Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-02-2025 06:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe
-
Size
776KB
-
MD5
1ef7f755ca61b2a06073128c555271ec
-
SHA1
9fc3a3fa136f6aab9e92735c49506dfef46806b4
-
SHA256
56384535db37b404f3ee127599b84a2f523ca93f8862090c7162980f78cdb80c
-
SHA512
ba84bf9b27fb99daae59030051c5d472ec902b462904a8fcef63a2de71b929953e440c4087e24259a59cbfc4afac53bbc7ac4d5fb1c9ae248f09d383cb112c74
-
SSDEEP
12288:CpU966pnlOSoTiSC/HR/MOwm6QR2Q+4C17gLX7pzF/6nNWIRWTWTiCn:Cal0yEm6aNq17m9zF/6N
Malware Config
Extracted
cybergate
v1.07.5
Cyber
Ustealer.No-ip.biz:100
4T22T2S20164N7
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" server.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\WinDir\\Svchost.exe" server.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3687E6O0-712V-I6IC-RX1D-L47267NNWT1S}\StubPath = "C:\\Windows\\system32\\WinDir\\Svchost.exe Restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{3687E6O0-712V-I6IC-RX1D-L47267NNWT1S} server.exe -
Executes dropped EXE 5 IoCs
pid Process 2384 fear.exe 1260 server.exe 2756 server.exe 2916 Svchost.exe 2628 Svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 1260 server.exe 1260 server.exe 1260 server.exe 2756 server.exe 2756 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\WinDir\\Svchost.exe" server.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe server.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe server.exe -
resource yara_rule behavioral1/memory/1260-20-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral1/memory/1260-25-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1260 server.exe 2916 Svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2756 server.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 2756 server.exe Token: SeRestorePrivilege 2756 server.exe Token: SeDebugPrivilege 2756 server.exe Token: SeDebugPrivilege 2756 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2384 2536 JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe 30 PID 2536 wrote to memory of 2384 2536 JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe 30 PID 2536 wrote to memory of 2384 2536 JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe 30 PID 2536 wrote to memory of 1260 2536 JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe 31 PID 2536 wrote to memory of 1260 2536 JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe 31 PID 2536 wrote to memory of 1260 2536 JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe 31 PID 2536 wrote to memory of 1260 2536 JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe 31 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32 PID 1260 wrote to memory of 1852 1260 server.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1ef7f755ca61b2a06073128c555271ec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\fear.exe"C:\Users\Admin\AppData\Local\Temp\fear.exe"2⤵
- Executes dropped EXE
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"4⤵
- Executes dropped EXE
PID:2628
-
-
-
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5d5a734365b931f60ef71e5e00b131f9d
SHA1353a68d505ae7e0d508eb2abefcdd0024a1a9cb1
SHA25660d1738db942668d490af37939ceb41086d0822052ef7efcf6191f6a32f152f6
SHA5124db12f0a0da56f31a6c015f5a5458deea3b4900f76d05e0dd4e996c48b944bec1c1fda715cf9f75e79105156f429ad8d8b0e09bfdbf76e8a0b3fd7b3ceca87c1
-
Filesize
8B
MD5fe421faf49434189510bf770e1ff6312
SHA17edf1387d15c37a72278e0b5dd7e9442df84d14c
SHA25697aac08d3f142c1d8b0ee5c4dbddd22b01bc7b1816dd4ed5cd216e7f04decdb5
SHA512d22690ae3722308bd55cb7dc22728fa95f0ba6718a15461d18cb88d4c45ff220eb3db6aff181c7066e6dcb026fb6e1ea8ace9f48a8057f94cd29ae3b49cf636b
-
Filesize
8B
MD57e07be9df5c631850bc2ccf010563fae
SHA1e7de4fb44a4a067978d6a95649a36afde7fa68e1
SHA256a6bdae9bb777f11097df69de0c8e18d6d17ab523e3f38964b100958098e8a91d
SHA512f4997cd9ef340118a5d8471cb34ba3fe2235475ccdc22243a4bcd9712ebb2625573ff49c77b57d04569cdb164ee5ae80b64716dcb1e7fab41f90f82abcf7da1b
-
Filesize
8B
MD50b9afa292ff043fed9efb162370d1db3
SHA18745776b64e2f0a726d65b4aeefa658e9eb7c299
SHA25678b33a35ddf236e798b1545d751ebc96d8e8764d245b332919954a37a2367a98
SHA512ecfb7d4d47da2e25404406d4bb5065cfdab340f8cac4b8731d336db1da394b86752d4aba434ddd3358c00226dfdde575a439eed0f9ddc411b346a16df2ce2a73
-
Filesize
8B
MD58c40567b961a76ef1a980da3a9e76b78
SHA1ac1a17d09ae15697b0c60e33dbb846a82c52cdf5
SHA2562091c697b743ba2d11f5664acbf1cbe546e4daafee60db0493aa86c38ae3878c
SHA5125963e39232594370428f260f92bc0cad171824b991b6fcadf916b56373e27343203256fc266e04f86bea222193353158c5e0e15ec021daa3bf116f0e5278a326
-
Filesize
8B
MD5fab6cdcea90439e8b4dca1f80c04b156
SHA1a284a7bf3becde00af14c6318d82ecee765a06a9
SHA25630db046ca1d5dcdf49f908e14eed5e74697cb9f3ae2901986c758a262e359598
SHA512784b24e7cfa41d3c3e4f920cefa27b989f28c5bc47f1724ac091980c4e455651a2f942a8837dbe2d4a7bbbaa948db0af58773d0c1619abb771f7b2d8f8a5490e
-
Filesize
8B
MD5ecdcdbbb6e799a7a0cb50d6ae73c0d6c
SHA10ac15f0571a0a860365cd0d760d2767d1e63d3e0
SHA256b0aed34440fc9021456ad01a4b5b5dcf7810e54d650a180e5298dbaed16f5e14
SHA51213e056f4f656e21b3e8c9c4b3e9cdbb661c1f3cfb21be078f6ed7206a620625c6e128f6f0bb45dfc2e0fec8eaf57b14af6421b058b3ebc8c19176888f0547b0e
-
Filesize
8B
MD56f36ee73e641ab163c92fa718bc3db79
SHA1999fb88f6b27f7a1cad442cd9f023da1e4d25f69
SHA2568c0a2dbf1ebb265a6e3d51cfc990942e924955041172ad074ef7a5a59d732609
SHA512d5573bcd1feec4ba9f5e9a9b0a351d2e09eec08fe890d1fbe356af5aee4c48ddf1b5ba15af4f8e74e6c4e8d464ce17de33b72045d525e0341a1e17ed5897c988
-
Filesize
8B
MD5be09b79c2844ab6f0fe0965a2aae9372
SHA180494c8bcdc2f9a39884568b1eb6505573fd3cea
SHA256e979c9eb24f46a57571cebb830d64207538163409a68b33c07f143c6a1e290d0
SHA5129d0c947061e55a8ef5ee0805b11083f6865454f245aa49ed15cea9af3f6760a40646e5cbb465a108510aa428127aaf06f29e502722b23477dc75d2582441e923
-
Filesize
8B
MD5844d5dd044b56ecd53ae6e77b400e46d
SHA1ea2925533e93b6e82e635e4ed88a80fa24474143
SHA256b1f1f84192d95fb385e572492d954fa73f636730d14827df6fb19c9249cec689
SHA5124c4bd5aaf8c5dea11715ca17475da230780674c041778ed539a17bbebec20eaffa07b9d7668649c73c2f2a5612737bbaa3c2cf33d9f05cd7d1ac6dd315d8d136
-
Filesize
8B
MD52f4662bba53b866954aade0e190a1993
SHA174ff1fae26beb5daf6908cd84f64891e08fae404
SHA25623b4236dfd6d3769a872f15a9a65b10ae520115e36a2ee979adb2e515c7992fb
SHA51249846bc99ca6849988abd45639cec76db730e4306b42cd077450af114fa862c346f916070fa6813f16338b5127f13b4500cd3414334c36bd406268fe74a995b8
-
Filesize
8B
MD511308a1894640d999352ea3e7829a1d1
SHA17133f5290aa002cbb82b4fab223d25c0acdedb31
SHA2566dfb7d44fd45f28d0dad63b5870d177848f81d050d5f04d04d0ac57b32c67c60
SHA512090f2ce57ad1c3d188a315cb7d845c1ed3b0094dd4aa02ff04c3403e86f105e19befe84747f57e98b6349440761df787249ef8944e59367786c880379fb333ac
-
Filesize
8B
MD5e3dc21308efecfeb4681c49e5ee105e9
SHA16f3d3415ae69adf6b0c8f79488cc6625233f47bc
SHA256b28b59a92cec7656f02597eae867a18826f6b4e3d04bcb6ad1b816a419c3ec55
SHA51248697fefcab5766862a7938de318f51c8302f44cec0112db1b4943597618b3fbce8cc8209646bd4c2de60f564da48dfbc224f9781067cfe89ec60f2173b02062
-
Filesize
8B
MD57837097a1e31130333e16558a293f21c
SHA14ed1a843b4071e67947f739d68e854cf3b03caf3
SHA25638c8bd886b11c4a67f346a5f35389c95e3f95f3db8e82eefc7c6d19107e63e84
SHA5126ae51053b9cc1a10a4f9368176f802daf5333273ade1db4da6b5d40ba3a065b76d323d54961309faa124e91dad6ba6820897172e51ed196c3ca8a1d622a91377
-
Filesize
8B
MD586f45628f5938b8bd4b2c57da1ee89f3
SHA163f33c69517071423a3c7f7f95695c405946b62c
SHA256450b52c3055c0345b069f3fd94d990db6b258642c9a7bccbbd881cf75c767e57
SHA512d27cdf7bbed507d6aa5c7585c57d42aafaf4faae9eba285b9d2fff33b125d2379927d567aadc391bb7a3da5fa238582ea904ad929cdc69f5171ac6bd7bba78d4
-
Filesize
8B
MD56a452f452d93e882417254a67728ffc3
SHA1e147a0d251d80c4081358612168f5579b22ed28f
SHA25669f3cac6474474c16d2dc6831e230d224fd3ab4cae6d2d5fe164d83a4a96f5d6
SHA512cd63a87dfa72e82bb3fc300fee796b4b4f4beb1c325d02a1535c79762715dcc9d4c44307699ff2d268b42066fd2a511a609511b737525a42c2abaf14e23a7a28
-
Filesize
8B
MD5e71e11c5efe8f811a1a2350f03dedda4
SHA1e9bbc7a9c1c60780a54cd99ba5d68a6bdd323b59
SHA256ce5fe661cced646244a191077efa1a2cf306f764395b0aa99c6b7d647580d2e2
SHA512d500fb3666b1579e07a4a9b2569d3e0383bf8e3e853ece7fe9a5937071c2e6e8a5e6bfb4bc2280a02411908f1465c631496859398f09a1240dc0f9394057f6eb
-
Filesize
8B
MD5dca8e4430363f77eb0281e238545abfc
SHA1e80b49ce95479cd5832e42b211254042e605519d
SHA25699e055eaf0be115f3eef9cdeed89af61531917a93a75d747e6d8320b0ab313a7
SHA512c9a5201074852a861cf223b3a96a24731f6ce667735c369948684c067895c5a9c71bb8be0c77b8fd8f8f8d0a3499ba9e1f45c843c729c69aaa6ff4707dd5a2c9
-
Filesize
8B
MD5e7255152c0e584deb035bff18660c63e
SHA166ef1b26c7490408ff8fc80195784240363e4191
SHA25640ea9fc03e36c57683031920467677416fc344dfbc29eddaaa5cfd50df7952e1
SHA51264d3417bc4f48dda5d4388fab9db04f720c45136f0c7b4039114304faf4c66566d1cdcf2c0061e768566f71ab56af98bf99d673bbf3c8d9115961fcbd62ceed3
-
Filesize
8B
MD56c886ff2a6450a52c26f6fa6cd85317d
SHA15c00dc994235801324efa82ec004f535d898144b
SHA256ce1dbdd578b5d7c0389a95fc83e051e76ef8f4f46cdc5a625b5745f494ff877d
SHA512f230b28b908027d3e220c156c3435415ab594125923e0469b198276b9b99a6b4a6af1957f4cb9521e4f7f48fa67884d0b272af874f4b9800538cb658f50002cc
-
Filesize
8B
MD524177c9ea43f61977dae14b4316eb329
SHA18fb69bdb9ea5de82169406d1fbe01fc648ecaafa
SHA2564c44b2d12da8f418add76c8f1b030a17addac9131147a289d950b8ccf9430a26
SHA5123651ac9c7f48c8350398cc5b0ae22e409fff31cdfd961c82128214965f9e23bad0b9c76a24d1e829c467eb8606fc0f186489bfc753af0c65de601a9547d4b518
-
Filesize
8B
MD56e98990c99dbdd50d7ec43c22dbd8c1e
SHA1bd66fc222becbfadd623593bc8e6b514f946bdc8
SHA2565451527eeb5da78ab68f4d164ca71183a4c3d783806b136f1f3d3f652a4859e5
SHA5126cd73876f57e00c6ca4f170b636ccff63a825c8a43f29767d75242bbc2ca542f844e66bd83e691917ad1d2a54889848a006fa6d19db067fd1d46b4dfba79a26e
-
Filesize
8B
MD5804e3eae64e40dc240dc9e9c5140651a
SHA13d37799e1e440e38d786413d6d7b4f95358b8f9d
SHA256a8088b26991e6e4e62b16fa83a46febdede3488f42ea028b514708fb2e8de390
SHA51289ccd093b886bf1c35a4804d8cdd11976bc77fec00179f23193f2f36d91355976e88f04daf90ce78c3af677aed055355070c8e04702cb0724518c4a61a197dc8
-
Filesize
8B
MD5f6eec91333e80e7a3527880ecbc7b09d
SHA1a6b76fee8dd715283c5d9eb9a133c74485122fbc
SHA2561285568a2d7cbddb78883c46019a71e1b1654713b42a32a29929b9f8895ab361
SHA512662d78840b30ef2323d5cf46abe72f87698029fba22354c86794d65ccc99f7cb6ad391c623fb4eea50b92e0dda813ca7f2e320f449fa7c8a6b7aa9069e193c9d
-
Filesize
8B
MD5ce08efbcb344d61121c8fe6931ae6249
SHA1e9f90182380ffa1f5f4f451097ccfd10fe541790
SHA256c81dd6d2dbf94a6f32d7caab1e2b348158f8778b9f950ec2ae1f4ed72f35d49d
SHA5124be63483e5f2fd7e0ffafbd73488412ec397eaeac81bcce05f1590f8c50ad91aff02b0672c44a7d54ab884698fcf5f10a56ea3c65aa01d75c5077ab7aa1ab2cc
-
Filesize
8B
MD5fa304a66a629441a57fffde20e947435
SHA1a1f55cde268c69092a17e79f58fdb3fb5a7d38bb
SHA256f25187265f603a84812957e1b526b1c1dc61d7072274a77d6d0fdb2939f38e96
SHA512fe3eed55726a841e7aac9258824e5453936eeb622e00d780063e0c573edcbd3b2fb87c35e9791b6c14c44138ddb021bfeaed086b2ea454a137d784c06140c87d
-
Filesize
8B
MD5b2d70ee0a610b62e768c97efd5b1a7ef
SHA1803c6c31745a6554c889ee92d8544573fe8ab73e
SHA2568a74b7e0f4733a80611f206776ea180c9310ff5cfdc036075cdb670e366f340a
SHA512e82a65eb25d49544925a77f39a188736f466f8886d43051ae19b06b22442d6d382eb5bb4adfe3de2c910157338441a244c72093c53e054863f1464551ab287b5
-
Filesize
8B
MD58a5a8996c0b2d601b739b7e312629da1
SHA1e1cb0ba20788f9a26cd07c93516c6ef1d3a77daa
SHA256c7732c107f6ec067a278c290741d671829dcfe0e0e4d17c5a98dbafcca9deab3
SHA512d73d377ae2a148559313bb1d0840e10e8eef8cfffacae1b0750fd625adf4d53639729d2eee3576349ac08d874650bfbd1b321a4e9d10556f0f9b4749d5508d1f
-
Filesize
8B
MD570018204c859e04faf672acbdaec84af
SHA11d6d51c3e7d09c6fc597ddd7a57152e595660bf0
SHA256894c735d6dfa5053e073b4866723204613d46f79486cf8ab6e29fc4b426e56c0
SHA5121417363dfb1984d6dd10c1d085d00c2bb915e9bb85bc873a312ec4a08510fca38969500170cad1f7afeef063bd168f25213fa369087a42f77e86a8183e572c89
-
Filesize
8B
MD5f9daa6ce1209cb22e7d36d6636fe0c0f
SHA1cc47469145123fa6fe090cdb2c2669bbbf2a6724
SHA256e39f150fc0e02d0f8d3325777c0af302d6ba4a1c5f2f55ff553197eb5bbb4f46
SHA5128c8c97d4c00b034227394c53b8f63024b996e0b0b9f090e5a223b96fdd8b92dfd560804d9fbaf356ae58c59ca0ccbdf16f39eaffdc7d83d3e901343e0b29f9d8
-
Filesize
8B
MD5af6ee3f941a04dc5b6e48f795d327740
SHA14886c153ba578276126575b99ac51c519c205a2c
SHA256004ddd06c23f0f32b105265e073eaa19c595a40605a7d66ec1a1a1f517ac8165
SHA5121de1838393161887b82bdf1c0390f8576f65a088aa18b1eb2eb7f8c6fe00b6eed13df9b7a7942319374e9cf0fd4ef72ee997579b239edb6fbafdc90e57108972
-
Filesize
8B
MD5c65ba03fde1ba2569267b913c4e5d268
SHA1e1884f1faa80f0db472b38e0b7ffcf0b41c61209
SHA2564d85e84251ce83b38d684445d664340a698069947fc99afe06c51139a8d60017
SHA5122b221d7d1fdaf369089687a25d915fb7b93cbe91f05cb726acdd2161d402bdc95e9908f8c349d5378946c1e8d7b34604196761cad6ba930fcea5c7b0db142e27
-
Filesize
8B
MD5274f8783e3fde5fa3cea03dbf0e767a6
SHA108a44cb72e29ba2d88364663166e44e74beefb46
SHA2567ea2aaf61fb0b408c3a170a1945ae49b8526cc5c5ad6c28f544b0cc9b780160b
SHA5124ed15645e8d2b8e1aa74e81d275cb3c1a1b55c3e6ae80e5467f2a07d4cb2833777a3605a258ceb38b84de9d572a9e27a62657b698873e073e757b562dd2d34f8
-
Filesize
8B
MD59c8109fe6536caae3ecb7758c868db02
SHA11229959666d0739ce91eb31d0cb196dd6238961f
SHA2560511ea3312eac3ca8cfe98eaab44bbf567141f0375c750a1139f2c0ceadb1d37
SHA51244f3059d0aef43fb28878082e5f55be37980ca332b1a35b599bad71773e36b3e3821aac73d2f7374ad19a74b35fdc642499bfc1c6b6c99a0c3468d1380cd2bb9
-
Filesize
8B
MD5e0e624d7d0c3108ad46b4d91fd3e41ce
SHA15f375991a36b9807699864c408f568361770755d
SHA2568b197eced6537e6b1e073c5c7f08cad1a2e14680fb3d5b2306d5c2aa3283d772
SHA5126725cf1dd3b6f66425cf921e22db8d037290ed19b872fef10c1641629380d83a17f6f21512de8f154b56e5dd474731866a24558aca9491ba45c67cb2b4064a8b
-
Filesize
8B
MD5fb3076313ee6e6234707444ba547ce5b
SHA13fa96c49022114b69e2e1c422737fe9cc8b661fa
SHA25607b7ccdae21b4a3417b420140d2d549fe06a8ad53763081288403a3c21a21c4a
SHA5128281ebf88881cbf8a01d8f09f3254e7b7c96200cd050268442249a17927c29ebf9cdf6dec3571a980e90acbf4532733c4963bb3def1b15084a5ddba8945a05d3
-
Filesize
8B
MD5598add7ecd9524972df0796e552f1bb0
SHA1131e2f5b91a918ec8987afbb6f91753eb759403b
SHA2566d89a98b8c9b19156f13238d3193598ab326438787d99c54a31b6d586b67ba06
SHA5125d571bd4dab4465bc61aeb5fca1de46d2733495d033fe8a9eb6170e092d6e39264ca29910462f11844289e9c88f966c207c92e43ff3906ecc643f20283ba1926
-
Filesize
8B
MD536f867cfe9f13987aa6d6017c19681d0
SHA17d7e819be1d90b57d9bdad080a196aa4d38bc73b
SHA256a41365cc22f6ad5fc093bb0ba4e5a2f7d715a5f0cac50e7d38778862b14c6c28
SHA51278b438a30f9150c305617b0c5390725121bff21988de8178d9b97237f9e2cd2c86c1fe16ea8bafd54dd24e70e523dcd970854be19edd7d046dc69dc08506814e
-
Filesize
8B
MD523a99f923793971bd2deb6df9ea3395f
SHA150ded30287d6d3401a8069cf4336a72c7d93764e
SHA25612378bbdc67aab0795af367912d64f854a16c7222ce3f01e6df85465631392b3
SHA5123e8f1bd754ed62dd99e0cc020001e8ef8607d21949152c595427405856424857249a878856d6eff4ab4f0d381f5940e10cda6fbd4034c64e539b3be142c73a45
-
Filesize
8B
MD5a0155219082417d8fdefdf33d0aec163
SHA14eb1bd32232bfb6e111a57d013f90c00ff4563e2
SHA25614ffa84949a222121b5f5415dde65c567025302d939307acac3614282c15b0ad
SHA5126d30ae1bb31ce8d3c2ddf95bce308a14d5016ff925f9b253c8e2118f1fe8f4d4d7bbb906020b15d2c5bb929de2d044d79d669d95093daddf2dab676b866f9fe7
-
Filesize
270KB
MD50ff293d1e2dd8f84cfa97dcc8805f473
SHA148a12d093d73da96cd60a07dcd2101e42be979f8
SHA256a43afa78c49c604f1be877db0fdc0ec4fd27447c6ad339717d3a8b3bc9cd8fe1
SHA512c270cecb62662cea9f857a9d3809ec065b71b5a59c2fc99267d58b41c01f79e9f081e6a34ac7cbf70508a44b39e612cff495b152111e318dc39e21d29ee65cd5
-
Filesize
296KB
MD5254e3898022ee363312d71a77a5fa0a6
SHA11b9e2bb522daaea62491e1d14494c2317eae51a4
SHA256a97a7c36dcb8e21ac650c6d2cf96d5b55f4ba0d66225c8d9b6d3dc764fbbf303
SHA5128b2f7c33cf48818f9a46132dc0be66b7b9cb5df38ef9b02d1a8eb3b76c5772bffcb7970194076b5262e7de22517d96367e2847e2a78f2aff347620b753c78c96
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314