Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 06:30
Static task
static1
Behavioral task
behavioral1
Sample
d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
d9c9f0cb05f42397e3b48212e38f4113
-
SHA1
6344d579bf79d01e96961e55af7b0194ef7c1df8
-
SHA256
3a522d18554242a033d56595f35ab0b8aad0991bafe2d9b6115b4accc7b1a403
-
SHA512
11936871e7c678685e3feaf7433a116059b3c9664cfc8b42e00bc6de88d14c945e527a24b76b4fbef3c7bbc29b62c29a73f1528159c8f3de413d2e0cce1f732d
-
SSDEEP
24576:mx2BNyvsgLnw/WjcPtuCOXfvopfLz/1iSsPMoQCpjgq77PGhGE5Y:mcNyY1/UontiXyuz3zE
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" vbc.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 2724 skidrow.exe 2668 skidrow.exe 2544 SKIDRO~3.EXE 2564 Setup.exe 2552 Setup.tmp 1444 C8EA.tmp -
Loads dropped DLL 14 IoCs
pid Process 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 2724 skidrow.exe 2724 skidrow.exe 2724 skidrow.exe 2668 skidrow.exe 2724 skidrow.exe 2724 skidrow.exe 2544 SKIDRO~3.EXE 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 2564 Setup.exe 2552 Setup.tmp 2552 Setup.tmp 2780 vbc.exe 2780 vbc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2780-60-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-61-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-62-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2684-69-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-70-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-74-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-79-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-80-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-78-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-113-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-203-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-219-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-296-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-302-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2780-303-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" skidrow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EB5.exe = "C:\\Program Files (x86)\\LP\\9A66\\EB5.exe" vbc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2668 set thread context of 2780 2668 skidrow.exe 32 PID 2544 set thread context of 2684 2544 SKIDRO~3.EXE 34 -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\9A66\EB5.exe vbc.exe File opened for modification C:\Program Files (x86)\LP\9A66\C8EA.tmp vbc.exe File opened for modification C:\Program Files (x86)\LP\9A66\EB5.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skidrow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SKIDRO~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skidrow.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C8EA.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe 2780 vbc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 Setup.tmp -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2848 msiexec.exe Token: SeTakeOwnershipPrivilege 2848 msiexec.exe Token: SeSecurityPrivilege 2848 msiexec.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2724 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2724 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2724 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2724 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2724 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2724 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 30 PID 3028 wrote to memory of 2724 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 30 PID 2724 wrote to memory of 2668 2724 skidrow.exe 31 PID 2724 wrote to memory of 2668 2724 skidrow.exe 31 PID 2724 wrote to memory of 2668 2724 skidrow.exe 31 PID 2724 wrote to memory of 2668 2724 skidrow.exe 31 PID 2724 wrote to memory of 2668 2724 skidrow.exe 31 PID 2724 wrote to memory of 2668 2724 skidrow.exe 31 PID 2724 wrote to memory of 2668 2724 skidrow.exe 31 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2668 wrote to memory of 2780 2668 skidrow.exe 32 PID 2724 wrote to memory of 2544 2724 skidrow.exe 33 PID 2724 wrote to memory of 2544 2724 skidrow.exe 33 PID 2724 wrote to memory of 2544 2724 skidrow.exe 33 PID 2724 wrote to memory of 2544 2724 skidrow.exe 33 PID 2724 wrote to memory of 2544 2724 skidrow.exe 33 PID 2724 wrote to memory of 2544 2724 skidrow.exe 33 PID 2724 wrote to memory of 2544 2724 skidrow.exe 33 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 2544 wrote to memory of 2684 2544 SKIDRO~3.EXE 34 PID 3028 wrote to memory of 2564 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 35 PID 3028 wrote to memory of 2564 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 35 PID 3028 wrote to memory of 2564 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 35 PID 3028 wrote to memory of 2564 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 35 PID 3028 wrote to memory of 2564 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 35 PID 3028 wrote to memory of 2564 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 35 PID 3028 wrote to memory of 2564 3028 d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe 35 PID 2564 wrote to memory of 2552 2564 Setup.exe 36 PID 2564 wrote to memory of 2552 2564 Setup.exe 36 PID 2564 wrote to memory of 2552 2564 Setup.exe 36 PID 2564 wrote to memory of 2552 2564 Setup.exe 36 PID 2564 wrote to memory of 2552 2564 Setup.exe 36 PID 2564 wrote to memory of 2552 2564 Setup.exe 36 PID 2564 wrote to memory of 2552 2564 Setup.exe 36 PID 2780 wrote to memory of 1940 2780 vbc.exe 38 PID 2780 wrote to memory of 1940 2780 vbc.exe 38 PID 2780 wrote to memory of 1940 2780 vbc.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9c9f0cb05f42397e3b48212e38f4113_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skidrow.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skidrow.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\skidrow.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\skidrow.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe startC:\Users\Admin\AppData\Roaming\64C84\37C9A.exe%C:\Users\Admin\AppData\Roaming\64C845⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe startC:\Program Files (x86)\842EC\lvvm.exe%C:\Program Files (x86)\842EC5⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
C:\Program Files (x86)\LP\9A66\C8EA.tmp"C:\Program Files (x86)\LP\9A66\C8EA.tmp"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SKIDRO~3.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\SKIDRO~3.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe4⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\is-A40CU.tmp\Setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-A40CU.tmp\Setup.tmp" /SL5="$60108,74240,0,C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Setup.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2552
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5f7b795773e93023733e31d2af0754765
SHA128b1b03c293b22d7e94c32c41d26f163480327e3
SHA256a2d0a9f149179dbb339ba0c6e390a2726302ddee57d2ac63573d4a5a1f3e816b
SHA5126eb4c622462dc9f74a4a065baa34416930101b12c7f94da92630a1d31b37641627e75784220386e10374c9d6bee8515f8fa3a923a4dfbdf3a0cc2c8c38459078
-
Filesize
996B
MD55d7e5c1fc4d489ac5227b272d72c40c6
SHA1f2a7a80d0524a5ad08fe494722cafc7c6892f406
SHA256d9e6cfcf991afe83077f0b81950682b3ef0675d55d48d89984dd8c740bb97a86
SHA51203a94c1bbad9dd3dfb0c689880b2f8d43bd7da9ced0afde08290c740ba1051a108c6a7a86de0d212d873e6437b2cf0406fc982d600993ffd30e6a7994baaa6e5
-
Filesize
1KB
MD58399099cfe460c140d371bb7e77a970c
SHA10ea724b2d92a52720e83e3c7370ca0d35c76458f
SHA2561ca32d251074526f221cf1c89e801681c6e55106969dd56a14fa0a9c869c6d24
SHA512f968ea0eb8d4677664c40f6dbacdf623c878e9c011a0697a3c8b870f812878ad886c7b7b3439224bc6ac7f1eb1781766593b26fea17e28b6f48f93a8b677f865
-
Filesize
300B
MD533be9005192514b62cd446b94daa5216
SHA1ca72df786a19bf5f1f2f7d5e4a4f5e9777714de0
SHA25689629bce5dc979d1a671f447be449b233bbcbe40421115280a1d17beb8b17671
SHA512d36d6c3572d50007a354a1defab1f14497464c1916628de3d02258d4f50003f8ed45b9ce62dd22e4902b066e9b86b8820ed1419085168a3ba0975878586d626e
-
Filesize
98KB
MD5452ca0be44887092384b55fbb84d79c7
SHA1c51135c52fdff98dacc66b1bbb5dd215b90d3a8b
SHA256fe1aa7fbb7f031ee7e5213dd6656d1502f127f6ddbd5b9aab8f6d880031ea688
SHA5129fb18a250f93fba63cf40e8efe58ef687ad197f764f1f16b23a9cbf6efc64fe60a75b523ff1c8876fa70f597f8149139410396c03db58294fce5019ea627ff07
-
Filesize
308KB
MD5827173bae329a629387df843b3256652
SHA1bf457c0eda575ddc3a31e68942a928d1708c2c0f
SHA256768023ae8aa3f7f392f7d225eb15b71c5018d694f238bf9ea18287c7dadbc9dd
SHA5120bc67d155f73a666faa75ea4e955df740496c7c565cfbb21145291ca546744f8d33683c080a956336b339004c1c54393f52825cdf24ade3986e14d3914f531c5
-
Filesize
765KB
MD5f22095e315e9a8d364df659c91890745
SHA19d7e615f2155034bdf74ff114ddeab0354e71057
SHA2562eb0b39b1afcb3606a5929fc0fc4416ba64f9acb4b3a8ef928fbce5ff681749a
SHA5127ff3a6c5e97bdcaf3dbd35cc47fe35ba915f84ca8bf3e41a1a194a4d3f6887356417d6bc4058c6f9bce30714b18ca9a5233c687b2d9e8d8655479639611f4a05
-
Filesize
388KB
MD5ad24722609e1771cab3b1e89efbd6dc9
SHA16979250571cd91a4ba039b02b1b7079f9b76bc09
SHA25684d3017fff463f002b35dd8aa51e096c755af4cf8c9562292d22beb9592cd1cc
SHA51298f3127ff99bbe54b92b4dab37f9335e6e1aee2b9ef3f00608c5b98982229888ac15af24ec02339ae2ef7554a04fa5ce53a973966a9e255fb819f196e3ce19d1
-
Filesize
388KB
MD5b0ce26b05fd6228f0225f22e1d071e74
SHA18930a49802bd5d7e4cdde50e0e3cc9afcf91b683
SHA256cdc49b4fb77aa408e0483cb0f185b36988c63f152d6f3f4b272e37095c4a6d48
SHA512f0dbe1ef9a2b574988c9389bfd8561b108eecce3cef12088a8a4c1aa5f1123c8afa338342c2559c11ddbf27433e042a10ab6ff62f132c27f01ed21de03200b73
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
689KB
MD5196907fbd83c1b5fdcf93ac6f5ebe7f2
SHA14c6e464daf20c4a1bf950d7dc76b6b3070385e65
SHA2565c4347e48bf33628add00b695dcc85d9d3068b51c0dc9aa8a6d6aced2292c4f3
SHA5125c499ba4362bf81aa2eb62868da2e962095051eb06bc31603f716d439e55b601dc1185c4deebcf2299883f79b624c457b7d6acdfe6ef02efd07f3ce23b5724a8