4f0f1b24183f4277d0b509e93908edf75ba298da329ceeddcb2b2050d87ea316c32abf0e0830c00b8a7d3eab2b8ec677688105f8d37c98d748
-
Filesize
8B
MD5655f7bd6379719c58711d9a6182de54a
SHA1f5d24ee22396b102658541b507943f87ee9fd27f
SHA256308e6a91e44ea73e01c9f93e5a293140ec1e63daef84f182a38ff415d434b96b
SHA5123282253a5ea07deebc16959f569e53230c72129d8e219283386503c031ce2e296bee14a2fdeff730b2dd703f0a45567bdbce934691975aa6c58641234f13798f
-
Filesize
8B
MD560c953ebe6935d71cbd716d95f0c8597
SHA1f610e711989be1da0d9b2d6529fe03dcceac1b83
SHA256e7c01cda7bcba148e35205d426d4ad5384529b2b3c3a21ccaca7b8ae1ddf29f1
SHA512721f28c3d092ca4d2a266624c914d804c45b530cd770a8456b8b7afffaf76fbd7efd10abd2c34f90ea9ba708834a48d9c511d3b2a439290f2578d7ecda51c1c0
-
Filesize
8B
MD5920f93aac36ba3458ec5327b59b9f400
SHA16560e26cb97bc960cdff9e581f852921a4db2813
SHA256f9431886086ce6711f8e15e2845b1238a0610cf457f5c78e1cf7ff9b9244d5cc
SHA512bf2e4f40f9729953f80a6878b9185f3a19759949784b61ff294c4075064685b98098d043af53cfb938a66c848d0cfa1c6bfa5e08c4c47226e57a69d4bc4e5892
-
Filesize
8B
MD5e501dec72fb528ad2df75f67f1c3044d
SHA1cdc425523b8075a19fa04f9655b4c448211a4aad
SHA256c55fde36589c36c17cef0d77bfc2e523eb8258cbbdbff433dfe1780c414573d2
SHA512d4b8a71828dc79f26967c13e257c7b0c675f4250daf4ede998a65df19d531b160d6bf8910b6e45b7fe4d1dd7d781064cba12306dfaaf7c715c20e2a46f69f008
-
Filesize
8B
MD52a2594945426d56519ae5fef62493e25
SHA13eee1b020f399f1c40746dca9c2b0577e31bac51
SHA256da070e8c06236e002a51ddeb8c26af5bc744d953d522a3283dca3479c492be5d
SHA512ac5bde83bfe437fe9b36dc3d2044451cee66e4b385287e1dd8b08545905bf4decc3cdea8b6b46245aede73628d1741c1d25f369f6f4dbf6227d16eb287e1c583
-
Filesize
8B
MD5a918adf736843f677c58c424d153ed1b
SHA1919287242c9030637d8d880ba36633246043f0a1
SHA2565b569e9ef26ce5c61167937f73bb5af5f4b89aae11579667ee6d04c9d2fea7a8
SHA512210716ca659fc7269b24cc259a3071d378affbc7ff922f5d8b19c167a275bd0e0b37806504ec4ba04a01a655ef12295dae22e362de1f00db280821558aa4710d
-
Filesize
8B
MD57d28d51d1c426cde30134ccc14dae28a
SHA15c9442902d6e3389a1de2a83ec46cc4b03758252
SHA256c344cf6359e409c26024903fe089d301b347da9a63aa8db4c4fd3aacbcb0bd11
SHA51219cd8d7890001b2a45f48e2773c2fd686bd7701fb112748e960988eef2585c37a2f280b45e4ba4d5f374b4e80d3f98e27344dc4d27a198bcf48f8aed97abcd49
-
Filesize
8B
MD5705eba24323e4dc637600370dba718c3
SHA11d8b8a1fa36eb611a68b622cef46b7ef08af3a53
SHA256040814412eac1271770bb1e77d31af0d888e5af6d518ad33feba5d62fd7ecb47
SHA512cdd24e093815655a55b512effd26dcd61acb5eef10285d8383359d8dfd3e22ae38b3667f84a485bbc2467c4bf9a2d6c2a92b1ddd10b66df2305e8e89fc74f284
-
Filesize
8B
MD5af68facc74a3ee8248f50591657715c0
SHA17b08e811e1d11240ef20821cebe28ff588740c63
SHA2567b59e463ea7189d626e7dadd7ccad26a8effc7c46012a59ae6f6f47dc3926f9a
SHA51201ac64896490720db8036b2aa880d679f0ab3152cac72db85f2b77a9e35c0620b7050288d52d185eee29660f4fbb63e51d08c5a34dafe119f27678bf940a6c5a
-
Filesize
8B
MD5957ffc7f6b4abe0f3a370d9335fd7666
SHA17dc51918c676baf5c68f8bc4f1f22101b0ae9f1f
SHA25608c95b1d2a648385763b1dc9c9a0d70cceb4d32769b6a58e579cf266d628fac9
SHA512b4f6561aa01b3ffd7f91852ffa4f0646b334105a8487dcb8fed5d8e1569ba8b2cc977de2ae42d27531a2b0c11fa2366291e28c8e2020841314937cabbe11f1da
-
Filesize
8B
MD550b35e5c4dc77da39bae6fb139506cd8
SHA16ad201848ca575347918bed8a4d6ba47c6a6efdd
SHA2564199a63c8255d7cda9293bbae1946c64835c303f5c9e2f1e4adc801b9c356f17
SHA51248a885a284837109d6e9e7eb8a735fc67af0c4959d8351501ce9861bd935e6c95a82de01696f74ec4afecc3cbc7b80eded85caf63a3b5e7e12434fb066f9ffcc
-
Filesize
8B
MD5fc2997802e803daa227e5855fdeafab5
SHA1598fc59e4ef7537ef13a03255144ca459ec71ab2
SHA256305bbeae6279c555eb1bbdf02960861fbb6f02d09e8e5d4911420ee3663b6ad4
SHA5128eed719b21bead9be7b0c91bdb2d07ec82905239fcb119588a11b7673e123d9fac58c383cb385b943d4f10c57f1228bdf6946d5cbf8724621e4cf77c21656c11
-
Filesize
8B
MD5d5f621619be59f1effbcdf9b2b8b758d
SHA176502f62fe36299a44038198262cf6f10c0cf83e
SHA256e0dae933d5c81a80dfcc2e3dff6d58e6287551470ff40647edca752986a67134
SHA51207093736b4fb290865ca3e0de54c9383d69196aea12ab2a726fd2a1e984e4b137ae1910801cd6877e85f9a1adc6b778351008f749da4065291f7aeb29cdf8d6b
-
Filesize
8B
MD56832af201847254c0ca136c9cf4fd5af
SHA17cf81265bd048da05d58bd21f1f9f1b5ff453acd
SHA2567bffa48182b9a1051ef2497d372591557dbf05428420600f189033e113b1efc0
SHA5125f2e02619580df9f1854fb35a1707efd4741a01e9434e6df7d437504790424bac86ceac4225ce64827f29cb988a46d29326c16803b976161e56b0da05524c93a
-
Filesize
8B
MD5b8b4dacebeb406fa13bf3702f80cf959
SHA154cc4029427588b46a7910d03bade4c65df39cf0
SHA256638cd540465725c33582f1b36967881fd54ae5fe73df9961d6f336f16fdbf770
SHA512bd86810c814e32e8a650708a8c1b7da725ab6ae2e7d756e81864c981221a89f112a7969e0df47dc47cb7de69309cedc8d5e67582157ecc8bb1864939eeb9e4ee
-
Filesize
8B
MD562b91cbb9c127670f28585478ae1d58b
SHA16ca8c0eb9366cd55f51285c12c9f1201631fdb5d
SHA25618179323c2aae4fc4c51534395a45a600f3d97f6c59a19e98467a8fe88401f9c
SHA512101c5a3e2a49e2e1790973fb21c75a4d550142021bfa045be0fe177ec2a14000e60a001161172a8dd955fc51757de57750d03974f23b30d7d8c42655e6b937f6
-
Filesize
8B
MD501a71dc9883d2b64ee75b0c988b074f1
SHA173c55943c6091ca3a577506e440b6c86540d6285
SHA256fdb7d31b8961153b3c522c0cd3d8648637db85f5f67f8ad2a5a6a278b30be08b
SHA512bd5bb4cf7b97998bb295ad17314c0bdf9fefededef835a7fc08dde45e1a46ee8f5ec6dfa9ab1c331e86feb920de3b0cfae7a035d31513a20a9c2126d82ff71fc
-
Filesize
8B
MD50272c807569a71f5ebc6b7b1c45099a3
SHA145379dff41e637a83090d1ae8ca24d70e2499e31
SHA2567cee5c5d0c4e1499d9f8a97347cffa916637fef6a9ea288359cdd7b07ea1b1ed
SHA512e73d60bf3d2e52d758490c2dd3f0b95a55479fb2dfca83fb730cf178cc73ad7b0eed6bd383309dcf596aa77721e5754d54218541e8ac7de8119810d666299c06
-
Filesize
8B
MD5d9b1fa30efde78a501621f10142386c9
SHA184f8ffbb0003b6cfb242708ed1bf7bee791dfce5
SHA2560e39b9f0a8fa10fa30eba25f72ddae67d8177f4bb9b03f15648d242a9be4ac4c
SHA5129f89b74ffee3e93285c19cc54bccc50a413eeac379980ca36a1f83793bcb65fcc294f43dff593bf7b29d0d82ef954612dc9c317b8f7762329fe082bd7e602b41
-
Filesize
8B
MD568136560e0219c8f927a73c9153b0aa3
SHA12ec5762b0b99c56a83947a32b998c3e906ffb8ad
SHA2563265fbf4a4b5ea44ff08eeb987be65ec2be52793f43ca66382a1408e0c00f386
SHA51212b72d8d8b21fbec983e130b637a47663376bc675106e95b20b6eb7f8158f48eec6cbcc14ca745a4e35dbccf0b28e7df1a3e44bbbffce98c4062be929dcedc66
-
Filesize
8B
MD56a9754aabc1fd2aac555c7f14a570486
SHA1e832130ea57b72658fcb19e97da7ce728e6cc4a9
SHA25622e18d008c73bfa985c2875ca4ad08452db4a436ca729fdf9abb436db967e2d9
SHA51287499a6c31edd3ef506390c2dcf0ddd7769d3fe0a9c4c62362c3368c1f49799c150d23737524de7b07662c1e4f1477fb78e0ead3e6d9f5709d16777e1b5e3a4c
-
Filesize
8B
MD5f1f492ad526f687f3a9f9b74a3289aab
SHA185269c97848b4541b53494565d5369b580ef6f65
SHA2565c8af7477c21a51b4acca862dcc36cd78f0fd384c513b4dcb8675cd6d71e32d3
SHA512106927bc7f60ac2ce7f7844b640c198d791f92cf4e87115d051fda255b2c32b24d6ce890fa74826c378e62cbe30b61c23934cd65011ac4da115be2efcf678f0e
-
Filesize
8B
MD5d1e04b10bc7331fe2fda1494fa937b4a
SHA142871972d9ed28702a30873d8cb2787d9b0320d1
SHA25671b62f1bdf97474b4cccb9a0c8d0b1ed3de528bda84edc2bf5deda913b686e87
SHA512267b632b0e4483227dbd70c077b0267f398c7e72376bb817a84e8b6a0b2d955ef5596256267e403ffa2f1a2ab93927f258f897ac85992173e17e98ad29d662fc
-
Filesize
8B
MD5464c3b675d61932259a878403e7ab024
SHA10376b1eb2425d4c1d8f9ba761ac9c30e6fec75ba
SHA2560174a831136ab864aff260c5ea23bcd1e01480736badf31ff785f4095f436a47
SHA5125f61594d59408b957254a2e4c31bfe5a15ecf9861b512edff9b014509866d6a1f23913ee7bead62f4a57136e73135ae5f278a647dc439a405c1136b0dd9a363d
-
Filesize
8B
MD5a96a3e990f53aa2e46dbfbea526f553b
SHA10678a05681ab07059826e754c4cd8f21519cc995
SHA256047972dfa3fb3d6137dcff077b99a17fcac5238a4d06aa6410ea3fc754436726
SHA512c98de80c70ae62631e67a0783dbd7121011eca44e2a9382dbee35bb089a8f92583f674c30f97a060ce9dc77aee3adddcd9cf6dfb1c45cca5a91803038bb71d81
-
Filesize
8B
MD579738d01e737115f4fb5f66724b86c7b
SHA165d2c8188c6680cbcd4e826d30ab11867ff94043
SHA256cab27fbd01f832ed96e7b7a53006ffc610315889af44ec8ef355c0f97ec9311b
SHA512a82dd03ba9c921bef60d5a3d2f875332b8d3ad2729837adfe1adf600c4db96a67e3dd67e1f3237c1e5fa1123d0f00ae37ff87cd67b7762c78be863798ac64c21
-
Filesize
8B
MD5109658f7e67905ffbd80a4d86f1cf607
SHA1252e5c3b991121fcdb3a6c4bcc805a18139ff7c5
SHA2567200f1db01482bd6db1f9d509fefd77dc3e56a987f572218946557ff53392846
SHA5128134666160bde1a234048f9e030b7108d8a0a3c7a95f1651f3cafc0d81e9d7639c048529b86ef281f80769407a9f90121b1a6655db8cfc18d8dfbc38113c87bc
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
296KB
MD5255c2cc1308ee29c26ca2cf109c57cb3
SHA12c154d29812d1acbdf7eec831169be40aeebaaf0
SHA256db7f845d3ad1bf7699942137e7687f937e74503d05201817aea24f6cbd5ed97e
SHA5123967a6a8f48ce4f39329368c2536ce02cb1f5882817b7a335db3966891260a6555dc340351ec1a59db750ba0bddc66808d653cd1e1398ff5249b6bf28d433dea