Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 18:48
Static task
static1
Behavioral task
behavioral1
Sample
5328c5792b577bcca618728224c7122b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5328c5792b577bcca618728224c7122b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
5328c5792b577bcca618728224c7122b_JaffaCakes118.exe
-
Size
179KB
-
MD5
5328c5792b577bcca618728224c7122b
-
SHA1
cdca92197d07cdfde7c11577182dcfb1b5b39a7f
-
SHA256
86b37b9915f056e07087dedfe7e032290ab40dd04f77621480b5ac86854ceb2b
-
SHA512
eccbc81c5d65878086382c68d547e122de07b1ee55a5a98e8ca34bb6a151c5d9e9555c58c65f0054d018c70bc3bbc31260835f743427d423c2926fc6ab05b7e6
-
SSDEEP
3072:kPMZWdUkL0hTk7/KtFKKtwH+UbtyIB2yaSy8uc6Fhol:kgwUkL0Vk7/K26wH+UJ1pZ63c
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run alg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsass = "C:\\windows\\alg.exe" alg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\svchost = "C:\\Windows\\svchost.exe" alg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2100 alg.exe -
Loads dropped DLL 64 IoCs
pid Process 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe 2100 alg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\RCXA9FF.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_78984\java.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File created \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\RCX9B71.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Windows Media Player\wmplayer.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\RCX71C4.tmp alg.exe File created \??\c:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_pwa_launcher.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX8A40.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\RCX9B70.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9D28.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\RCX7182.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\RCX7217.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX8919.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX89C1.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\RCX9B1B.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9CF4.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\notification_helper.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX8A3F.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\alg.exe alg.exe File created \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateComRegisterShell64.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\MicrosoftEdgeUpdateSetup.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\RCX71F6.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedgewebview2.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\RCX9B72.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\1.3.36.371\RCX71C5.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX89A0.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9C8F.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9D07.tmp alg.exe File created \??\c:\Program Files (x86)\Mozilla Maintenance Service\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Windows Media Player\wmpconfig.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Oracle\Java\javapath\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX8918.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX897C.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\RCXB099.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\RCX891B.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9CE2.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9D4C.tmp alg.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\alg.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\RCXB0AC.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Common Files\Oracle\Java\javapath\RCX62AB.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\RCX9B4C.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\Edge\Application\RCX9B4D.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9CCF.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\RCX9D04.tmp alg.exe File opened for modification \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Windows Media Player\wmpshare.exe alg.exe File opened for modification \??\c:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4372 wrote to memory of 2100 4372 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe 85 PID 4372 wrote to memory of 2100 4372 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe 85 PID 4372 wrote to memory of 2100 4372 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe 85 PID 4372 wrote to memory of 4640 4372 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe 86 PID 4372 wrote to memory of 4640 4372 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe 86 PID 4372 wrote to memory of 4640 4372 5328c5792b577bcca618728224c7122b_JaffaCakes118.exe 86 PID 2100 wrote to memory of 3656 2100 alg.exe 88 PID 2100 wrote to memory of 3656 2100 alg.exe 88 PID 2100 wrote to memory of 3656 2100 alg.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5328c5792b577bcca618728224c7122b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5328c5792b577bcca618728224c7122b_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\windows\alg.exe"C:\windows\alg.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\temp\*.* /q /s3⤵
- System Location Discovery: System Language Discovery
PID:3656
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\5328C5~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD5200668aeae163b86a0765baf419bbdc5
SHA18dbe58f092ffcf8a5b9607dc10fd8cd89649ced4
SHA256e3693c8b25ccb695c124364682d6429c2d729b0aa71be069aad1d067fb0b08ab
SHA5129f87d26d92a164acc4896d0048c45ce9df97d650d81daa47fc1fe0c252b473424b2ab797de8aa87315484ef1d1e9d63cda0e9b4e1349043562189ea1e214f7cd
-
Filesize
287KB
MD5a5a1e89d922f9d0e308391abd1e1e35b
SHA14480fdbbe4825a63bf8da81617b8d48cdfaf8fcc
SHA25615052c9984705a582e4618b604cf02bd0c58faeef3698caf4a9735537f2e5e80
SHA51286b0f35a89bad9b797f651043794a2a596e6c84c662ba7b58ddf354d3cea11ea97890e971477a092a4b0dc781e929a00aa0628ae2a2957eabfd009f34e0ccbca
-
Filesize
9.5MB
MD51a0bb7678a2fe757f15832289306c205
SHA112737fe0ca2af539dbd89702a4820dd558c43c40
SHA2565d7b13ec1c868a2037c11b6b6211face04b8da884ecc89cab79aedaeac8af878
SHA512ba5e544dbfdefdfc3a054593677a250b6385ea31a6bc9ae4cc65495084322e20a42bb4488f745aa39a02dbf5c6df745ca220232beb4a1053f7f44dd92da1c484
-
Filesize
9.5MB
MD570391135fe598d5f4cd79f0056ded06e
SHA1b867bce5a4ac4772f1e18368c5074997eaa248d3
SHA2567ef24f680ad3208e1889c9014a1102a8b5d52b8cd72202ccbdc74947fa54c9b2
SHA5123111a97aa9cd5015184d3a418e4fabe860440b4c5062c7d1a86ddca21ca5426793427fbdf2030a8a49037bede07ffdeb78b42fae0fa5da5bb408ec0135376509
-
Filesize
25.0MB
MD52bfe3ab1bfc87ca30d60bdb436de2aaf
SHA182eb2dc02b93a209dcbaaaeecea0b5120956cfea
SHA2564a6b969bdd726f1b0fa12e4dab6babaf1fcf8f5c2e687d52435ca32fc4dc47e7
SHA512a5e4582103bc15ab3882ca03adbb6aa2b46710cff92ea3390d0c5f96b558d4cb481771fe5256fe639581b815242c7d9dff69109bf95517d6bcccc9ab242e884e
-
Filesize
2.6MB
MD5d11f8c2ee81761e37a9f9dbe73462cd2
SHA13b7e88c130aec177bac2f4f0beb84a78b1f0f667
SHA2563e49684564ece350a110c3f3e3727b03a6fdab8f0a4d003a140be2840817d19d
SHA512b2bbe1fa8feca6d7b85d6a39cb6b1fa3f61651214f0ef81f9191aeb0d94eadeeaa5cfce08dfea5e8510bbf0754d38084c25b8fc8cdf3fdf759d674c51b921c15
-
Filesize
208KB
MD5821721b364f95797e99d51ae5faf7e0d
SHA14f17187b1df23eaa2bddf653d92ab048876b6945
SHA256e7cd630dc973e7ef00889ffec32763946338fb18efc0ccb5bbf2203be48b966b
SHA5123a02c07265bcb3bc81fae1227ccc2a78a5c340c29f7c6b89c8f02658038046f1fb60bb867c578ee73e0d7ff8b3556ba043066dc5e05ed330193615caf338bf0e
-
Filesize
208KB
MD57616c9d44f85c202a5efccf7c7340d77
SHA1850dcfdd3bb2371bcbef83f19da789c8ef618314
SHA25641eaf2c4909f47ed933be1a26a9e12f67525b46cbfefd84d5e8619f120821197
SHA512c80743babb1a60759f2f7e68989a4c68b5307739a0c55622f82b9c91d553000bc88dcbe5a94f31172c20ca3862773c63ff2c0089f3c4c48c9cdfdf668108de1a
-
Filesize
226KB
MD5a7c0ea5b723fbe2d461a4a5e1931fe76
SHA133c35140912ad8548459e7a04324462d1eeef0aa
SHA256bc2294d597a4f3db330dc2ed0cc03477911b75a39f0c31e61acf9bc6bbef67be
SHA5124f5c5935693bfdcdb40d2b25503795efadfed2b51a2b9184566a30dc767c2b1d9bee1358ee48d82a74eaa4913cbc808fe4a1da1c4ad77e779e762a2c29411ad8
-
Filesize
5.7MB
MD595c9bb27cec0f1251c87bcb303e20f7e
SHA18fc89448baea96306c89349da0abb2e03060f804
SHA2561938e26305ea7e2bae7067ef78b44e07a1de827fbb9d76d3526186a43c8649e7
SHA512f536e0d71e6bf3504867b377e9b7542379531934ea3a8664ab75516b10e4a26e84f834ff56ed2862bb9509a92b93922418e882f637d80ff8a37c970b42a992b7
-
Filesize
5.7MB
MD53666889ad4f3d487c55f92c0f11425f6
SHA185268c9d3dbf78a7518b863ef99366c36fa3cd76
SHA2560d7d2d4959fdc4eecb95fc885287855bcaca2abc667d1342119b826c08c09321
SHA5126d95a2a986654543ac41c056d1c37cb718e63d1a233192fc0e02125cf0cd92d24887b9a11736aec0c5bac544beaad20647a521e03e82146d2c4aaa9822bdffa4
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe
Filesize323KB
MD5091e769c55f9a1e7b227bbf4158dbf10
SHA1b15f8a224cc672cd702324488a14088897d47b66
SHA25659f02342555c530c5c647045a7bd37f03c948b3516631833306637ef8897b38a
SHA512a83165d1cc8de8279c433d42f6d412008249bacb9d30da08dd175a2c291a84760412f509fde234f86c15f5561b0fb45f3c1378e08252cd5ba2abfcc9b297f3dc
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe
Filesize323KB
MD531f5beabedf1a9f81abe4efecba38994
SHA11325453c98e39f1f4c866175650ade965b014e54
SHA256ee0cc77b3e56dc748b4955ec638eb4d4a8d1ee633b648b1904da3b3f3d7d3aeb
SHA512eb94fa3a29b3771869e875afdc16b7c3f2adc5f58d4effe6663373a2bc0a79f869b2256040840ea55c2e943714c7327f9cb07fb99bb0376f4c95d66b1dadeb2b
-
Filesize
91KB
MD5f336e81d7c3c4af681dfac497ccc6aab
SHA1d8760fa2c4a742d3d3ab8133dcb806178a633e1b
SHA256ddd1ce2a24fc6016176cc5be4c38a5c04532878f79e5b5a34917c44f94efb110
SHA512f938cff0406298add1bdebe462ad0ae0e5f670248a603880e206e86be33956d36f3e1919ec00d1cb0af9fc963d6720f0f606383ff583f373862a9eab5d4d9f2b
-
Filesize
393KB
MD5e3598466f8b824c8401fab6bec65d5a6
SHA10ba7ff5de0b11d32562bdb426d88e754375c70be
SHA25631e6914e360ef2c760cfc977d44047abd1913c0c2c56d66cb22f1ffe9b3fcdc4
SHA512ed4a539278d56c8faac4b81cede7021ef9a450677397725c0a837f0ec38652e10c40d2e19fb9d479f73da5164a214d79721e2db4d096b00b69d5fd510b8375db
-
Filesize
393KB
MD5a27c5a275f4435083bd2ee390ebc54ff
SHA1554efc304806ef768050d42e30d9a4703b3fc879
SHA2561bc95aad812e726ecdd40e95c489978621e9d25a891d60596184cba796a0c6ac
SHA5124ec9f770a1042697bb286e97987456eae228db34519da349afe5c4b386877d191ee6f2e95879868bd9321f76f3ac46875b7c4c2d5117a03345ce87eb99f60607
-
Filesize
525KB
MD5987b86412ac707586a5e34a011e09428
SHA1c2ca18aca2cd67b42bebbbdfc5970310fb3ec94d
SHA25635759cccc3c75eaf3188ad432bb64ca78ee452f21a5848ea5071a8c2f5fec5e5
SHA512c6b81fff645c36e67d64089156b02aa9caa39965d8f34474c3da5c30cf52435c9829688706fa24523f840e9b6f0d5803f4bd8d3a845e48138a459c09c291d2c8
-
Filesize
525KB
MD59893905623ed1ded3482bb6d7e513007
SHA1a20895d0241f20c072da7edc997c5f465c3bc696
SHA256cfb976e6ff081c393865d44b5aace271732618e85a408fc06c0a587f0b96fa0f
SHA51266aa412767df485dc8c7a0c9aaeb7372cb4d7e7da7ae15d8bc7b2cb0e223d0c935d6554ba26a87beb583c834751bf1c27fb2d7086df2c6dd1faa0c207635e507
-
Filesize
60KB
MD5d481a481c0cefb4f10f3e47e86e28580
SHA189a8f933085e48240bea6f08d133b2cd70c48704
SHA25652e1aeac8ca31edfb724dbdfbdd77aa56d11d46eb2c97c2e98d1569d1168c80a
SHA512217b3f9fa2051ac4c98f88920388a5ceb8d5fa271528bbe88cac7d62fb92dd6e0e28d4a52686b0548ca1b34936671defa4c00ad30cba91f863b2308408468df2
-
Filesize
264KB
MD54da22b2a153ff7a25d0a18cc08b65388
SHA1b7ce6615519360faf0042c6001465ccd986020a9
SHA25668dd89bd6f78e0dea96bc78d0a68c0c223d520c30e2524537c1beb2e44f728d3
SHA512c30339fbea284402be7c40ca4dfa83cfb34c09ff91d7b3a23bc8514f332fbfec99ff2e1495443931bf5a7da5bdba88f900c6977f6123e6d2cc867d375916cb29
-
Filesize
264KB
MD563ce6935c2e29b4d93072ce828b939c9
SHA1087188102a08365204d0d2c5a6627f392790bef7
SHA256072a300e25e9221ef21200790c9800651ec105961da54dc99a11244b544d0c4e
SHA51257bedde289cc5bc82102f1051c95a75be627b521bf17d73632b2d69b863dcdb3b3d52b06d1daa8c602e9177b24fc6ea2ff3c3483ef2e7e839e369aed6bf438e6
-
Filesize
102KB
MD5962f4fb1f6e9d787211b0132fad6e0d5
SHA17b7b80163e93efd81d4d841a98bc33604972dfb8
SHA2566919f2fcf1f2f97d29b183b132e8746b03e809b36b542be8837d320e3b99ab41
SHA512a0f5cfe8cb06c9cb4ef94ea58928a0d43cd34eb7243ec7b6c130627ca0be4a266e593ba6248706eb0e2a348d40ac61eecd9b16af55eac8074c21a915a06a404b
-
Filesize
237KB
MD5e352fd0c9a5422eb380f327e188db1e0
SHA175346f9870328faef5f03045a155566a3ca072fe
SHA2562a922ebe7edb08480baa1721ce1b5185fb5af7f64ec0f128d6a7a37711784815
SHA512a33398457924a29715cf71c3133b09ff00a82d7b4785360109a5f3c08792571eacb20e13ee63822648c001fa91e9ff2cb22f73b8a6ce9c586163b802fcf8bab1
-
Filesize
232KB
MD5dbc9faa0b9976df3a5fbe904dbfc0ed6
SHA1d53b47757ce3f705e7bb4f2ca448b9444ff4307c
SHA2568f553f495902f6bef252c8a58ebca8e2ae4ab681be7e1cc54e09bfa1db5e9d26
SHA512d169fd6db7a7a86b3f937ab38b55a62c63d2e3b977a9c97e30f1d6f71b25002287eb346e0fa0c974d361726cb74efc03b5ecd30a8a6af0e81a771624f01e23a9
-
Filesize
287KB
MD5050e945f1f015cbe5c2a8ca678eb17e7
SHA19c29bb1952c1dac31ddcb0752325a9d73438c4a4
SHA2566e845f3eabbf820076a2f06276e9b2d00c6d61dab1bf8613cf6a98de68659c05
SHA512c0aa8a082a62ec4ab4760796fceeeb58109c9bbeaf9f60411e3e15e830d53118467b91fbb9a503fc89922834e493d651156b7f818e92208bb4f8014919a670da
-
Filesize
1.1MB
MD5bd7ae0affbb3a6fd52d956a5694c8073
SHA14abb30acd9c8fc94f72b280856e868612fd476e0
SHA25603b39c1e40731161ff527db03926e07485c051bb4c0694ab4bf16fcc212cc124
SHA5126f9e387a6d29729d2836f23e8eaf331945c7472a957cb7b98611a94f0bb31890c9b0c4da46956c1140f7ae411f0ee445008825c666a55617ff77aa43166386cb
-
Filesize
413KB
MD5522026a14d6bc781d2a15c665e454310
SHA19451a39108326ba578793b1feb62f23a02bce916
SHA256fd115ae8ebd2f37cf1ef72f75242206cf1331c7cb258305011302e981137ee5e
SHA5124e4eb2f582c8590899a0ada6133b705d13775f60818f1ff4f9bb35e40e09d6570af4f7ac4c80b525b445a03702ca0f3a9867a93080f90697d8be668e2abe2fe7
-
Filesize
62KB
MD56f736731137855c585ca47b3c945186f
SHA1915b156cf9d812625699675b5dd2c40b5837e474
SHA25670b888e4bf1a5b3222a3cb83e4f46e5b225a95868d92a8258da4ebd43ec5d274
SHA5126ff00922008b951a3f6635ff2bc38a78f525b17e2a58634e77928a2c29a0b1c185c04bf94a095bbf6d51840f5d1274499101fb53dffc0ee4075491a846bd6472
-
Filesize
514KB
MD55815e92687ebe087464ee1b2ec2ae9a9
SHA1051e132c8c13d0a3d2b3cbece3dc12a6f6087df2
SHA256a3554c0aa5b520fd6bafe5a51315af9fab83fc98d1a57cf24004656acb479f8f
SHA5124b389cdbd06ef8f7513214756e7fe0ebceef3e09877f41192919981b97bf7dad0bc6f94948e2ec3f4f286f0b1aca55c69d1e37f80ab2f4a2c60f8033ab1b9b76
-
Filesize
80KB
MD5d2a9beb443467eac08a7f069b8e81114
SHA17b9fca8e0c3eb8ecc874eae7b6da000980ba7c42
SHA256b7defdbb386b421f6cd4d380d051c0b7d738b89d6cba3b5b70144f40c9409e55
SHA512efeb2d0bb36f575909d6d3c44444200ff833dcbd2e98240d63a4c498c40123388001ccde741e84cf292d0875f8543dbeb174eb86149c9aa9c5ba79293d7d9ad2
-
Filesize
464KB
MD561a1aa03c0d18c8430b6852306c0e247
SHA1f42c1e70d1885c7c37cb6227862cad45c05d2c8e
SHA256b8cd0f93fddf56629646e7c9406ecae0655c1d784d5f93e35c9aae3b4aec75cb
SHA512987b2c59769f1b133366f9de509aa482abc0b71f3dab91cdde0016e858bf80a84503a1c714bf7b752e9855ee09ab7daba1859a9b525adf514e2f9c990e0f0cf3
-
Filesize
464KB
MD5358d67608b3463ea3df84efc1b85c62b
SHA1afcf9fca70cdc5092c50af54363a57ef834881b2
SHA256c4abfda1cac94b8992bf6b040cf6eadc4bfed18e97e58c252b5a6018fdb40e99
SHA51291c59ebb7c61856add11d27c2c594f3f3e6af2a1e21cbde25146b75c8ff2e8ccfb0c33a41ac136922ab687b6955243deba8ec0e8b73cc4f693c3ece28336d1b2
-
Filesize
464KB
MD51b94eb800bad21881bb80dbc0397798c
SHA1103422926f82cfb78c4c294870a0707c5b3d9a35
SHA256845e4d114293613f2aacde9d22d5e8e23ce68da06a9b4d7241b23e928ecbeaeb
SHA51255a7a3d79362fcf73942a1c6026d259ff9eefa8b1f1504c15209c68bdb410f9458a6069fc16929cce7a044797a287b77795ed2f54baa79a1a760a94e3a99c230
-
Filesize
644KB
MD58e7361df0942d80d832b2a5e3806a5f2
SHA1f62d741d2e906fc65d3c4d3f7618db799b896204
SHA256371589aabb67e814211ab2eb9f816135f67cfd2602f6678b8a11769ac3641856
SHA512e972aaf05f127bb259292553444a4489319f41e0c0a9a6bc312a306483e498ff695ed3760478d4f00a7cfbb582fe790231727c75a28525fbf38ea610bbf69fdd
-
Filesize
474KB
MD5c4f291a3172be6975ce2a0bf589d7302
SHA1a0977c53c6b2a0b04576ade046447ccce765be3c
SHA25631279cf01c39e29d5aa406d16be02d24ace1e4519628acd308435bffe289b03b
SHA51283da6957eb9ac477f74dcef8de08689e81ac57c0c44d82e2dc13a605c8b7463f938f3c798719ab30250d50c1c24fdc1db5dd272ee77a321baa0f3cc46df39da4
-
Filesize
474KB
MD5607c73d126addc28c8bd27ab7222ecea
SHA16c1d4f51042cb5c58dad78cfa00debe36f427087
SHA256770fa41486bc09e83ad60013952b57e5ea1cdbef0da03ab9e43c8480dfc985eb
SHA512a90baff6f5e66e6f09fb78da2870457336af2c7018159fd54a4872de128990096271bb79b04392581bf273b863e4433f7ec67c11922bdfde4e8d1fca780e05e4
-
Filesize
572KB
MD5f4ec77c7aba00c4f36faa08e5bc10b7a
SHA1237c90906679d2ac7780332598445867d593b59b
SHA256995a58c695f60266202a8e14d3edbb75502b060799edfa66888e6715ce8a2f16
SHA51233b31b4145a1e241df2ee564ae79a89664c95ab944cb32656cf9166fb8d1be38d31c82e1261651e7deef128888dae3c0960c913d7279ceeec1b732a068b2edd1
-
Filesize
158KB
MD5baf0b64af9fceab44942506f3af21c87
SHA1e78fb7c2db9c1b1f9949f4fcd4b23596c1372e05
SHA256581edeca339bb8c5ebc1d0193ad77f5cafa329c5a9adf8f5299b1afabed6623b
SHA512ee590e4d5ccdd1ab6131e19806ffd0c12731dd12cf7bfb562dd8f5896d84a88eb7901c6196c85a0b7d60aee28f8cfbba62f8438d501eabd1bb01ec0b4f8d8004
-
Filesize
105KB
MD5ff2d1b951cafe2a3b88a168900844303
SHA171a367f119e30c346c8b4a028ccfc8a122b0e53e
SHA256f8e20a4efb9bb32af39e3cbc414412b3b01c0442abfe214a58bc3eccfffd35b7
SHA5126a35c8ab850552b64b3fc8853079559a69a302cea6a8d44db4bcc71322995e2eb3485b02317b2115d5236be38a8a090751e55dad6a59d181b843857dad7e1690
-
Filesize
181KB
MD50fe3644c905d5547b3a855b2dc3db469
SHA180b38b7860a341f049f03bd5a61782ff7468eac7
SHA2567d5c0ed6617dbc1b78d2994a6e5bbda474b5f4814d4a34d41f844ce9a3a4eb66
SHA512e2cf9e61c290599f8f92214fae67cce23206a907c0ab27a25be5d70f05d610a326395900b8ed8ed54f9ecbddfd1b890f10280d00dbcdad72e0272d23f0db1e53
-
Filesize
217KB
MD5021c57c74de40f7c3b4fcf58a54d3649
SHA1ef363ab45b6fe3dd5b768655adc4188aadf6b6fd
SHA25604adf40ba58d0ab892091c188822191f2597bc47dab8b92423e8fc546dc437ef
SHA51277e3bbb08c661285a49a66e8090a54f535727731c44b7253ea09ffe9548bae9d120ef38a67dfa8a5d8da170dde3e9c1928b96c64dfc07b7f67f93b478937c018
-
Filesize
105KB
MD5b191834eb918c5bcaa46e594561c53c9
SHA11eab0f1c6c4e6e36c454556022e80677f1a8360e
SHA2560fa78eea190e3ae9ddb0e6cd85eb5188947ce0ba748fc6d567ade48b1fb3ae27
SHA512d16bb62290c752866a150e6b52ae9a6478d8901b194a71f5768896e311a6b5750f4d6741501d8d807ee85c09f65ef2468992a384436838b61fac5f955cdad696
-
Filesize
59KB
MD5adcde6b381a43ecb6fcd86d984adb707
SHA157176acc007b6ed896c06442ba3c4fcdea918da6
SHA2561582f7078933edd6bc39333f401be695b567e58058a353b77c3a7c03ae6a53a7
SHA512c0503fb6f35c8a30917a50f97116e0896d6e5242411200bf99ae68953d064ea08175fafe340daf5a22733a526393704afdc6d14d36b8b73e6f5fb1bf675fc570
-
Filesize
59KB
MD5e40c9b542c1bb9080d3ceb5c139f2998
SHA198b86ce27c3c680af2d3ac6d3b74fb3365f8ab27
SHA25632d2ed035fa5265d314ae56c1f358acb91b866ffe323e1b9372c25a8eca320b7
SHA5126bedef30d695bc94dade9a14bc9acf8add3d3ae838d85e538a84c565aa679eab13c08957e75d24f00b2d6a9253e38dd8ac92bd485e5329ae4671c9c706c0fe10
-
Filesize
61KB
MD5cd92b0813a483023aee21fd08c6437e7
SHA120357e84ac651801f8a98973e9d39f901156b5b6
SHA2566f37287d6956d916a4547cbc184646deafd7927ee6ae565458118c649625ba5f
SHA51201e75cc02a30d1f9f61f10e60330fc66154540e82ba087a0d904a753d585c3e2a4b206c88c62c80c5f1d92fab4c5a4f03f3971dbbbd67b85270c91db1ca3c41a
-
Filesize
60KB
MD5ddc697f426998eeac3a018faf530affa
SHA1b4ad326b004f5c2e9ec00bf4b70a7c99f58c3508
SHA2566fd850ebb8f7e68611e8c46b84e87369a6a76e74fae01da9a73f41475182e06c
SHA5120a1222f0247485d84257ca6026ef9871b0ed79673690b4b7f2470d048799d85b0f96fae5e8b13e010d4c01a4bd1849a0d135182f78a1cb3041b202236ec5cae2
-
Filesize
59KB
MD5e5cb7fd3a10e07bdf161f3f55b4590dc
SHA1e3ad9e468e1983db7932744148fe3fc064857fa1
SHA256a23e49235242eadaf376a8b69bbad88b032dd94ff91f7d24b8c2a05bbfc398ea
SHA512e88dc3725bbe30399250529a97f80f149a1051b09de113d611bd2cf1ec832f734a0ed18c582b5dc101713a3e065268bb137ca83b6aa95c0949c329136320cd3f
-
Filesize
649KB
MD5800037f773dfd06e7f57a6fdc3205ba2
SHA1391796f8274a7414bf42a93d8bcc8e312e73f255
SHA256c67f064176be02e175c15dab656dd0c8cb11ed2a904b741abf2d359e9d373a46
SHA512d7ff1c504806352669e497dfb4387cc615fa4213813e838f1bd08d595f7c67e4f827d3961987998571f17437a7b99f64e87c906224b25cf42c6a72dcbf575610
-
Filesize
277KB
MD5751155a1413f06e17c8dd6f7fa0c9fbe
SHA105eb7dfe15f2cca3b51993c2d221540322c0ce00
SHA25607433eaa534bc874ee51a9c25636a7ddb7af31a960385eb89578e8132df9e088
SHA5122bf9a909efa3f58cc2399879059c621d77fe7741ab9da5a45db9dc043ef7d317f75fb554ec30447282a572fae9d2bc6e5a3f6e2a154b8c7905259418796778e3
-
Filesize
1.7MB
MD5ae7045ec0656e9e2652f28507fe9e3cb
SHA12dd38fa881ea58e5f918a0558b986ae28a70e575
SHA256faa41ab27aebfef230873c2dea7802f83c6869d75faf8bb3d88bb4b621a6987c
SHA5123bc623353ab87bd91c82ca1c4aaa1711c99fcaedd9353d187fee65acbd9c7dbb84fb63d15b73aa9a62f3685f83bc9e7f84a3bd04e1407f8ad1cad75e33d472fa
-
Filesize
1.2MB
MD5a2f21a50b5bebf5039ecb100f17dc10a
SHA14864dcc6efee1c5ec5df86abc4c9cf14daec9dd9
SHA256ae128f4764fcabcb87cc8f45ab62ce30ec60b79e5d91550fa586de49cad16bd8
SHA512a8ccccb9d08a29bde9d88cf107dd6d4d70529971bace3389ab8e72dd76cb2958fdf2a538aca8b7aa9cf840dce53d18c251b25c84fe59b4cc8b0c0845f88e931b
-
Filesize
60KB
MD52a8f50399b9a7658ba0bdeb4fb5e1fc1
SHA1937794a01bd63e1472f393419d16da682f41c0ff
SHA25637a19919a7b4009d5870eff30ffb9580e095f2b999321701bac8bcc6de34e029
SHA5120eff3a6d2ed39fd7abbfbf3e431c1f13dc59ca1ae62e4cf28103e346c32048979df508e4a4e06484f388bd371894e66fdd8ac2797ed56aa5118aabb1d2234097
-
Filesize
179KB
MD55328c5792b577bcca618728224c7122b
SHA1cdca92197d07cdfde7c11577182dcfb1b5b39a7f
SHA25686b37b9915f056e07087dedfe7e032290ab40dd04f77621480b5ac86854ceb2b
SHA512eccbc81c5d65878086382c68d547e122de07b1ee55a5a98e8ca34bb6a151c5d9e9555c58c65f0054d018c70bc3bbc31260835f743427d423c2926fc6ab05b7e6