Overview
overview
8Static
static
3ea67267905...18.exe
windows7-x64
8ea67267905...18.exe
windows10-2004-x64
8$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PROGRAMFI...it.dll
windows7-x64
1$PROGRAMFI...it.dll
windows10-2004-x64
1$PROGRAMFI...ge.dll
windows7-x64
1$PROGRAMFI...ge.dll
windows10-2004-x64
1$PROGRAMFI...er.dll
windows7-x64
1$PROGRAMFI...er.dll
windows10-2004-x64
1frey.exe
windows7-x64
7frey.exe
windows10-2004-x64
7vts.exe
windows7-x64
8vts.exe
windows10-2004-x64
8Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PROGRAMFILES/foler/olader/acledit.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
$PROGRAMFILES/foler/olader/acppage.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PROGRAMFILES/foler/olader/adprovider.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
frey.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
frey.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral19
Sample
vts.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
vts.exe
Resource
win10v2004-20240226-en
General
-
Target
ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
ea6726790536078f1519a965c44a11e8
-
SHA1
eb72a91a1ecc6b3fd5960d092d90de50ae502999
-
SHA256
dceb5e72706fa58a20c908932dd9a5bd2445ea2c6e412f13253e7f8c2c51e655
-
SHA512
254a61124f1c5fa0001e5cc4aab7c0fcd3aeb6d4b269529d4c92a897aef6c3aea1a016a2bda6c768ae6cf796083d1f3bc91dee847a8455ed12e907eefc00db6d
-
SSDEEP
24576:zLgG1Z5DpRkcBLahuWfsFddDz7YXQpwr7w2:P71ZTRk1h1A8XQpt2
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 9 2256 WScript.exe 11 2256 WScript.exe 13 2256 WScript.exe 15 2256 WScript.exe 17 2256 WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk frey.exe -
Executes dropped EXE 5 IoCs
pid Process 2520 vts.exe 2576 frey.exe 2480 Quel.exe.com 2500 Quel.exe.com 1708 SmartClock.exe -
Loads dropped DLL 17 IoCs
pid Process 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 2520 vts.exe 2520 vts.exe 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 2576 frey.exe 2576 frey.exe 2576 frey.exe 2448 cmd.exe 2480 Quel.exe.com 2576 frey.exe 2576 frey.exe 2576 frey.exe 1708 SmartClock.exe 1708 SmartClock.exe 1708 SmartClock.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" vts.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 iplogger.org 9 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe File created C:\Program Files (x86)\foler\olader\acledit.dll ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Quel.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Quel.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2428 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1708 SmartClock.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2480 Quel.exe.com 2480 Quel.exe.com 2480 Quel.exe.com 2500 Quel.exe.com 2500 Quel.exe.com 2500 Quel.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2480 Quel.exe.com 2480 Quel.exe.com 2480 Quel.exe.com 2500 Quel.exe.com 2500 Quel.exe.com 2500 Quel.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2520 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2520 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2520 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2520 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2520 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2520 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2520 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2576 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 2576 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 2576 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 2576 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 2576 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 2576 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 29 PID 1908 wrote to memory of 2576 1908 ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe 29 PID 2520 wrote to memory of 1892 2520 vts.exe 30 PID 2520 wrote to memory of 1892 2520 vts.exe 30 PID 2520 wrote to memory of 1892 2520 vts.exe 30 PID 2520 wrote to memory of 1892 2520 vts.exe 30 PID 2520 wrote to memory of 1892 2520 vts.exe 30 PID 2520 wrote to memory of 1892 2520 vts.exe 30 PID 2520 wrote to memory of 1892 2520 vts.exe 30 PID 2520 wrote to memory of 2800 2520 vts.exe 31 PID 2520 wrote to memory of 2800 2520 vts.exe 31 PID 2520 wrote to memory of 2800 2520 vts.exe 31 PID 2520 wrote to memory of 2800 2520 vts.exe 31 PID 2520 wrote to memory of 2800 2520 vts.exe 31 PID 2520 wrote to memory of 2800 2520 vts.exe 31 PID 2520 wrote to memory of 2800 2520 vts.exe 31 PID 2800 wrote to memory of 2448 2800 cmd.exe 33 PID 2800 wrote to memory of 2448 2800 cmd.exe 33 PID 2800 wrote to memory of 2448 2800 cmd.exe 33 PID 2800 wrote to memory of 2448 2800 cmd.exe 33 PID 2800 wrote to memory of 2448 2800 cmd.exe 33 PID 2800 wrote to memory of 2448 2800 cmd.exe 33 PID 2800 wrote to memory of 2448 2800 cmd.exe 33 PID 2448 wrote to memory of 2348 2448 cmd.exe 34 PID 2448 wrote to memory of 2348 2448 cmd.exe 34 PID 2448 wrote to memory of 2348 2448 cmd.exe 34 PID 2448 wrote to memory of 2348 2448 cmd.exe 34 PID 2448 wrote to memory of 2348 2448 cmd.exe 34 PID 2448 wrote to memory of 2348 2448 cmd.exe 34 PID 2448 wrote to memory of 2348 2448 cmd.exe 34 PID 2448 wrote to memory of 2480 2448 cmd.exe 35 PID 2448 wrote to memory of 2480 2448 cmd.exe 35 PID 2448 wrote to memory of 2480 2448 cmd.exe 35 PID 2448 wrote to memory of 2480 2448 cmd.exe 35 PID 2448 wrote to memory of 2480 2448 cmd.exe 35 PID 2448 wrote to memory of 2480 2448 cmd.exe 35 PID 2448 wrote to memory of 2480 2448 cmd.exe 35 PID 2448 wrote to memory of 2428 2448 cmd.exe 36 PID 2448 wrote to memory of 2428 2448 cmd.exe 36 PID 2448 wrote to memory of 2428 2448 cmd.exe 36 PID 2448 wrote to memory of 2428 2448 cmd.exe 36 PID 2448 wrote to memory of 2428 2448 cmd.exe 36 PID 2448 wrote to memory of 2428 2448 cmd.exe 36 PID 2448 wrote to memory of 2428 2448 cmd.exe 36 PID 2480 wrote to memory of 2500 2480 Quel.exe.com 37 PID 2480 wrote to memory of 2500 2480 Quel.exe.com 37 PID 2480 wrote to memory of 2500 2480 Quel.exe.com 37 PID 2480 wrote to memory of 2500 2480 Quel.exe.com 37 PID 2480 wrote to memory of 2500 2480 Quel.exe.com 37 PID 2480 wrote to memory of 2500 2480 Quel.exe.com 37 PID 2480 wrote to memory of 2500 2480 Quel.exe.com 37 PID 2576 wrote to memory of 1708 2576 frey.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea6726790536078f1519a965c44a11e8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe"C:\Users\Admin\AppData\Local\Temp\oflete\vts.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\dllhost.exedllhost.exe3⤵PID:1892
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Giu.mui3⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^kQLkrNVqMvVPjUboJryRqVXWRCKioBIlzPmMjILBcJFMqlgOxKxlShsdTPxBeNRkOLcvxKVqsEcdfkVGhVNnubsunpTbglnIRxYgORx$" Sento.mui5⤵PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.comQuel.exe.com h5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quel.exe.com h6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2500 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\btpttiahv.vbs"7⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2256
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping IKJSPGIM -n 305⤵
- Runs ping.exe
PID:2428
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe"C:\Users\Admin\AppData\Local\Temp\oflete\frey.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffc5d4760df045a2e90045fe39a38334
SHA132a6376b02eabcacfbb94156fa27be8aef593dcb
SHA25627370f93331d9e462356f887a0e930ef862352e0869f8222812c74832e9ef171
SHA5128f2476ac2f7130e05f9c2ec6be0b4cb6b8187b5ea2fbce77d26cae3421b0883ab43c1e43983cd463d263da4dea00f0d3754c7ff8b844cc15ceba338b4e2e5ad1
-
Filesize
297B
MD5bd0c2d8e6b0fe0de4a3869c02ee43a85
SHA121d8cca90ea489f88c2953156e6c3dec6945388b
SHA2563a3e433f615f99529721ee766ad453b75d73fe213cb1ab74ccbb4c0e32dcd533
SHA512496b1285f1e78d50dd79b05fa2cbf4a0b655bb3e4515646be3a7c7cdf85d7db6ab35577aa1e294f3d515d707ca341652b5ae9d4b22197e4480226ef8440294b6
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
639KB
MD54e8629baecebd43750f2bbe47802bd9f
SHA184f87ce1213739e98d38d9878a535ec130dd2004
SHA256e7f1abdf2fb4607f636e416b062f5b05a23aeba881a4f09a8083ca19a553811f
SHA5123c355d3899100845d04be80b5537881e7ee5fd2516d4c2c89b3f2e511070c5455e8bee5dc6c6b71a0b55d6a9af6cd8a1f97fb4f46ce19a0a1412a5615340724e
-
Filesize
139KB
MD50f8a38c30c0a09f00eaf19395d8a40f2
SHA1298afde1f0db4b527822370df772b7dc0371b92c
SHA256aa12257d1c3ee82287d6c617359aaa2592f3bb9d0cca991f89660bb696ba8183
SHA512ba89f3e76af52d7fb11e0d29c3e68a947611bcf3f18125c3ae2ba4538ff349c0fb13dac573bb3bb76cde231c464f623e266b34cdf58bd0321c96c856795a98be
-
Filesize
501B
MD5c4f3aeb64246483fc44207f319c5b121
SHA1b1ce99afe2e145d6e7a5d419c0b9e5614f680729
SHA2560a718358ad31b418775f66874a055d4174f0f81326cd76513db2e086f908beeb
SHA512deaf054f84f600b122bc7f2bd71e716fc05e0f2818cfe63b38573a9af7789ddd3134a1b2f796ff131ba1c7cd4bf74c82bd7d5136507288e872648fbe0ababd2a
-
Filesize
872KB
MD584b0184010185fb22db4d7451492ae5f
SHA16f5a12664555342f958030c118db7e5b78d78d7d
SHA256ddabd3d20c02f109925f46c56cba701f2bec2cffbe1f3800b2442a6cd4ab3d2d
SHA5126d38495a4b85862787c7de720d2e0c71762202c770212cc91a389a8768b80fd920f52adf3e0bc0f8d81fedd15be95afa39d14c96a07617eb476908f088aec814
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
136B
MD56bfe15139236b50a01ee5db9f55ceb48
SHA11e743f69036c3624c43d76828f85f01ffd2794da
SHA256acd979135d827850edc795b1e078f4d994019cccd6850707981c7a87b140e3fb
SHA512a986cac361ec52c3299bb22f38871da15ee1ae65b2b887fff53aa673219938ca3a74f09b06d1144d30dc2ecba0048f7cf36ae1dddb792577fe7d09d737005372
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
302KB
MD5f795be6a5ce28f6e7f766e48dc5cb44e
SHA1364b5b20afddd8f046bf3e673a5f590e2b84ceb1
SHA256c7ad728ccbf4101c21bd646b604731764ab02d097b6cb35b251f5cd4dc3baf2a
SHA512731d13194f146a7368e64407c03cef811043fc2ed68bcc1f941cacdcee21af933ee7b507bc16644476d55e992272ea3061650763eaf64b3c4dcb24eaab0c5543
-
Filesize
917KB
MD5bbecb93aeacc1abf8cee9d9b91833900
SHA197d303be086f700918a9ddf4da58685961526738
SHA256844922b5e7c0681325cfd27ece32c4c8a319c6054d4e2dd6d5b7f22ed31c22db
SHA512af59d9ad84bc3381eb556f78d8578b76db145048fca4bfd48afa31cd03a54d75ae806f30b3f01207a5a75cf188735154c79dc5f494f5785a52b4868979150cc7