Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2025 10:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe
-
Size
574KB
-
MD5
202a14370a53f42915cfe9692bfc4d81
-
SHA1
bfd7ecf85d7090dc4a80091d38825a3f5ee06e8f
-
SHA256
48fcef1d2a88207a98c89cf793d42cefaab683ca9f3836020bdcf027e6df0292
-
SHA512
bb2e55e326c693cf3fca66f5e633dffc0d8a833e22d01196bb09bf6d8190cdd435c330e079f1af7677b41a624642809ff4f83e0ef266bda1096c3e2ed2f1f225
-
SSDEEP
12288:zv7dIr3tg9YK41j2Y1wdVUX3+yZ48aXyIktPZ:/edT351wdCZOi5t
Malware Config
Extracted
cybergate
v1.07.5
4chan
hosturl.no-ip.biz:3737
8M05IA3OA6AAET
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
WinDir
-
install_file
Svchost.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
cybergate
Signatures
-
Cybergate family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe -
Executes dropped EXE 1 IoCs
pid Process 4732 Svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File opened for modification C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe File created C:\Windows\SysWOW64\WinDir\Svchost.exe vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4948 set thread context of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 2612 set thread context of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 -
resource yara_rule behavioral2/memory/1712-25-0x0000000010410000-0x0000000010475000-memory.dmp upx behavioral2/memory/1712-29-0x0000000010480000-0x00000000104E5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4888 2760 WerFault.exe 97 3608 2760 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dw20.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4964 vbc.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe Token: SeRestorePrivilege 1908 dw20.exe Token: SeBackupPrivilege 1908 dw20.exe Token: SeBackupPrivilege 1908 dw20.exe Token: SeBackupPrivilege 1908 dw20.exe Token: SeDebugPrivilege 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe Token: SeBackupPrivilege 312 dw20.exe Token: SeBackupPrivilege 312 dw20.exe Token: SeBackupPrivilege 4964 vbc.exe Token: SeRestorePrivilege 4964 vbc.exe Token: SeDebugPrivilege 4964 vbc.exe Token: SeDebugPrivilege 4964 vbc.exe Token: SeBackupPrivilege 2760 vbc.exe Token: SeRestorePrivilege 2760 vbc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1712 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 85 PID 4948 wrote to memory of 1908 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 86 PID 4948 wrote to memory of 1908 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 86 PID 4948 wrote to memory of 1908 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 86 PID 4948 wrote to memory of 2612 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 89 PID 4948 wrote to memory of 2612 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 89 PID 4948 wrote to memory of 2612 4948 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 89 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 2536 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 90 PID 2612 wrote to memory of 312 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 91 PID 2612 wrote to memory of 312 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 91 PID 2612 wrote to memory of 312 2612 JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe 91 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92 PID 1712 wrote to memory of 3168 1712 vbc.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3168
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4964 -
C:\Windows\SysWOW64\WinDir\Svchost.exe"C:\Windows\system32\WinDir\Svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4732
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10122⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_202a14370a53f42915cfe9692bfc4d81.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3436
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 10445⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 10525⤵
- Program crash
PID:3608
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 9203⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2760 -ip 27601⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2760 -ip 27601⤵PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD573f5b19f17ef581179527de49abed715
SHA1f0036844f47f742e45be7f70cbfe97bbb1aed28c
SHA25682427ddce9e1804a4635ae642affe2c83a1571410e0cb7c9f80efb7f47188dd5
SHA51213d2a21d5b0ea1f1a56fcfb093eba183fc691678bc7049bcd98a124379247745d60da8cfb972f10ceb392fdcac6808abee2bc1cba4667b696ae3b24982604ee9
-
Filesize
8B
MD5667c7dcb72a56b82c19b857c7dee36b8
SHA141e970ec44c541964e90a02bee8fba0e83a88d5b
SHA2561137b9d0dd0c0b6f7b6b53c150e350e84bcf8c91a3f232ad4dc644322faa6798
SHA512759bef79c0426787949eddbcc965330866d61e66460d16d4746d9d3a1b28d587a1740abf7a9c0aa3fbd6fffc70c620ea8f6e0717c3d33cf806ec9519fbda684c
-
Filesize
8B
MD5f1ea606b40a99302b81a1e67e5d009ed
SHA1d7f1eaeadd2f96b516aa541e4d3ed693007a5e0f
SHA25619ea30f750069b29d0c4449d9079bfab209fc26a6bde595cfe797b30e31e0eb8
SHA5128f0ae59b32c1b7bd17434a770d3a3988b3bdec5b9f1dc4592655426b76870f6af1f1ea007a8e50e5432c10a78603c9b5ab056ef02deb90ef20f10c5279554026
-
Filesize
8B
MD526c4105b4953911dba4a8a3cad03d464
SHA134ed7ab084c05928d58f1080b261bbf858c9933e
SHA256a3b2d8bf800f2fa17ffd393103c8dab69d25f417b52967f9455c5b6314160b2e
SHA5120fcf9d3b93f826d8442cfeece96525cc6adf4306c8a39efd7801b63314017a85acf396fd77678fdfe5b2b7820e496f58fa0d404ac54e4952d9ada090a13e7ad2
-
Filesize
8B
MD5d19d86d1966e85c3f175d41f67065864
SHA1579cafb2b6bdb7ea3a4dd161266a3255b69639ce
SHA2561945bd57120185f2cf83b474a7d09a80c46a8dca068b7f250aba7edba8732d23
SHA512e97b3b74bdf4d7fcfab86e864c2e67c1e9c2ec56bdf25f6ea3d23726a8f2cba895f7fb47854030477cc12df000dd8401e5c6ca10e3955ae50ada537359aaeb78
-
Filesize
8B
MD5d9371373de1bf1bda7553664e974bcf9
SHA1774d93272f8237af1f0c6fe52e904afc82b383ed
SHA256848329dc049699621a27f4210b422c50d94ff854827124a4e93f5bb72e5d4fd0
SHA5128eabbf1817b4921d673aef8ae2d0b3ddb27d38f7dc48ac073931b5a04e775ac7094fab4aa013b5c41ed83e23de83a4342c25b9167c8349d62f977d943954d5f7
-
Filesize
8B
MD5e29dbe6e76c6b8ff9799831eb0cdeddb
SHA115e6af69bbf359c2d9f6ed77f9299f67146af3b2
SHA256e816681127e7565c74d5ad0237231e65b12a1a3011d9829b82f47320e9350539
SHA51220a197b9dd3fbd0a0a1eec6bb6b909749d91a5c252e2951d56fefc465ebf7950c41853e12bbc9f8376cd1a5409b921ac10196dfeaae9bbd9a7dfcefbdc7a5ca8
-
Filesize
8B
MD5c8370bc08647ad1487cf7119b536af99
SHA1564111075a99c0af5de58922e107980a73650f32
SHA256d1230efb22b95b595d323158f99b91f79e65bbe1d35a8fabe66a41801eae6947
SHA5122b8c67aa17b96cc0104505197d5ccaddba134a1b7f6624b71c460b555f35750d8f0c6485c00501cfd20f073e851419c36bdf028c487bd9cfba6c33c00b6e1986
-
Filesize
8B
MD592a47ee2df4d23547ae8b385e9339917
SHA1cf7b8f8dd7241ab1a4aa6622cc4c5c72c268ffa9
SHA256a56e146d4355d423943c8b5a2c4d70981a90134de05121233a2d245839cf78e3
SHA512ffde35de27b00499b43db8997224e5afb9d11b85754fccf05ca0d1230fa14cde2c97cdace76c8d512d39d525c5f4034293adcde1d85bd17bb6ad6b9ea2afd6e7
-
Filesize
8B
MD578e5914038e1251bff19f584780c9c60
SHA1e00dd6e1407813a26d1ee7632f947b1b45bb574b
SHA2568673584326cc5952883c236c6316c8438cf837f13ed923d711f44b082d31cda2
SHA512de5570e7ba830cd5af76a53b7d5a2e46207864b9bcfedc9eb4483cb1d7805ae600815cc9ced52c2d6ece8522e51df34e563ae593862c51d56eb5aaf410e6c5f2
-
Filesize
8B
MD55b60a21c7bf140f2be2a5083116d6519
SHA19cafd8d95fc7445237a309b076da26a08fc30b32
SHA256a01fc3f8daa60a19b735fa815f0be51ce1c5fdecb25a3c06e8331f02edfb0026
SHA512dceef0f59c4056e8f4f5acd11c254edb06098f055d548d61e78aac2ce0876576e59b753dc027428b01961d899f82b91ff221b56c14d1be0542db65a44ed35324
-
Filesize
8B
MD53d08ba00feba9ee27c176c1f7788badf
SHA1d27bcccaf95cc1423fa40f65d2cca12bc61469d5
SHA256926e93c42905d1e28bb053ca901ad865a1e1a2bb13914e77de7af0a5fe3702ad
SHA5129e00ba7244b2cb8241d90cdac3db9d095dff8e80a06f29e80d213e8ce2e09bcbe0e2ff49a92e9f28969c2602d17092e69ddd30a9863ceaec7993d2ef64d4e0f4
-
Filesize
8B
MD58455d83f32dc6125900e47aa900f0676
SHA147a82a7889d9e35bfe3d1bc5681728283e544bd7
SHA256a137f25f7138b44e54e2217060b977307997b63ba878e02bad371de7f8523e0c
SHA512f6102614537c0bbde915d9feb3a860d8ffab3509c4977390519eb79f1d67709362e7aa8e957ede9f0757da48e75c89b5f205890eb67e18fd59a94756ef63fe1d
-
Filesize
8B
MD59167472ea970c20ca964ce963773b4e5
SHA1352f54dc0c826c421f0e1aac69fc1384a7118bdc
SHA256097c80162bab6965967dcf2c96e167c0cea99c0b9795733b74f71bfad2482b27
SHA5126f63b4dafeefce2906a76fff1b635189b0f60dfe5fab643cb933248d3c05c9dde867c612466ed26ed854d06f03773aa9047527c5b97912c006c6ae64a5a605f9
-
Filesize
8B
MD5e83cd09f06e2be18d040e26040017fda
SHA1a0d73d551131173f482d1d278bf8a3db229afac3
SHA2564bf6c2ad15974c59506cbfcf7e309f23c81e0eefd99bd04d6c77bfc9e4595dce
SHA512e7ec207021a98f58b9ae0176f8318d9139e2c8fadac66f84b4641623e00bfd2c055ea6b328666d145d59c912ae85f4674858e8d5713663844a5e8f0fdd10b21e
-
Filesize
8B
MD57d0e23a331fcb1cc0e3d6366be58557b
SHA1d14f10335204eacefe53c1ed3897bad8075fba87
SHA256ea2a0ece3c2cfc7824d797477f5899358e59648759c3bb99704bbbd46c664fc6
SHA512339732066ad5d2736931fc72ac51661bbcdf0ed1af983f6192ed37384f47006c2dd5b2e38518e39e6c6f00bb9a21368b644010a2a11ff0ca9083c57c1eda923d
-
Filesize
8B
MD5cd815005b05d590cb487da699f320751
SHA1850d7b4a13406dbc67f78d89090040283a6f5323
SHA2565a93a7833b367de18c1b50160840de2829b4b234667be191837dbe300051a20a
SHA512e98e2c620789ab64480390dcf4118c6bd8e62c778456bd17ef9327a8fbfffb450e4b314762051a91251a521bd50b1b7512321790c89a499f3025b82078013944
-
Filesize
8B
MD5113027284831c133683c51c4d3280d66
SHA1303a71144761c5d3e4555db0754f69f397c14e17
SHA2562d8c30763510e5be13b52f9b802f9490a6aca8de90a72a6461c60d074ee0ffdf
SHA512adff0697dfc7f01007d8e5ae45f13ead60b51600d1afc77fedcc48fe0c7a9f859ec13bd3572d917f717a609669f4fb21ee68239fdea6da454b9cb6fea5627177
-
Filesize
8B
MD5a1f0b9ea3fed2544974eea413328d8ed
SHA1d871f6273e8469211876b78a37849671d4bc13cd
SHA2568826982dde72c32eaa50ef97f8097fccf7827bd19f7badbf2b632ec88ed40c5e
SHA512d49fd2b8e5c55ca2c694855ef9bf7dc2958a307962d74983068e1d2a8767170037aa3aef39f2d7f581ca4ffb7d846441edb3d4a6a7c916f3c4093250f11e39c8
-
Filesize
8B
MD5f55295241393431c667eef67db196767
SHA1be560fd6d8469bed949cf7bf68bca6fa2ebc3741
SHA256a87cb594c0941b61eb1f8e81ddc7f39a545678e3806bbea30ce69fd713197192
SHA5121e7dbefb1c24e17edb21a781fcaad3d834e1d67964fb1a8e596d72d39b182bc0ea00d19cc2b21bce88d25b841f10e807906526196b42d2657985c17ed37f1c61
-
Filesize
8B
MD5945ea02adbd3b81e1ddd2df2d5681db1
SHA193f3a521628cda36ed43b9d20049fb4180cbd496
SHA256279d64f4e118a36c0bdb14f0b22732267c8101bf242e54d1195e2a2b0e6aff44
SHA512a38075946c2b5ccc3bffc562073788f2a512982ec93eb32a90e55b0d1ffe4dd36c9d653c02011db4014546a4ed7054e778bcc0304b4b67f7283021f93b85f01e
-
Filesize
8B
MD5d0a35247a0a70a54df186a97fc23c434
SHA13fd0e084627610da21086aa7de5858786487a2f5
SHA25665065d5de0ad3ee70564c34f6e1a31597cf906c4bc6620e03829d40e215cdeb8
SHA51259f1eeb9259c140245ca5f0e5e0cca44ad0970c8399a0f7b25ce9a752fcfbd707a948a876b80d7a986d60e3836804754f1fbf7a614b70e5dae6b0158aeb3ca4f
-
Filesize
8B
MD55290ee88c562d0dd62fe1d834b3b834d
SHA16d0f739c510cbc1f950c84a66ed31bd35fb15839
SHA2564190f561a802c3d71694cfece83b6f4caf08e8ab530dd4c22a22d2bf78fae8a7
SHA512d63423f4252d7fd99d9e8f287de6bddb1a87193a7e7a7b69af260ace625b873a7e14b929353fe8454fbfe379b706df21d551fe3c91cdd4194f245ed224618aaa
-
Filesize
8B
MD5c3d59ca21e93e3f29579eccf585d03a0
SHA1dd77e4a3762f5ae475c57229b5f309671a7c4ca4
SHA25628ab9db34b9fc2cb12d794bcb17a9d2d227713556603d439c7c18ec9ef1c342c
SHA5120c994e79ff1eb830ea84b0d445b1064d8042526e6862e8c3705a1698032d0f77b7a30440cb88114999fa250a638208b4c07f38a2d919aaabf37b1903c0dff1c6
-
Filesize
8B
MD5f9159f5686ccd81ad01c974b5e0a8e5a
SHA1d53b04cd37d7c3e90a8decaf21ce97980fd55ed0
SHA25622f27fe1330ce8bf548a5e039d1fd0d4118fd8e7175042d88632fe75777ecabc
SHA512a323954372cd1b09230fd26adbcc65bd8828e38f68c358fd44e4723cede03721a2c766befcabfc53cbf7d23a2d5e193463073755596be1000be188f42a92152c
-
Filesize
8B
MD593eb3e708c7c62d717a5a6a9dbefcd3b
SHA191d0f7d7d87450984c655b6e54a91f3db88e9ae0
SHA256bfc0136bf95ed9b8f8717fb85faf0f1f85a2bdb90cf4bf0f10a4a052d3b4380a
SHA512b33dde9a388abc174fc134a8c14f688413da0d260ea1e1f247b67d94cc9dee1cf9f6324526bf030b6f82cd7edbb602a4b2035c5aeef83d7af3c31a481bcca356
-
Filesize
8B
MD543a5de578cd61b7f878f49fc62b5f580
SHA1ab6c2eee86333ebebe20a6d3a9c86fa506ac1b3c
SHA25630a42b1a2faf92c2e6eced4dcfc136e209a94a740ec1cbfe6e38bae8117f4d1d
SHA51214a3d57c80976d86dc6aef3e9575f92d662637b611120391ef6ae8a69b2fc1f1881961c01a919a50b4795e26c68042c94fe1893d0cb1a539f5c2e17f838b326d
-
Filesize
8B
MD51a8a05aef7eef79babaf83bcddceb3c0
SHA118270f47a74241220721a0423c859d2e8da9eec2
SHA256addfcf40a5a72c8b4f14d32fa2b7f6355d70f12dcc51cf8c08c252a27eb6423e
SHA5128c072cedefe482b08384cfa97992e6d6dbb8fb09d9581e627a10eb382f884e554ff81117b2bf51f0a61b41242aeb4c6d5a89302e05a17705f268c716e53f6f29
-
Filesize
8B
MD5c2a81588fea136f1ac55829f543e57bc
SHA14be45ce95015c8f410b74931457f0f910aae5d82
SHA25617d613cc8eead103c76e336b799cb7ae4813c7e2930f2b991dc7942e4538edb6
SHA51223055a1f8072249e5e17cf22f6a25eabccc75b74988110f1e7065fe7c907079033e17c06fb1634ad5aa454fc57dc975767eb0ebeec435759f31869e9d2c0ae7e
-
Filesize
8B
MD578fce7f800f7a75d3d0aa321b6ce1bb4
SHA18d1fbda0d2703fe2a7cebec3cdddd633a5f189bb
SHA25685a9abe255178e1a7adfae1f1dc865a1785519202b5ece8b286a6c07d3866383
SHA512eede9b788445b9c9b2e52e9fb8f44dc3fa2d82c995804e904e64a07dc9520342bb0a02b046bb709c340f0e1f18a6766886bca51ea136a7d6a7d6712c917cadec
-
Filesize
8B
MD58ee90228b9cd30380a71b76a0f82a2f0
SHA17c240cd5d8e9cbc3934359e21f9f606183c55084
SHA256d9b92ffcdcec66f47c31efdbf7944bf1d3cf52fe20a504f97fc37291f87d8512
SHA5125ac35df4d75b5da6819bc206d60b16a3e1755a48633c2299a88fc9a809f3ec4bd767e8252a46b0d62a67a2169f2f66944539edc2375e995d8df4de0ba8b1c2c0
-
Filesize
8B
MD54d602dd445526b8ace135e6578bf022e
SHA12e1e66e484677ca8620238a514a4a9f2f9db1718
SHA256bcf25256bc512b8d2062133e0936eba1770d44a17b80a9310f7ed22fd045d672
SHA5123d1be0312ea08c45c436e2e5df17210e5e494eec59cc450b2d3ae6fbd509c636bebbe3d6e6271945794493bc60499583a0141d5ca67d4967990e10288a67aa8e
-
Filesize
8B
MD5e143612b8e16ab89e0fee210b0daf634
SHA1becd46e75622bbebf6926750aff1bc15965ca8c5
SHA2568a5033c689505bf27bdc838ae6383b587721f32f0093c829483ceac08b8066fd
SHA512cbaef20fc93a3ac5d1759877a72a1c8bae09e1855edbae0bf695c5b769f1ad5834c8b706a6feda475587607099197ded5b6a2cc5247a458cc80e5cad7f06472f
-
Filesize
8B
MD57f720be8f355279a91244d8f110879b9
SHA1dc36ff806125711ca93dbc0b3bd607e9684d5d97
SHA256c3706470cda272b1c96ce212c525f65842c6d8db12f930a16a6d1b7347a2921e
SHA5123ececa84cc7db1a96aa450dae5bf420cc1c6c79fa0daa8e51395dabb4c63c82480852ff351069aaba3c6e3d899e1c33956d1e9cce50fa1283767e9f91e461101
-
Filesize
8B
MD534556f223d8c5108f805cbe54c6581eb
SHA18b59c36f1f008b5d45f6fd7e84d2b71d995453e1
SHA25659d94a8c68dd9d927bc766670e48891c9884815440a7afce9115ccb799fa6291
SHA51261d4e4350efca4e93c05a377399a95a791ee0806fc5661b59bcf58aa830cc7014963f649b039bef469afd54ca656bff207a88244e83348d86fae2bb9bf4591e2
-
Filesize
8B
MD568728474adbb1716e7f92fbf91e86496
SHA13a90b34b20190ea22c7ec298a4be4f137d232f23
SHA256bd2d4c789ed9a41f86c761857b454964ae1ea77d773bdfff554267df3e8eb6d9
SHA5123be2002b5e358c485d1a728b252cf84ccf95546b3411665bf3cf2e02e5f9efa990f3c9628d486395ec919cf650976903b3e71e913aafd27262defc71ed513da2
-
Filesize
8B
MD5bb20164d826ed9582fcf7d32ca3291d4
SHA1ba23cb1c56a40c13489742241ba6320f5da2da2c
SHA256f6b26658182c4ac33c6883c6ceb34ab970ce1d33c8c9a46dc3d2a255e3045c18
SHA51227328c758a9724b831431e742d41397f6c849f741237d2afb68dd907af2d6d321aab4b76794e170ff82f25a06e6fde7d907f80019a09a4e7fa3a31975575a2b6
-
Filesize
8B
MD5a762ba18496f1d942699a92e78e33d1f
SHA1850b0c1b44ff4454c91fa7989ddabaa63a44eddd
SHA25625bf47950f51b95849e1c945b70c90bb98a2940e9b6fd2fbb1d69707e359ae54
SHA51245668f45b7e7ec96b4e77a136972f5e977d90f1c27de55f3bc3266c78363458a1e8b0ad6469ab30e75c93db0dadcc013b360a9a6dc0cb1dd1e39d10a6e8e7dc4
-
Filesize
15B
MD5bf3dba41023802cf6d3f8c5fd683a0c7
SHA1466530987a347b68ef28faad238d7b50db8656a5
SHA2564a8e75390856bf822f492f7f605ca0c21f1905172f6d3ef610162533c140507d
SHA512fec60f447dcc90753d693014135e24814f6e8294f6c0f436bc59d892b24e91552108dba6cf5a6fa7c0421f6d290d1bafee9f9f2d95ea8c4c05c2ad0f7c1bb314
-
Filesize
574KB
MD5202a14370a53f42915cfe9692bfc4d81
SHA1bfd7ecf85d7090dc4a80091d38825a3f5ee06e8f
SHA25648fcef1d2a88207a98c89cf793d42cefaab683ca9f3836020bdcf027e6df0292
SHA512bb2e55e326c693cf3fca66f5e633dffc0d8a833e22d01196bb09bf6d8190cdd435c330e079f1af7677b41a624642809ff4f83e0ef266bda1096c3e2ed2f1f225
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34