Analysis
-
max time kernel
66s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240903-en
General
-
Target
98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
98d129283fccf504adb59f2ff02bdf76
-
SHA1
8113b09b48cda4b933b7621915ede9ec80b4438b
-
SHA256
6e19816cb41452f85a6f40216c40140066ea8bc999d81e378dd3b5daefd26347
-
SHA512
d973ae7652aaaad55f7eadca5a640047aeeb9761995f4096e6fa7d92dc09899f9ce8e593d540b83b6471a69f015d1d81eafa94a8e8edf2b5be5bccba1c31d9d2
-
SSDEEP
98304:yfIUwCB+IqvVH1/KhodEgl5fLkA0HhkL/DR/JEL:yfIbC4Iqv1xKhGEwTkDBs/tBe
Malware Config
Extracted
nullmixer
http://watira.xyz/
Extracted
ffdroider
http://186.2.171.3
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/1164-108-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral1/memory/1164-200-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider -
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Vidar family
-
Vidar Stealer 1 IoCs
resource yara_rule behavioral1/memory/752-207-0x0000000000400000-0x0000000002CC8000-memory.dmp family_vidar -
resource yara_rule behavioral1/files/0x0007000000017472-36.dat aspack_v212_v242 behavioral1/files/0x003600000001706d-38.dat aspack_v212_v242 behavioral1/files/0x00070000000174a2-44.dat aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 2696 setup_installer.exe 2880 setup_install.exe 752 7a0a59dd28055ec3.exe 904 eb8b5374cee7.exe 2428 a56065a4b52c2c16.exe 1164 ffdebd71b3232.exe 2324 09c48f70afae1.exe 2856 b735755af543525.exe 2132 fbbf95c08c8b58.exe 484 fbbf95c08c8b58.exe -
Loads dropped DLL 50 IoCs
pid Process 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 2696 setup_installer.exe 2696 setup_installer.exe 2696 setup_installer.exe 2696 setup_installer.exe 2696 setup_installer.exe 2696 setup_installer.exe 2880 setup_install.exe 2880 setup_install.exe 2880 setup_install.exe 2880 setup_install.exe 2880 setup_install.exe 2880 setup_install.exe 2880 setup_install.exe 2880 setup_install.exe 2192 cmd.exe 2008 cmd.exe 2008 cmd.exe 752 7a0a59dd28055ec3.exe 752 7a0a59dd28055ec3.exe 2652 cmd.exe 2196 cmd.exe 836 cmd.exe 2652 cmd.exe 2196 cmd.exe 2428 a56065a4b52c2c16.exe 2428 a56065a4b52c2c16.exe 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe 1164 ffdebd71b3232.exe 1164 ffdebd71b3232.exe 2396 cmd.exe 300 cmd.exe 300 cmd.exe 2132 fbbf95c08c8b58.exe 2132 fbbf95c08c8b58.exe 2132 fbbf95c08c8b58.exe 484 fbbf95c08c8b58.exe 484 fbbf95c08c8b58.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 3068 WerFault.exe 3068 WerFault.exe 3068 WerFault.exe 3068 WerFault.exe 3068 WerFault.exe 3068 WerFault.exe 3068 WerFault.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x0005000000019259-87.dat vmprotect behavioral1/memory/1164-102-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral1/memory/1164-108-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral1/memory/1164-200-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 38 iplogger.org 39 iplogger.org 37 iplogger.org -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 7 ipinfo.io 18 api.db-ip.com 30 api.db-ip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2976 2880 WerFault.exe 31 3068 752 WerFault.exe 42 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffdebd71b3232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbbf95c08c8b58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a0a59dd28055ec3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a56065a4b52c2c16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09c48f70afae1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbbf95c08c8b58.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7a0a59dd28055ec3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 7a0a59dd28055ec3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7a0a59dd28055ec3.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe 2324 09c48f70afae1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 b735755af543525.exe Token: SeDebugPrivilege 904 eb8b5374cee7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2696 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2696 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2696 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2696 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2696 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2696 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2696 2648 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2880 2696 setup_installer.exe 31 PID 2696 wrote to memory of 2880 2696 setup_installer.exe 31 PID 2696 wrote to memory of 2880 2696 setup_installer.exe 31 PID 2696 wrote to memory of 2880 2696 setup_installer.exe 31 PID 2696 wrote to memory of 2880 2696 setup_installer.exe 31 PID 2696 wrote to memory of 2880 2696 setup_installer.exe 31 PID 2696 wrote to memory of 2880 2696 setup_installer.exe 31 PID 2880 wrote to memory of 836 2880 setup_install.exe 33 PID 2880 wrote to memory of 836 2880 setup_install.exe 33 PID 2880 wrote to memory of 836 2880 setup_install.exe 33 PID 2880 wrote to memory of 836 2880 setup_install.exe 33 PID 2880 wrote to memory of 836 2880 setup_install.exe 33 PID 2880 wrote to memory of 836 2880 setup_install.exe 33 PID 2880 wrote to memory of 836 2880 setup_install.exe 33 PID 2880 wrote to memory of 2196 2880 setup_install.exe 34 PID 2880 wrote to memory of 2196 2880 setup_install.exe 34 PID 2880 wrote to memory of 2196 2880 setup_install.exe 34 PID 2880 wrote to memory of 2196 2880 setup_install.exe 34 PID 2880 wrote to memory of 2196 2880 setup_install.exe 34 PID 2880 wrote to memory of 2196 2880 setup_install.exe 34 PID 2880 wrote to memory of 2196 2880 setup_install.exe 34 PID 2880 wrote to memory of 2120 2880 setup_install.exe 35 PID 2880 wrote to memory of 2120 2880 setup_install.exe 35 PID 2880 wrote to memory of 2120 2880 setup_install.exe 35 PID 2880 wrote to memory of 2120 2880 setup_install.exe 35 PID 2880 wrote to memory of 2120 2880 setup_install.exe 35 PID 2880 wrote to memory of 2120 2880 setup_install.exe 35 PID 2880 wrote to memory of 2120 2880 setup_install.exe 35 PID 2880 wrote to memory of 2008 2880 setup_install.exe 36 PID 2880 wrote to memory of 2008 2880 setup_install.exe 36 PID 2880 wrote to memory of 2008 2880 setup_install.exe 36 PID 2880 wrote to memory of 2008 2880 setup_install.exe 36 PID 2880 wrote to memory of 2008 2880 setup_install.exe 36 PID 2880 wrote to memory of 2008 2880 setup_install.exe 36 PID 2880 wrote to memory of 2008 2880 setup_install.exe 36 PID 2880 wrote to memory of 2396 2880 setup_install.exe 37 PID 2880 wrote to memory of 2396 2880 setup_install.exe 37 PID 2880 wrote to memory of 2396 2880 setup_install.exe 37 PID 2880 wrote to memory of 2396 2880 setup_install.exe 37 PID 2880 wrote to memory of 2396 2880 setup_install.exe 37 PID 2880 wrote to memory of 2396 2880 setup_install.exe 37 PID 2880 wrote to memory of 2396 2880 setup_install.exe 37 PID 2880 wrote to memory of 2192 2880 setup_install.exe 38 PID 2880 wrote to memory of 2192 2880 setup_install.exe 38 PID 2880 wrote to memory of 2192 2880 setup_install.exe 38 PID 2880 wrote to memory of 2192 2880 setup_install.exe 38 PID 2880 wrote to memory of 2192 2880 setup_install.exe 38 PID 2880 wrote to memory of 2192 2880 setup_install.exe 38 PID 2880 wrote to memory of 2192 2880 setup_install.exe 38 PID 2880 wrote to memory of 2652 2880 setup_install.exe 39 PID 2880 wrote to memory of 2652 2880 setup_install.exe 39 PID 2880 wrote to memory of 2652 2880 setup_install.exe 39 PID 2880 wrote to memory of 2652 2880 setup_install.exe 39 PID 2880 wrote to memory of 2652 2880 setup_install.exe 39 PID 2880 wrote to memory of 2652 2880 setup_install.exe 39 PID 2880 wrote to memory of 2652 2880 setup_install.exe 39 PID 2192 wrote to memory of 904 2192 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 09c48f70afae1.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:836 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\09c48f70afae1.exe09c48f70afae1.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ffdebd71b3232.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\ffdebd71b3232.exeffdebd71b3232.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME44.exe4⤵
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 7a0a59dd28055ec3.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\7a0a59dd28055ec3.exe7a0a59dd28055ec3.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 9446⤵
- Loads dropped DLL
- Program crash
PID:3068
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c b735755af543525.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\b735755af543525.exeb735755af543525.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c eb8b5374cee7.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\eb8b5374cee7.exeeb8b5374cee7.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c a56065a4b52c2c16.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\a56065a4b52c2c16.exea56065a4b52c2c16.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c fbbf95c08c8b58.exe4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:300 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\fbbf95c08c8b58.exefbbf95c08c8b58.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\fbbf95c08c8b58.exe"C:\Users\Admin\AppData\Local\Temp\7zS88AC1E37\fbbf95c08c8b58.exe" -a6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2880 -s 4164⤵
- Loads dropped DLL
- Program crash
PID:2976
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD50965da18bfbf19bafb1c414882e19081
SHA1e4556bac206f74d3a3d3f637e594507c30707240
SHA2561cdddf182f161ab789edfcc68a0706d0b8412a9ba67a3f918fe60fab270eabff
SHA512fe4702a2fde36b4fb0015ad7d3e2169a1ccbf5e29d7edef40f104ed47661b4b0365b13b1913e9f4e0ab7bc9ac542ee86c02a802a13567dfd0b8f5485a5be829b
-
Filesize
582KB
MD578e8acd24692dbfac7f20fd60fe5dfbd
SHA1d9c1f3b4ccceaa21897c57d8f343c0b3b19c88ca
SHA25623e2a056155948a0f8dee4ff30f0336fe7aa1922be58010acc88fbec64c3e822
SHA512f0476b350ac6813a3a1f18c2a2366c09f1faf5f2475bcacc95fe3c545fd378879deba98ae12ab43035de22c524bd5a76f4a704de42f7572d41a7d4e8109315e7
-
Filesize
214KB
MD58cd6a0f9c54968b2003415a62a6ce8b7
SHA1ea5bacbba4ebceacf4f7c547fc840d03fb8654f7
SHA25661167f2be099b7bf668e25a470119adfa0c409c2e5c059ad1a016c14dd168f3f
SHA512b7a988cf8218a3ff0c13cd58953b4e4b7e4b641d18380bb03a37aa39628d336adac80c8d6d526389d8b2197228813c4b12593fdc5514f633cee0ee856f3ec915
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
1.2MB
MD59b55bffb97ebd2c51834c415982957b4
SHA1728262abdfc4f0e8a84eb3b5cd2be9ea9d0acc16
SHA256a62cee3d2610ed0f693179838803e5c60dcd4f68028c60f5761b90c750125e11
SHA5124fa9d641aba15fd07a0711530ab1f1a4e8dbafe03e1ab71845bcdcd0a1efa9e59a05915834c5c717beada659dd5ee459aa7e08b4b0acc8f867ace07430eb11f2
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
165KB
MD5181f1849ccb484af2eebb90894706150
SHA145dee946a7abc9c1c05d158a05e768e06a0d2cdc
SHA256aeb2d203b415b00e0a23aa026862cec8e11962fdb99c6dce38fb0b018b7d8409
SHA512a87485005ca80e145a7b734735184fa2d374a7f02e591eec9e51b77dc2a51be7f8198ce5abfceb9546c48bf235a555f19d6c57469975d0b4c786b0db16df930c
-
Filesize
8KB
MD583cc20c8d4dd098313434b405648ebfd
SHA159b99c73776d555a985b2f2dcc38b826933766b3
SHA256908b275d6fc2f20e9d04e8609a9d994f7e88a429c3eb0a55d99ca1c681e17ec8
SHA512e00009e1f322a1fe6e24f88a1cc722acf3094569174e7c58ebf06f75f50a7735dcebf3e493886bbdc87593345adc8bb7b6f2daca2e64618f276075a0bb46bb8c
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
5.9MB
MD5d0c0ed74cb8878f734ad674f4c6f6430
SHA1b18eaaaf110caa25c101b86fd088e700fc5eec9b
SHA2560125d17f17f3cf5b115c1202de3931b3082ca56d2d473447e4dac039c53b517b
SHA51242a3ce63865b3f8b417bc48bdabc68a9436b11cc3574aff4d8c91b8ec7b7ed34b7e11d7b7ae35f01ad40fe1c1b5616773c3fdbd59e9fb68ace3d1493c62c56d5
-
Filesize
3.3MB
MD589086cb8af781cacdb7f54885b9f3c93
SHA190dd7b1f35b151efa68e691212a9fdd72188faef
SHA2561c8fd4b23994f2dbffb0f51debe3551b796ab2bc280242c325de14d650ecb227
SHA512d7b2d92536a6bfabc80f3b12284df5969e3b4f3d47c6c44e0b7702a043915e31914161be9b76f2d9db88ca47788eaa6522f6d1475b4b15a9d7c68379b041037f