Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 15:54
Behavioral task
behavioral1
Sample
7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe
-
Size
7.7MB
-
MD5
7457af1d80e0d74da2055e2581f163ec
-
SHA1
a46d4af450632ae233b8057b2753ae0ec0098d51
-
SHA256
c46ce63fee99ef6ee8eae245a5cb958dc8806c0d9cd73377402820712c398002
-
SHA512
569ad807df437bd37aabbcc5d0a27172d70579df90cee6f33bffeea0a8c5efd7a35ce433bd2c8af08448bf8eeb9e01a395729efc65bfd91306b19bf7457465a0
-
SSDEEP
196608:n1Kkhg1USVxwhzav1yo31CPwDv3uFZjeg2EeJUO9WLQkDxtw3iFFrS6XOfTV73c:1KkJ0xwZ6v1CPwDv3uFteg2EeJUO9WL2
Malware Config
Extracted
bitrat
1.33
eh3garw7zufw7d4ug22f5t6vp7ex5ivmw54ox5yxe4habthtq6zs7wid.onion:80
-
communication_password
e084daa1b3c6a01378ac0b9e5889beef
-
install_dir
excelupdater
-
install_file
excel.exe
-
tor_process
toronion
Signatures
-
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000c000000023a94-18.dat acprotect behavioral2/files/0x000b000000023b70-19.dat acprotect behavioral2/files/0x000a000000023b74-20.dat acprotect behavioral2/files/0x000a000000023b73-25.dat acprotect behavioral2/files/0x000a000000023b76-29.dat acprotect behavioral2/files/0x000a000000023b78-28.dat acprotect behavioral2/files/0x000a000000023b75-24.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe -
Executes dropped EXE 5 IoCs
pid Process 2436 toronion.exe 2344 toronion.exe 3096 toronion.exe 2904 toronion.exe 3232 toronion.exe -
Loads dropped DLL 36 IoCs
pid Process 2436 toronion.exe 2436 toronion.exe 2436 toronion.exe 2436 toronion.exe 2436 toronion.exe 2436 toronion.exe 2436 toronion.exe 2436 toronion.exe 2344 toronion.exe 2344 toronion.exe 2344 toronion.exe 2344 toronion.exe 2344 toronion.exe 2344 toronion.exe 2344 toronion.exe 3096 toronion.exe 3096 toronion.exe 3096 toronion.exe 3096 toronion.exe 3096 toronion.exe 3096 toronion.exe 3096 toronion.exe 2904 toronion.exe 2904 toronion.exe 2904 toronion.exe 2904 toronion.exe 2904 toronion.exe 2904 toronion.exe 2904 toronion.exe 3232 toronion.exe 3232 toronion.exe 3232 toronion.exe 3232 toronion.exe 3232 toronion.exe 3232 toronion.exe 3232 toronion.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\excel = "C:\\Users\\Admin\\AppData\\Local\\excelupdater\\excel.exe" 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 40 myexternalip.com 59 myexternalip.com 76 myexternalip.com 86 myexternalip.com 103 myexternalip.com 39 myexternalip.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe -
resource yara_rule behavioral2/files/0x000a000000023b77-14.dat upx behavioral2/files/0x000c000000023a94-18.dat upx behavioral2/files/0x000b000000023b70-19.dat upx behavioral2/files/0x000a000000023b74-20.dat upx behavioral2/files/0x000a000000023b73-25.dat upx behavioral2/files/0x000a000000023b76-29.dat upx behavioral2/memory/2436-37-0x0000000074010000-0x0000000074098000-memory.dmp upx behavioral2/memory/2436-38-0x0000000073F00000-0x000000007400A000-memory.dmp upx behavioral2/memory/2436-36-0x00000000740A0000-0x00000000740C4000-memory.dmp upx behavioral2/memory/2436-35-0x00000000740D0000-0x000000007419E000-memory.dmp upx behavioral2/memory/2436-34-0x00000000741A0000-0x00000000741E9000-memory.dmp upx behavioral2/memory/2436-33-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/files/0x000a000000023b78-28.dat upx behavioral2/files/0x000a000000023b75-24.dat upx behavioral2/memory/2436-43-0x0000000073C30000-0x0000000073EFF000-memory.dmp upx behavioral2/memory/2436-44-0x00000000741F0000-0x00000000742B8000-memory.dmp upx behavioral2/memory/2436-75-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2436-76-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2436-85-0x00000000740A0000-0x00000000740C4000-memory.dmp upx behavioral2/memory/2436-84-0x00000000740D0000-0x000000007419E000-memory.dmp upx behavioral2/memory/2436-96-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2436-108-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2436-125-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2344-141-0x0000000073C30000-0x0000000073CB8000-memory.dmp upx behavioral2/memory/2344-140-0x0000000073CC0000-0x0000000073DCA000-memory.dmp upx behavioral2/memory/2344-139-0x0000000073DD0000-0x0000000073DF4000-memory.dmp upx behavioral2/memory/2344-138-0x0000000073E00000-0x0000000073E49000-memory.dmp upx behavioral2/memory/2344-137-0x0000000073E50000-0x0000000073F1E000-memory.dmp upx behavioral2/memory/2344-136-0x0000000073F20000-0x0000000073FE8000-memory.dmp upx behavioral2/memory/2344-135-0x0000000073FF0000-0x00000000742BF000-memory.dmp upx behavioral2/memory/2344-134-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2344-154-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2344-157-0x0000000073E50000-0x0000000073F1E000-memory.dmp upx behavioral2/memory/2344-156-0x0000000073F20000-0x0000000073FE8000-memory.dmp upx behavioral2/memory/2344-155-0x0000000073FF0000-0x00000000742BF000-memory.dmp upx behavioral2/memory/2344-158-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2344-167-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2344-179-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2344-197-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/3096-212-0x0000000073FF0000-0x00000000742BF000-memory.dmp upx behavioral2/memory/3096-211-0x0000000073C30000-0x0000000073CB8000-memory.dmp upx behavioral2/memory/3096-210-0x0000000073CC0000-0x0000000073DCA000-memory.dmp upx behavioral2/memory/3096-209-0x0000000073DD0000-0x0000000073DF4000-memory.dmp upx behavioral2/memory/3096-208-0x0000000073E00000-0x0000000073E49000-memory.dmp upx behavioral2/memory/3096-207-0x0000000073E50000-0x0000000073F1E000-memory.dmp upx behavioral2/memory/3096-206-0x0000000073F20000-0x0000000073FE8000-memory.dmp upx behavioral2/memory/3096-220-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/3096-221-0x0000000073F20000-0x0000000073FE8000-memory.dmp upx behavioral2/memory/3096-222-0x0000000073E50000-0x0000000073F1E000-memory.dmp upx behavioral2/memory/3096-224-0x0000000073CC0000-0x0000000073DCA000-memory.dmp upx behavioral2/memory/3096-223-0x0000000073DD0000-0x0000000073DF4000-memory.dmp upx behavioral2/memory/3096-233-0x0000000073FF0000-0x00000000742BF000-memory.dmp upx behavioral2/memory/3096-264-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2904-276-0x0000000073E50000-0x0000000073F1E000-memory.dmp upx behavioral2/memory/2904-280-0x0000000073C30000-0x0000000073CB8000-memory.dmp upx behavioral2/memory/2904-279-0x0000000073CC0000-0x0000000073DCA000-memory.dmp upx behavioral2/memory/2904-278-0x0000000073DD0000-0x0000000073DF4000-memory.dmp upx behavioral2/memory/2904-277-0x0000000073E00000-0x0000000073E49000-memory.dmp upx behavioral2/memory/2904-275-0x0000000073F20000-0x0000000073FE8000-memory.dmp upx behavioral2/memory/2904-274-0x0000000073FF0000-0x00000000742BF000-memory.dmp upx behavioral2/memory/2904-273-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2904-286-0x0000000000B90000-0x0000000000F94000-memory.dmp upx behavioral2/memory/2904-289-0x0000000073E50000-0x0000000073F1E000-memory.dmp upx behavioral2/memory/2904-288-0x0000000073F20000-0x0000000073FE8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toronion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toronion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toronion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toronion.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language toronion.exe -
Suspicious behavior: RenamesItself 28 IoCs
pid Process 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4340 wrote to memory of 2436 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 91 PID 4340 wrote to memory of 2436 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 91 PID 4340 wrote to memory of 2436 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 91 PID 4340 wrote to memory of 2344 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 103 PID 4340 wrote to memory of 2344 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 103 PID 4340 wrote to memory of 2344 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 103 PID 4340 wrote to memory of 3096 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 106 PID 4340 wrote to memory of 3096 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 106 PID 4340 wrote to memory of 3096 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 106 PID 4340 wrote to memory of 2904 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 112 PID 4340 wrote to memory of 2904 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 112 PID 4340 wrote to memory of 2904 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 112 PID 4340 wrote to memory of 3232 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 116 PID 4340 wrote to memory of 3232 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 116 PID 4340 wrote to memory of 3232 4340 7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7457af1d80e0d74da2055e2581f163ec_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe"C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe"C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe"C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe"C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2904
-
-
C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe"C:\Users\Admin\AppData\Local\b164bc43\tor\toronion.exe" -f torrc2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD54d0b61cce1248977f55cf33a9b968b54
SHA16079e751d78fee0f7c9c93a27ab794c109b7a69e
SHA256392b96112da7f0f79e146093f4b7b6d2c1b70c70ab989b12e6657ed7aca0f546
SHA512d4e21e79c55a8f8183854cb7e45a455801183ed46fc5261ae502d85ab53d626c0145c2dc0bec7eec7516a0016a7d28fc8e6f0bca735d0f200ef5b91a30af3890
-
Filesize
2.8MB
MD5da79709f0b77feb982ce75719bc139a9
SHA1b3ee45aaecfcea77959c844324dd209d847676d0
SHA2563a561141e836952d81962c01503139213903e614796bdfd7511647f59d40eaa2
SHA5122c5900580093e8e717405f8c47d5238f75efbaf68facddf9c5422bae98e7e5f70ac2f174dce492b416225b64125f3f43c695a8bfdc98a677923fda7e942afbb3
-
Filesize
20.2MB
MD5d7a2487df356f61cb46a471e261c23ae
SHA17471963e02a3f0bcc8ead6acfb809f8263c26982
SHA256abd4d01c81fd22120b7de955ff4f69ff2b86b574df50ac31748f2a5e38e64e0e
SHA5129adf3265bf90cc89e03c48151e206ae6e013f829fed83674ffdb1cbf199b14468c0904bdfbd3fdb8626e01edadf3dcc42689891891fd752ef08be06c89b05732
-
Filesize
20.2MB
MD531670f0d66230ee76ea3a19bafd07913
SHA16f8b2d8fc3eca0682a321f85189c1c21159f683e
SHA2565f1bfc298b3fea9c0d60072aa1d4b3a3a89326f1daae8574fc8a72913ae606bf
SHA512bf10d8c8e2af0b833424bedf6bc13b758786bc21c79ad3f05e4a9a0c37500c3a8ab955fc4b634a8885b8f060d038cef9486f89fc4d3e6fb8314a9128b5245401
-
Filesize
8.0MB
MD54af594e44c38c06fcf35b348831c31e5
SHA14fddfc4b634d939c04cefbddc9d558c008eeee41
SHA256ada78f17b6babecaf2cb8e75fdb28b51588dbbacf2ae9bb203788e9e4366839f
SHA512c3f1175fdaa37ecc479e0ecff3771f5e7794d0cca0c70f160e09b3a21026a8dd7887602efe65861f4f079673169e91c3014f0415f55450d2635fed6af50970c7
-
Filesize
9KB
MD5df1929f029b4e56fc586e7ef9747c36c
SHA10387d4a6a4366abbbfe143447d104fdfe98b287a
SHA25622f3951414c1ca10eb679bfe2b9e0336e4b3430f9f2938b3352c33b66437b374
SHA5129cf8f1e13239ea7613911d56f1616385498531f75e92bf661fb80c9bb8e3428b27185de68fc75814a2856ff587073116e141ea0c15968ac63544d27372cbb528
-
Filesize
9KB
MD5c235589d50d0d4914ba9e0a447cea675
SHA1f28a7090c405bb46819681b4461e0f7bed7145c8
SHA256b1b500b8c6284d9aaaadec4f5da3d54744284b8f2c357051b90217b1b1798b7d
SHA512f9039c8b7ccb0d8a5c0a07917d39d0c0d63914a22dd9134e30da82b08a0a2a979553e7408a0352a5b4d0123c1448105cd96ea4e2166b9f9ddb5682f012912211
-
Filesize
9KB
MD523fd5cc1b52fb4c76f497bcc2965ca17
SHA1ac86f53d3de468502c84659f4c3cb91e6bd21ef8
SHA2560117d97f5d34a0a3699e81308a671a92fcf8b9c5f86b9a7d859e1b0b4f68d8fa
SHA51223190693b348d03d3dece22892a93a9025c317b093f299058c4b5bc0f250df717144e0b7b17662b483252237341901975d9116d4fd00149f407c6d5c39c829cc
-
Filesize
9KB
MD560388e26b6ffcd2b38b2b6b08f5af992
SHA1fb90ce43cae20ceb2fa677daa260a82276647e84
SHA256c4c05281742de183f1faf6561a57627281eb94759c400514b64eda9c9a894f12
SHA512d3c36ccb5f35775d63c6e411eecb63e9860ed9a43bc950176953ab61f4360c029586f92ccef825aaf30792282509b3939b74427c81b6558eb607bd740b9e2e5b
-
Filesize
1.7MB
MD52384a02c4a1f7ec481adde3a020607d3
SHA17e848d35a10bf9296c8fa41956a3daa777f86365
SHA256c8db0ff0f7047ed91b057005e86ad3a23eae616253313aa047c560d9eb398369
SHA5121ac74dd2d863acd7415ef8b9490a5342865462fbabdad0645da22424b0d56f5e9c389a3d7c41386f2414d6c4715c79a6ddecb6e6cff29e98319e1fd1060f4503
-
Filesize
366KB
MD5099983c13bade9554a3c17484e5481f1
SHA1a84e69ad9722f999252d59d0ed9a99901a60e564
SHA256b65f9aa0c7912af64bd9b05e9322e994339a11b0c8907e6a6166d7b814bda838
SHA51289f1a963de77873296395662d4150e3eff7a2d297fb9ec54ec06aa2e40d41e5f4fc4611e9bc34126d760c9134f2907fea3bebdf2fbbd7eaddad99f8e4be1f5e2
-
Filesize
286KB
MD5b0d98f7157d972190fe0759d4368d320
SHA15715a533621a2b642aad9616e603c6907d80efc4
SHA2562922193133dabab5b82088d4e87484e2fac75e9e0c765dacaf22eb5f4f18b0c5
SHA51241ce56c428158533bf8b8ffe0a71875b5a3abc549b88d7d3e69acc6080653abea344d6d66fff39c04bf019fcaa295768d620377d85a933ddaf17f3d90df29496
-
Filesize
439KB
MD5c88826ac4bb879622e43ead5bdb95aeb
SHA187d29853649a86f0463bfd9ad887b85eedc21723
SHA256c4d898b1a4285a45153af9ed88d79aa2a073dcb7225961b6b276b532b4d18b6f
SHA512f733041ef35b9b8058fbcf98faa0d1fea5c0858fea941ecebbe9f083cd73e3e66323afffd8d734097fcdd5e6e59db4d94f51fca5874edbcd2a382d9ba6cd97b3
-
Filesize
88KB
MD52c916456f503075f746c6ea649cf9539
SHA1fa1afc1f3d728c89b2e90e14ca7d88b599580a9d
SHA256cbb5236d923d4f4baf2f0d2797c72a2cbae42ef7ac0acce786daf5fdc5b456e6
SHA5121c1995e1aa7c33c597c64122395275861d9219e46d45277d4f1768a2e06227b353d5d77d6b7cb655082dc6fb9736ad6f7cfcc0c90e02776e27d50857e792e3fd
-
Filesize
188KB
MD5d407cc6d79a08039a6f4b50539e560b8
SHA121171adbc176dc19aaa5e595cd2cd4bd1dfd0c71
SHA25692cfd0277c8781a15a0f17b7aee6cff69631b9606a001101631f04b3381efc4e
SHA512378a10fed915591445d97c6d04e82d28008d8ea65e0e40c142b8ee59867035d561d4e103495c8f0d9c19b51597706ce0b450c25516aa0f1744579ffcd097ae0c
-
Filesize
973KB
MD55cfe61ff895c7daa889708665ef05d7b
SHA15e58efe30406243fbd58d4968b0492ddeef145f2
SHA256f9c1d18b50ce7484bf212cb61a9035602cfb90ebdfe66a077b9f6df73196a9f5
SHA51243b6f10391a863a21f70e05cee41900729c7543750e118ff5d74c0cac3d1383f10bcb73eade2a28b555a393cada4795e204246129b01ad9177d1167827dd68da
-
Filesize
139B
MD5bf7a3f5ee30563299f2068e612c746cd
SHA12906c6a83dbabd61275f557f7e19e644a6c96b44
SHA256ab1ccab8d2096d974e38f86e78203a5c6546a6102b69aa6e511e6a3bdfb2ff7f
SHA5127c366336b9ed2f144e2dc4168924e0abaaa11b08afa687fb09c0f6602988fc76ba1e35a337617d3688482d6c10aab5edbc229b41a0cb43c5ecfe03cc7aca3ae0
-
Filesize
52KB
MD5add33041af894b67fe34e1dc819b7eb6
SHA16db46eb021855a587c95479422adcc774a272eeb
SHA2568688bd7ca55dcc0c23c429762776a0a43fe5b0332dfd5b79ef74e55d4bbc1183
SHA512bafc441198d03f0e7fe804bab89283c389d38884d0f87d81b11950a9b79fcbf7b32be4bb16f4fcd9179b66f865c563c172a46b4514a6087ef0af64425a4b2cfa