Analysis
-
max time kernel
146s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 13:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe
-
Size
418KB
-
MD5
2c28e6248c7a26847c91cecb214193b7
-
SHA1
e953689b6b754daf3c3693a3e5a41d61fcc2db55
-
SHA256
d3072217408f2648e3aed965f533ac9666e190a956b61d71fc8d45d25e6f5aec
-
SHA512
cb45c06506a9ee76be9e9d253a2fc619df5bb8ab0466029102c283cd7dc716388d018fd33b207de18f5fe4b8b306eb1eb01e5cd61f7312ef2522f24d96347ff0
-
SSDEEP
12288:hI+4NmuRgJBLzvkaF+6WYffcZOjmWdlzVGEktwRHc:hd1uSZ7H+PYMgiWdpk4c
Malware Config
Extracted
cybergate
v1.07.0
remote
no111.no-ip.info:288
G0KRB72UG4JE04
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
install
-
install_file
server.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
1212
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5W01FPA4-5J0B-SQEA-547Y-C4HF5K83LN43} JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5W01FPA4-5J0B-SQEA-547Y-C4HF5K83LN43}\StubPath = "C:\\Windows\\system32\\install\\server.exe Restart" JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5W01FPA4-5J0B-SQEA-547Y-C4HF5K83LN43} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5W01FPA4-5J0B-SQEA-547Y-C4HF5K83LN43}\StubPath = "C:\\Windows\\system32\\install\\server.exe" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 1424 server.exe 1600 server.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 2172 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\install\\server.exe" JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\install\server.exe JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe File opened for modification C:\Windows\SysWOW64\install\server.exe JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe File opened for modification C:\Windows\SysWOW64\install\ JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1904 set thread context of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1424 set thread context of 1600 1424 server.exe 35 -
resource yara_rule behavioral1/memory/1144-20-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1144-22-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1144-23-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1144-21-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1144-19-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1144-15-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1144-12-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1144-9-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2336-577-0x0000000010480000-0x00000000104E5000-memory.dmp upx behavioral1/memory/1144-909-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1600-945-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/1600-949-0x0000000000400000-0x0000000000457000-memory.dmp upx behavioral1/memory/2336-950-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2172 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 2336 explorer.exe Token: SeRestorePrivilege 2336 explorer.exe Token: SeBackupPrivilege 2172 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Token: SeRestorePrivilege 2172 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Token: SeDebugPrivilege 2172 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe Token: SeDebugPrivilege 2172 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 1424 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1904 wrote to memory of 1144 1904 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 30 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20 PID 1144 wrote to memory of 1152 1144 JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2c28e6248c7a26847c91cecb214193b7.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2172 -
C:\Windows\SysWOW64\install\server.exe"C:\Windows\system32\install\server.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Windows\SysWOW64\install\server.exe
- Executes dropped EXE
PID:1600
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5402c0845ec0570fdfe545a2b921a6797
SHA1f574e23efeaf1f1869a95075fe97d3cadcd6ffdf
SHA256b5dbfcd0ec86b5f3f6f1f73f72af644fbbae36775a2c6def43a380ef6b2402ec
SHA512bfe068a9b3155e4c9637d033a5002fb4bd99f7a7646e703e0d10c55cbea544a5deade830986a63f7c5cb64e6c069e9f2cc02d191db09a52ab3c7cc835511006d
-
Filesize
8B
MD58c045dbb193630f7575598384a3e2aa8
SHA15f41c7cb324e07ba704d6ed2e8a336350706a1d2
SHA256d85916d2ae8718a7241079126a678da82b98b0ed368d10ce52c4a91c816e122d
SHA512d41fae00067e6676e28fa4576acb8a99043a66351420b1929eb0758d9a8177d8966e734e9266894a8656e1f8545644d3ba0a8149c7893b9a0dce3eca0788df06
-
Filesize
8B
MD52728579a72df0b089763153f90cfe072
SHA18df24f97168920ed46815ab2694a47beaa0ce59b
SHA2569ff4d79302bc21d7b69335d1ff99cc8959991dcf4f99f4f9456464a3fc5fd60a
SHA5128b3b99f4ee9efc1377a764de33c49eaee74d38d3176741000f62c3f83a55d9a34c636e324e6f85bbf60fa364001c46dd53215256fd9b9085f3d77b70f56c3208
-
Filesize
8B
MD59b27080fe406a7694e38044831be60a2
SHA1a00699e8c1a785ddcb9965d93c1c0b87198c6670
SHA256af885aca83baa76096d9374bd03d62093db817ffc659015226bd14feda9f519d
SHA512c3c0afa22eed1ca17ca60d73ce0e0aef2ddbc338bdfa4d9a2cb08d74e23c2b6d5db14adad47a0b3c4d684f4e26ad2d0217f9bb6bd258cc61c15f78205043ba5b
-
Filesize
8B
MD54b1ba2188f9167101f22ada57ef16b88
SHA133bda1a8759908c61098a48bc9a56e9a0f93bbc8
SHA256a0523a6ba07792429e9a85bb962c1dedae7de8fdac8ad753ec1be65a9c2fdaea
SHA512d2bd42f04bd0237bd654525897499a53ad75dd6e2a83b4dc700c396a7fea32cf46b17cb859dbd50baa3f1ac70ac2004dfa7d4c0f7547ab1e851b130fb7dfc98c
-
Filesize
8B
MD5fad96fd5f9dc01135352667cdd1091a8
SHA17159ce66e7de74fc0fbee01300e1f58324c27c4c
SHA256bde259ad83c12557166fd18758148e41da30824932ead1585a90aa76ac1471bc
SHA5124758de3d4b3dbb0e1fdf7d1d2bc93c36ca2a83799e7797c4c4c38da47546151f01bcb4c37fee924326d28cb8d59b71738c39ac70001c951869be9af826b572fe
-
Filesize
8B
MD5385a6600d08657767e123650632b9352
SHA1d7d6f1af3596d80f381db6b0a55d059c7f9e2e9a
SHA256e917627af230bc3bcd170dd972e6d598a133be116abbe75fd156891d11fe452d
SHA5127b0ada2fad418815d2747f04b5d7d0b2deed5d4be92189414ae31f4a648971bf6c4543f7eacb6db2dd00375a7f4c2e6bb76f543e12cc3ad0e47403cf2291d39b
-
Filesize
8B
MD59ab572ae6d362d8e5f03f5abd49140c9
SHA1f2e4904a24cb5e90c55c2d59fc39004d4362e86f
SHA2565c5d7b92aa13337c8a2034fe22c8f82b1871e98d18f2347ce6fdc895c522c429
SHA5126f5a82460a65d01bb57df359aa548f8c43f526aa0c60b3d96e41ae9fd6c73e23b6353dba31f42433eab36a803e01b575b8d2a09be077e524cc2fdda24fb1856e
-
Filesize
8B
MD50e287b52df6b2d140f8eaceb67270f3c
SHA17a49bf1b886f4157e2e49e7272ffcd3eddfd991d
SHA2568f799179dc4befcf4c0c08f7bd02ca9eb9fdbabad28678aaa8d2b6cf443d4301
SHA51275ad1b32a70d5249a6cb63d5e8ae064093df5ffd9fecdeb8261d3fb396a8fb3ba1c85689c44509a22ce15e659da1fb171d455c1683375c6e03725c3f769e1e00
-
Filesize
8B
MD5ad62c14880c947c90fb64a2c28cd51c7
SHA128d94b515dd899a5ff9c05a8b0186fc0c6f5e41e
SHA256ca1dcef9ed643479d1745846ce4da2c00fc0bf6e7a9ce2eb874772234da4df2f
SHA512ffb49a0eb7abde75f40c535fc17be6df87dee44fbc7e8458afbc7891df03ea812ccda4a52a001a4fcafaa19fc74af3173620808c1fd15c35aba3913a8e2ce793
-
Filesize
8B
MD58e9d864b17369ef1e82cabc2c1afe59f
SHA127cd44c4bea48b7c098fef499d756b5aed22eb97
SHA25629960b83c0e2a48cbf256afb06fafac4f663b04600944a6210ef3d720cafc048
SHA512d476c6004c8ecedb6ab6f97af73f985edeade2554e481228897e48b5fe9eacbb8f458b84a32c04e7a61ed5cf94f9dc17529dc0a744f80c37e452cc1dd05c850b
-
Filesize
8B
MD5d8a04aecadf9f002c42e4a4ed2c0e9c7
SHA1d3b77cdb4a84f34f89ebbd2b91a8cba59e2b5b22
SHA256eadb8c61c9620cee98541a2ccf6d15c0989f81a831e69fdb89ac8596e824c95f
SHA51275cb86166e3c7599fa8697f21bf9aa11a1b700c339b70071ceb89151ceec1a4f7b31479f498e805ed7ec876bcf4b080ae18f353a9672f3f6e6a7736b515c8e42
-
Filesize
8B
MD5e9427947fada3977d837f9bd019f70e2
SHA19cf535b4e0091105176c10d54cc298cd561f22d5
SHA2560e623a6a32eedc52e817e0397a34cd5b2e0bd18112cfea59905d8ec62d956148
SHA5129bf6fca36255c277ae9e76ddae4bf12085c141f5acd40107f17c83e645825275fd1f480878be8b1e0e8c40596a84b6a86809ab04f56323ce60249dbece1bc465
-
Filesize
8B
MD5b75fe50ec7ede2db370827caf8fb7525
SHA11f8e0863d2b06de71b911b6da215bb4485722704
SHA256b6b6bf46b465223692e13f6b1cb2873d48b65b6594228a8adac258de50294f01
SHA512cd911de9f0be056be251c4c4dbc6a5edf07bae8d78ee9a75a05a30b801b6a87619a46a54b5a1d221566f285f549273486f54d0fb3834b410f0b83e78a88b39b3
-
Filesize
8B
MD5a857c2cef4ec01b5e88c6698df32d44d
SHA18433bb56fd16ffb9d763fdef18b6ae4a8ba6e834
SHA2562279431a23c9bdf32747f6d783d1148ea01fbb9e040cdeb3f2d1f9a2a681b10b
SHA512cf4b89a8bf33d1c6a099fa0908df0b777b03c0a9fd09dfb7489a0790c583769ade809cd33622645a3b82e54df561efc97dbf17eaf54083c9005b15d8f525e703
-
Filesize
8B
MD5b9f86023c25439d8827391f43d04f223
SHA1d5085c599b1383e6b760980be2b0f63c4f42eab9
SHA25675f8148897755cb0a7344eb7caa9524c4148f4437f22504f8ef0864039fe76cf
SHA512d2e8c3c91560c7d64d72e9a2b05fc1a9b3c3c31d9524da4a45cdaf3653aa868fed63ded60674cf97587ad20779b7b24b7899884d38a97d592c6a89a4b3ebde69
-
Filesize
8B
MD525455d202f866a73d02dd1d67c765e80
SHA1a1bb821dc93906a307e78081abea8201fba69fa8
SHA256d79ade20f7e93fc52021e4e63ab3195d2048920246c6228f90c9b7c42e28a709
SHA51238475a11b367d3ba297fb17e5e3ab1dce23b87e0db1d3b76ef27737791aeda1cb5da9115491f9a18951c31cfaf60c105fbb6be7bb6d503f39c6f8cfe759265ef
-
Filesize
8B
MD576a97c5609b42824cc0620f707ba0063
SHA1ad142531d7b0b6fa8702b2c54315005c603b9286
SHA256ed2f2ab35b58155059a1a722fb3bb1bc8e31a1e9bd8fa081134be75759d97d3c
SHA5120f7ac9dd235456064a7911a76cddddbc550d1b50eeb8c6ca0b98b6fa4ac9034cbf89d98c65074d6e72c692edee369c6d4e1c7620510cf91703ed6021c04a7c7e
-
Filesize
8B
MD53cc521317782ecb053a56c8e81db7e01
SHA159aa702674702bb27a0ba7b3f432c0589684a86a
SHA256e33600e83b465d2f3d7d3d8f5eb7fccc25d3b1cbd73677fd7006f4efc83d56b1
SHA512e21888134fc36b3a47a22ae0e2b86d644a4162975920cb9e78a9b2139b9eac8d7630db644310494c737d4ad3a3f62b39900391836e4e90f37c7a8143410e35d8
-
Filesize
8B
MD53ed8330eca89001be5d4142c2757bfb8
SHA1bc3ebe9c5086dbf31c255807809158afacb2baa6
SHA256b6131f49e53ef8eea5201fe7fea0f0e1e9dfcfe03206c68350e2d7fce6e4d71a
SHA51269de46bc50bfcc18022bcd0ca36491705b1b823dcd5ac8ca02996d1e6d6a28cbf4a909d9301f5dcda59c35fa4cc6564bdb1c03b4aaba6c9aa6040ae4836017e7
-
Filesize
8B
MD573156795f34c0021d2b6508a68993391
SHA109e68d97b22e14f5ac0d5f8ce936f1e32bd3d426
SHA256e41ded15e9f2148bfebef2b58f7557a38eb8a2eb998977825557421182fa673c
SHA5129bfe3bcc51a4802314093334ea937c2e0bf0c4bbfe2c1231bc5a53b2cdc852a277a9633a41f158f0f51c14196e1e2ed424895d4c7570095bd53ce33160aa6c4a
-
Filesize
8B
MD5c9b63e6d3aa7d49cdbb03e3767791be2
SHA10f7c76e71c8c81e4c8ed15415d3e935dd0d1eb7a
SHA256c7dafd1866fcdd0b3221721cfc74f87c5fb8f3e1c81868973277ceca79712d64
SHA5123707b6b37da588e7258a834f8c10e8b9d9040ef2627b3e1a82942231eef551cf1ce0f92c60c2fbe3d9daf28fb53d578deaa439e5f5f8b04d13491946f17b04c7
-
Filesize
8B
MD520d45b68071b498619c7635f2bda1b36
SHA15d792ec309f9124537d1d1cf4b82790db90ede98
SHA256af17760a2b4244c348660488b0e93ae7cbfd20c04c7c866f30cec9649682dc93
SHA512ce9b1dc0b5b8dd49560fb1c8ee3c045e6a379de3fa1d30220adb842c1a733d361cafcd1d5b8cb3ac3dd73b992f344a2f9ab1d9b109a1de8e657399b7bad7955a
-
Filesize
8B
MD57c0760065547129ec40d119a2acfee02
SHA12b56c6d3ed9b4b8d943aaa188d561552d109398b
SHA256a4483b1a7751ac7954b157def636c6933d831c63c9c157cdb213e3310038a63a
SHA5129b6ecc0de64c5541c41b4d57487eec21c5b55668ce3cee348af90f5dbbff661ba4516dd6d4e76167243d44feb9f462b6939db33326da21c1033601d85296900a
-
Filesize
8B
MD5198a1cdc625fb75facae6e2175c6d371
SHA10c7d4b5fb27edc91864e386fa0ddd4567b37dc23
SHA256a4285ebda399422148d65f0a0603ae120dd28c1af5e98a4d8400f496bfd95a9d
SHA512935ef972e2c89413630d6821e993fddf309a5527816e33cefb0ed26d7149404bbe8c67a33e9ffb0c2a056b23f6ad21554dfc5c42b2297ec61efd74a528340429
-
Filesize
8B
MD55223bc2192fcf07c271672c59f78548c
SHA18c386165cb3b6bc5b75d240e723a514a498f2ea2
SHA25693f3c43adf90c4afaeda1fccc0e2dc43d97a58c4594880c83ba8bb29c6b72f7d
SHA51239879dfea8c7e04aa8f49d8ffcc3cf826fa57b35de871d1565743f9f24cda6e5d6089e8c40967b48a7cba964df0dc6c024a3653d4c06092352ab051867d58aec
-
Filesize
8B
MD5755d76f0f4d4f76a0e8ea9ff46870fda
SHA1acbbc15c382788a86c07bf8a9ab917f317425827
SHA2565f9d8527cad32269575f68ed7920e6979bb9987b77f612f711808623760a4b70
SHA512e09b01d45c8c9fe074aa8fabd84782c8ae25c6082e2bb7b15be157ae2d08ce1cff2d334877034ff0746456bbbc88dc805be43e7527aae589c814b1830374a0a8
-
Filesize
8B
MD5960ee76d762e60c55c833dfe65ea787c
SHA13528d0766a3825c2b81272a12bf8e59bef671167
SHA256eaddf64d86664c4bcd6352e7bbef16e1a7110d57d79f032091260fc4ac6a6c55
SHA512a4e82dba8d8a73dfc9325a45a798f0582ce1b9796678f573397c1a20f916825bf04d60aceed29d2f6b6780d3a9e5b8aa8dbf3018786ae521cd30714b3c8b4eef
-
Filesize
8B
MD55e7b7c34f6c7899aa0718074fd99029e
SHA1472a8c0b5cfbae483d9c0851ad14d1379a3f5699
SHA256938f5089e30277b07739f083daae896507803a85bdc4c08b1819e5b219f2eaa0
SHA512098f54eb140c6bc854d1c3c94140fdd3e05c6ec1aa024c7d7b949a602de99f2966d448929fe3f843c3b9d04ace6dff12294c8aa96e0b814b4a41ecd979cd60da
-
Filesize
8B
MD546d1fc5361cd8e6f81f0d962c9f2f3a2
SHA1e05f54df61fad6cbf6b8b4a31217276b3ef4666e
SHA2569da7d2b5881baed45384b4a2edd832aaedb73ee6e7e971212d0bd23c50189bd4
SHA512227a2deaed91e1787287a374e320ef49461a20850159aed977179e9e56a2734b19c99e3f2a3d1b11526973532e6571877a41f20523a0424adaa4b6e304542c98
-
Filesize
8B
MD5c6b9732cebf7a57f5f4e2a3d7de157f1
SHA10e438f52cfefd99dde4a71e4d4dc4d6ced84eee6
SHA256fb489588ea40bf51db4177f6418ba641364ce15324f1ae924e5ab31136d867be
SHA512a2cfd15273fb7f9c8ae653e34ba938a68d7fa7cbb6d5a0b0b91ed2f5e9365f9d72b5375f726a41e0248ae2eb4a252f8c9d10b3a66a21a066146ad6426496810f
-
Filesize
8B
MD55ebd6ae8129ab1cefe6129c407d2682b
SHA1f804b416cbf305e9f915f826be925932f1d42608
SHA256a2d3158776dcce5dffd6c651cb8ce2c51428c3b9271d03b9e54f3dc113767e65
SHA5129d6be91715ef29ad6f4d0a18c0df29782b80f3b7881af271c1c1357616d3d83668d9d19e50e875b44dcf124d0af6ec7fef536401717a6e80172d0e4d6cab9908
-
Filesize
8B
MD57f264fd0c75523911474000ab1ab1b1b
SHA1a84070533ba55fcac391af1477b1182e80d72b21
SHA25697901f648e74dac416a8d51deb2620fd119f6ba55b18b611b0807ab983986500
SHA512ae5655e4ad83a7730f89197b0ef4a347e32763623a2d6cd37b340abe28c0fb1d3cb73da99acb966f9ce03a27756e20c98e1fdc0eb4d4eb9b9be6edaee116baf4
-
Filesize
8B
MD562d63ac8b9b00409ee48eb9490c33946
SHA10695949bad37f1e3ddff0557850dd2faf138e9d4
SHA256f33faf68dd1f962f98a4242ac46c403466ca3d54ca33438211734e8963ed7eae
SHA512f5ad93966ef3514f505170c8829924af1c4d2c28ae7d00406fe05bd9ed3e1e8ffddea9b6c28c663174f5c0c4ae07bc3de0417ccafa76f92855afed0fe0f68c50
-
Filesize
8B
MD5c8a9b8738a06ef1b295dfdc8a8ffae20
SHA1bd4b2710f6388f516c720549b076f037638335e3
SHA25660d7f48e54e1d69a71107276d90a7668ec44921776e612cec022fb513d32d03a
SHA51220dd1ba50d3a2e3feebb140dc001f5fdbeda8ddf1125b2ee96b677e96d586af39ada72d7defe3673a75a7c489513e2b86fe0c46af0afcd9c9e3c444ef931a228
-
Filesize
8B
MD5645021431f70dc690dd5223e5cb81dfa
SHA1088ce16a498a293a06ef1ba1a7bdc8152f92d3ee
SHA256555499f9cfb439fbad57a0bf50685e785ff6d2be58f42073153a0bee27761d51
SHA51265be5d5526052b26c6027babe29af83767b2c0ee81e4a93276182992d41e4969746c67f6294dfb09b5c47dd432d61a768d6cb67ffe0b35af66417c5eb3677a0d
-
Filesize
8B
MD55aeeeb1bbfbbdb29a9af2e6471c26a0a
SHA1b6b21bad2176c2b654b9de5c45708fb9f09ca553
SHA256bccc8bc0f4824c69414983a2e8161081b98d9ee778e75b70555a50369b82e494
SHA51245f286f0549dbfb9df8bad7da0a37b923c52dc5f9b4c0446a15021690eb6b540325d1c6a1ef1a51c68b22268aa0b1132e9a39f5129d1129f914d631ca8b15f4c
-
Filesize
8B
MD5afa3e6b294d017a322f3e82cd14fb44e
SHA1d73b56c9b551233c4dd9e38a7342019462985f59
SHA256e8fd21699d5e59cd840b78423e6e733f22cddc5cabaf767c8910443a87b2d4b2
SHA512421897fa8d727c2aa317e06e88b88d4d0dc8b43dde0cca80e0c421cba90c8e247dbbe559fcd7781ed9186e226b439d490f2f445ce7558bc2c081776ac566e17c
-
Filesize
8B
MD5ef8ffda339001f987470bb97b58de89f
SHA13798be0979b9adb0706fae8e0edefcd670857feb
SHA2561b573046bee585f1e8a1e33c1e0def19096ef3bda05361be9dd02992aae7c0a8
SHA512398abae9e2b89680d35822ee7be80fbda53367210bce87ed7f3bbee757ef988dd119a5a06d428fca9c1d924bce7e066ad3c260ba5bec6e8b53f78fc8afeeccef
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
418KB
MD52c28e6248c7a26847c91cecb214193b7
SHA1e953689b6b754daf3c3693a3e5a41d61fcc2db55
SHA256d3072217408f2648e3aed965f533ac9666e190a956b61d71fc8d45d25e6f5aec
SHA512cb45c06506a9ee76be9e9d253a2fc619df5bb8ab0466029102c283cd7dc716388d018fd33b207de18f5fe4b8b306eb1eb01e5cd61f7312ef2522f24d96347ff0