Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_installer.exe
Resource
win7-20240903-en
General
-
Target
98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe
-
Size
3.3MB
-
MD5
98d129283fccf504adb59f2ff02bdf76
-
SHA1
8113b09b48cda4b933b7621915ede9ec80b4438b
-
SHA256
6e19816cb41452f85a6f40216c40140066ea8bc999d81e378dd3b5daefd26347
-
SHA512
d973ae7652aaaad55f7eadca5a640047aeeb9761995f4096e6fa7d92dc09899f9ce8e593d540b83b6471a69f015d1d81eafa94a8e8edf2b5be5bccba1c31d9d2
-
SSDEEP
98304:yfIUwCB+IqvVH1/KhodEgl5fLkA0HhkL/DR/JEL:yfIbC4Iqv1xKhGEwTkDBs/tBe
Malware Config
Extracted
ffdroider
http://186.2.171.3
Extracted
nullmixer
http://watira.xyz/
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral2/memory/1940-98-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider behavioral2/memory/1940-629-0x0000000000400000-0x0000000000759000-memory.dmp family_ffdroider -
Ffdroider family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
resource yara_rule behavioral2/files/0x0007000000023c92-33.dat aspack_v212_v242 behavioral2/files/0x0007000000023c94-41.dat aspack_v212_v242 behavioral2/files/0x0008000000023c8e-35.dat aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation fbbf95c08c8b58.exe -
Executes dropped EXE 10 IoCs
pid Process 1484 setup_installer.exe 5016 setup_install.exe 3668 09c48f70afae1.exe 2264 b735755af543525.exe 4808 fbbf95c08c8b58.exe 2792 a56065a4b52c2c16.exe 1940 ffdebd71b3232.exe 4524 eb8b5374cee7.exe 1480 7a0a59dd28055ec3.exe 4376 fbbf95c08c8b58.exe -
Loads dropped DLL 8 IoCs
pid Process 5016 setup_install.exe 5016 setup_install.exe 5016 setup_install.exe 5016 setup_install.exe 5016 setup_install.exe 5016 setup_install.exe 5016 setup_install.exe 5016 setup_install.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1940-97-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral2/memory/1940-98-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect behavioral2/files/0x0007000000023c9a-87.dat vmprotect behavioral2/memory/1940-629-0x0000000000400000-0x0000000000759000-memory.dmp vmprotect -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ffdebd71b3232.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 29 iplogger.org 17 iplogger.org 18 iplogger.org -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ipinfo.io 10 ipinfo.io 36 api.db-ip.com 37 api.db-ip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3092 5016 WerFault.exe 84 212 2792 WerFault.exe 4432 1480 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbbf95c08c8b58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09c48f70afae1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a56065a4b52c2c16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbbf95c08c8b58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a0a59dd28055ec3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffdebd71b3232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a56065a4b52c2c16.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a56065a4b52c2c16.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI a56065a4b52c2c16.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe 3668 09c48f70afae1.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4524 eb8b5374cee7.exe Token: SeDebugPrivilege 2264 b735755af543525.exe Token: SeManageVolumePrivilege 1940 ffdebd71b3232.exe Token: SeManageVolumePrivilege 1940 ffdebd71b3232.exe Token: SeManageVolumePrivilege 1940 ffdebd71b3232.exe Token: SeManageVolumePrivilege 1940 ffdebd71b3232.exe Token: SeManageVolumePrivilege 1940 ffdebd71b3232.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1484 1676 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 83 PID 1676 wrote to memory of 1484 1676 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 83 PID 1676 wrote to memory of 1484 1676 98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe 83 PID 1484 wrote to memory of 5016 1484 setup_installer.exe 84 PID 1484 wrote to memory of 5016 1484 setup_installer.exe 84 PID 1484 wrote to memory of 5016 1484 setup_installer.exe 84 PID 5016 wrote to memory of 4092 5016 setup_install.exe 87 PID 5016 wrote to memory of 4092 5016 setup_install.exe 87 PID 5016 wrote to memory of 4092 5016 setup_install.exe 87 PID 5016 wrote to memory of 2748 5016 setup_install.exe 88 PID 5016 wrote to memory of 2748 5016 setup_install.exe 88 PID 5016 wrote to memory of 2748 5016 setup_install.exe 88 PID 5016 wrote to memory of 4752 5016 setup_install.exe 89 PID 5016 wrote to memory of 4752 5016 setup_install.exe 89 PID 5016 wrote to memory of 4752 5016 setup_install.exe 89 PID 5016 wrote to memory of 2800 5016 setup_install.exe 90 PID 5016 wrote to memory of 2800 5016 setup_install.exe 90 PID 5016 wrote to memory of 2800 5016 setup_install.exe 90 PID 5016 wrote to memory of 2940 5016 setup_install.exe 91 PID 5016 wrote to memory of 2940 5016 setup_install.exe 91 PID 5016 wrote to memory of 2940 5016 setup_install.exe 91 PID 5016 wrote to memory of 2284 5016 setup_install.exe 92 PID 5016 wrote to memory of 2284 5016 setup_install.exe 92 PID 5016 wrote to memory of 2284 5016 setup_install.exe 92 PID 5016 wrote to memory of 232 5016 setup_install.exe 93 PID 5016 wrote to memory of 232 5016 setup_install.exe 93 PID 5016 wrote to memory of 232 5016 setup_install.exe 93 PID 5016 wrote to memory of 1420 5016 setup_install.exe 94 PID 5016 wrote to memory of 1420 5016 setup_install.exe 94 PID 5016 wrote to memory of 1420 5016 setup_install.exe 94 PID 4092 wrote to memory of 3668 4092 cmd.exe 95 PID 4092 wrote to memory of 3668 4092 cmd.exe 95 PID 4092 wrote to memory of 3668 4092 cmd.exe 95 PID 2940 wrote to memory of 2264 2940 cmd.exe 96 PID 2940 wrote to memory of 2264 2940 cmd.exe 96 PID 1420 wrote to memory of 4808 1420 cmd.exe 98 PID 1420 wrote to memory of 4808 1420 cmd.exe 98 PID 1420 wrote to memory of 4808 1420 cmd.exe 98 PID 2800 wrote to memory of 1480 2800 cmd.exe 97 PID 2800 wrote to memory of 1480 2800 cmd.exe 97 PID 2800 wrote to memory of 1480 2800 cmd.exe 97 PID 232 wrote to memory of 2792 232 cmd.exe 99 PID 232 wrote to memory of 2792 232 cmd.exe 99 PID 232 wrote to memory of 2792 232 cmd.exe 99 PID 2748 wrote to memory of 1940 2748 cmd.exe 100 PID 2748 wrote to memory of 1940 2748 cmd.exe 100 PID 2748 wrote to memory of 1940 2748 cmd.exe 100 PID 2284 wrote to memory of 4524 2284 cmd.exe 101 PID 2284 wrote to memory of 4524 2284 cmd.exe 101 PID 4808 wrote to memory of 4376 4808 fbbf95c08c8b58.exe 106 PID 4808 wrote to memory of 4376 4808 fbbf95c08c8b58.exe 106 PID 4808 wrote to memory of 4376 4808 fbbf95c08c8b58.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98d129283fccf504adb59f2ff02bdf76_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 09c48f70afae1.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\09c48f70afae1.exe09c48f70afae1.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ffdebd71b3232.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\ffdebd71b3232.exeffdebd71b3232.exe5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c APPNAME44.exe4⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 7a0a59dd28055ec3.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\7a0a59dd28055ec3.exe7a0a59dd28055ec3.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 15646⤵
- Program crash
PID:4432
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c b735755af543525.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\b735755af543525.exeb735755af543525.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c eb8b5374cee7.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\eb8b5374cee7.exeeb8b5374cee7.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c a56065a4b52c2c16.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\a56065a4b52c2c16.exea56065a4b52c2c16.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 3566⤵
- Program crash
PID:212
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c fbbf95c08c8b58.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\fbbf95c08c8b58.exefbbf95c08c8b58.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\fbbf95c08c8b58.exe"C:\Users\Admin\AppData\Local\Temp\7zSCC5196F7\fbbf95c08c8b58.exe" -a6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4376
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 5684⤵
- Program crash
PID:3092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5016 -ip 50161⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2792 -ip 27921⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1480 -ip 14801⤵PID:4852
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD50965da18bfbf19bafb1c414882e19081
SHA1e4556bac206f74d3a3d3f637e594507c30707240
SHA2561cdddf182f161ab789edfcc68a0706d0b8412a9ba67a3f918fe60fab270eabff
SHA512fe4702a2fde36b4fb0015ad7d3e2169a1ccbf5e29d7edef40f104ed47661b4b0365b13b1913e9f4e0ab7bc9ac542ee86c02a802a13567dfd0b8f5485a5be829b
-
Filesize
582KB
MD578e8acd24692dbfac7f20fd60fe5dfbd
SHA1d9c1f3b4ccceaa21897c57d8f343c0b3b19c88ca
SHA25623e2a056155948a0f8dee4ff30f0336fe7aa1922be58010acc88fbec64c3e822
SHA512f0476b350ac6813a3a1f18c2a2366c09f1faf5f2475bcacc95fe3c545fd378879deba98ae12ab43035de22c524bd5a76f4a704de42f7572d41a7d4e8109315e7
-
Filesize
214KB
MD58cd6a0f9c54968b2003415a62a6ce8b7
SHA1ea5bacbba4ebceacf4f7c547fc840d03fb8654f7
SHA25661167f2be099b7bf668e25a470119adfa0c409c2e5c059ad1a016c14dd168f3f
SHA512b7a988cf8218a3ff0c13cd58953b4e4b7e4b641d18380bb03a37aa39628d336adac80c8d6d526389d8b2197228813c4b12593fdc5514f633cee0ee856f3ec915
-
Filesize
165KB
MD5181f1849ccb484af2eebb90894706150
SHA145dee946a7abc9c1c05d158a05e768e06a0d2cdc
SHA256aeb2d203b415b00e0a23aa026862cec8e11962fdb99c6dce38fb0b018b7d8409
SHA512a87485005ca80e145a7b734735184fa2d374a7f02e591eec9e51b77dc2a51be7f8198ce5abfceb9546c48bf235a555f19d6c57469975d0b4c786b0db16df930c
-
Filesize
14.0MB
MD525f5d1a3f1bab6cacb86d662e4991f3d
SHA112723dbe0ef5d0436a1eb8e4f1df87fe8f15ae8a
SHA25635d87bfd2b4ff1f2e4d7aac2800a34ca1051f68acd20790c32a1748917db17b0
SHA51234e11cbff8c11cc5fa7daab0a3e6553c943d77758fd52d37c7d92dfb0d13d6eceb8d4325fe86a0cb69c65ee01d9ad16e46c310e3ea5a0208c1bcf7e5716c0195
-
Filesize
49KB
MD5ff381cbc438e22f749152b5e2d131174
SHA10ad4fff4ae0e8a7641db98667fb282aaf3d4f744
SHA256f9ccf66bb453f40722751c45f50bf220b82fee45e79dc306ad1ecd816ea885eb
SHA5120f2abffe39651e7f49eaec7fd3f278d47d20b6e8d5730aa6edc0047a16dcdcfc61ec3c5daaa65320123666eb5e686a002643c6a14c06a8d85b9c698010719f94
-
Filesize
16KB
MD51289b74bb0028d1dad066f707d455705
SHA1c59c52f566cd17d4475a2c364f027a0e8790cb02
SHA256618e099730f6aab78397040bb07fbc283c90ca8df827251b858cbec95d8057e0
SHA5128504615840a4cd8620790c4705fb7fad4b6451a115e35c1bc83149d05412fafad0ecea1634fe1ffbbc7d7374ecaa18ba47184636cff96a8e2f46deaba9ec1768
-
Filesize
16KB
MD502fceb97b0de222052676faf9428fd88
SHA1cc6752df760a00fea750e167acae64e96bb5108a
SHA256a63996a8cb96778ffb1059a2704c2ed51103fcee4825fcd80cdab26322aa8c73
SHA51272f3dd4cf1d701ce1e1572f4eddb4a022c8605654eecf5a6ef3597cc34f22f722299d8d35e36132609816fe09e8ffb32fd2477ecd235c9102e8907d8bf38726f
-
Filesize
16KB
MD55b848f316700af46dd21e5ed36784518
SHA1f79cd0137a3a41ece0c96d2a8566e83b787d6bff
SHA2566c23f9ccefad64f38e8aa021a389ed6092543aee9bb61c725a066b27b111743f
SHA5121abfc88db513dbb2f6733c45e82847499931a0eb1e52241de19ad47b1938d2defe9cb504907b3ce0e59d05d33b18ca9e92616b0b9e7a6d997d4e9c268964cf9a
-
Filesize
16KB
MD5b1109994adef74cc27cd17b5cb7b6def
SHA1db96c3e5e4b674d147ee10b1129b84662521bd33
SHA2561f344c658c55c0ccd808f03f12e20f719aaeb235d9f9811036a5f18b87c02193
SHA512f5a4c3597cb71eb3b42993a955ce949eed0ad51253b8f1511d1e04b0abfff74ff0d0a6ed8000009d601c45ad2e5eb517af6ef3d457367f846684924152c383f7
-
Filesize
16KB
MD5187f0250f806fa1f3e61625f49212e8e
SHA1057ea7b1d0734b000479ff6913821b22b2e8344e
SHA2560c2df31f8c330c9152bc3627c9ba95876ee6ed5625b7d789e5ffac60cf5f86e1
SHA512bd48fc687070be07016474270b48f7bce6fb88e764b4ad61ddb827de20a254b3a0087e3140762021786b619e7645ace86700d78aeea18adaedf1f0bea303054f
-
Filesize
16KB
MD5da44c5d5dc2f23b1dae4b5ba083b7759
SHA1c4a5975a68f469acb5da2d02801af1729832b341
SHA256c4fb31a226e4cff8de67fcf29055c63545f61105e654579b505116885e2b3f3d
SHA512b2be24f3a52cc32ad7e253a13c8b009a6c8a4a13621d99527d020bde3237e781a61c4ec6038444d8129a885fe7c9e0f7d1940f14c39b37eeaadd4acd9cfb9408
-
Filesize
16KB
MD5ada89a673bd446246518b82ef9e78af2
SHA1e3770b06e3b87f84c1bd7662c55b77941516ea8e
SHA256500e5eb14254d0ce0322256ef4e67b7c40770f5ee549cc6675c047c39956c83f
SHA5126e11a4c80e2109736659c84f7aaf9044308ea3c86b3fe4fbb98fd74598102b5cae77c8cd72fc51e01acc9f556e5e07f4256c7203729cd3eda901226e18aa42e8
-
Filesize
16KB
MD536846b755ed7f37f7029a7c79e6c7615
SHA11e4087ad5ee1e0a24336262438ff91a7d26b32c7
SHA2567641cff58a0500eb0ab1d873d0da54621ff7655eb14459b90b056d8fdf1e05c7
SHA512c1c6dd76e9d7622737ba2320f0cfc3277209ba3d60ece83a994720e2a6ee822e198e21c06a3912c20810a7d823384882660880052c6d195784218af62bb7a455
-
Filesize
16KB
MD526b7fa0c78b7a0f33e16dbbd558ec613
SHA1ea04ee10cd573294569a482d4ee9918b6d89a2ac
SHA2567edd0ef0409d9887546b2f5e9ae728648a403ac1546b217730aaefbaa359cb50
SHA512e3381e715d301db3892c16f68bab3f304f5789395951ac813e02bf5c2875208f27e8ae050fab1c7b501b54b5596ebab88b85fadb1a98938af956333b660212ed
-
Filesize
16KB
MD5fc120638cc8e566bf1d68c0c47c3a4d6
SHA1df89e94775cd806254939a4e615616e3a4a7dd2d
SHA25607718d0b2e4284acf484369bc98f09b1261a55fa02d0aa299a6231a61dc2e869
SHA51215cf7aa859d42b577c2ba4a9c294a2a60d1210d8691fedf0d14a244db99dadb6c4c1af03aacd57f3d55c68dae99cbf77c538a46fa096f776e4f1f77720e4ef1c
-
Filesize
16KB
MD55ff36ec5a894624da4ceb750a222e10d
SHA1137755f53dc1bc5e9dcdba72a12eca87d0023a58
SHA25627bd73a2bdf9e91e3a97597cff32c17aa3d91c3295d57b4eb55a7ebb213c2b1d
SHA5127d8d5dbd102179f9b6f1b0f34e5b34e103c4f164c50cdf1a81ff37545174b74f4eee7dff6ca17ed45400778a69d81948a09909d20aed04cec2d6b1c5770a9c04
-
Filesize
16KB
MD5a7e9103f682e6c009d6e3890cf748dc0
SHA105db280ff7e16abd667b8c683b86b3a4e4bf5c08
SHA256c3215ff764f35e8f98e5cfdb32586aeced44e9d80f9afdadaf77e375ebaea610
SHA5129e86ba4dd6edc95ef002b80c59ef1a6c859fbb076b4225e450d523e6cc9e5331e189b95ff968919851d3cca1ad3ac4fe65003312e38bf99801c4d70be977a976
-
Filesize
16KB
MD540e264bc73d2dd8ff9ee72f36ee5b4f1
SHA16e2351e9df893e37a0a27b9fadda90ed2f263fa8
SHA256a9cbb0847b3a80233810435dfbc15ea8f8f3bb7765896579a15a8cc27e171337
SHA512a9a7b219ef55eb7e70f1ec790601a1c6bd236a144845a486b805b9acc4aae4eeb93bebed2a611370fed28b5c5346d4afc209c03e89d4f9697224caa3e03739bf
-
Filesize
16KB
MD5aa90f87c2a516b86596ab0bc879068e3
SHA1054dc878dbb6d9c5a8aff86e44b4dc19c18aef41
SHA256d92a672104726a8698e021fc1104dfb0c553546a19cc1799c76171ec0bb2dbeb
SHA51286edae4c66287a6d28e38445ed532a262e81dbc9dac0320064bcaeb80dcb008a1dc6cc224a62b3426aa84ab1568f3c4bba2434dc780862c1a52b84b88c24983c
-
Filesize
16KB
MD54ce6999b8834480dd53aac631e78c8dc
SHA1e277dee7f7f9a07188d9e03f2c5342bccd5be904
SHA256c3ed145c861368d3d9ffd6efee15730f8e1ee6c90af85a9246750ee108ede3bb
SHA5126256700ea22b2c79ae007fcda25c6a99ea7c169087aa99500c34b226c9e327b0c5d6853c07121a7d30d8ebfde44f846edcb037912fbb8e8a1becb59a12c1427d
-
Filesize
16KB
MD53e60996b2d78d5d580be3f2a3ae4dd67
SHA1344d2253b9795f7302c709a16a1ec2bf6974f5de
SHA256481ec206c9ba016f36141ce60dac966afaa22d6f4bd3064d5bec466bb84e2d6c
SHA5127db1382e44b0fb98a648e32ecbc7100feb847057e845a0086f2721ae4c94289e0d767e4b60f357fc6203f3df3260a46255a5ea6d6ee367b521c740a3cc21f4fd
-
Filesize
16KB
MD5ca5a2fe21efa3d2200be4c368984f254
SHA132b24b1883a61d58d228578b5908a1b19ba3bb09
SHA256998089718dca6c508660643c32a39a7750b096fabf22f28299149feb766e755c
SHA512408a88d95b3f76487ae6311c86f10c1f40a3cf5ec19e804cce10b3bc0cc5cc7c347d08551a76ddf4805b2497dcd710c57d23fe9781e21cc16db145b649f5c8a7
-
Filesize
16KB
MD5d90f11d314998c3d1006ac81df0aaf03
SHA14195fed775c5b7679c6c7aa24cd221f723b7e5fa
SHA256d0cec6c4a2db3ccd9e0c1751511c03fce097af49d03251b6596bd5d2ecae38db
SHA51286ea8882f46a2b190ae8ff5ea42feffa4455729e232c7e4450bd405cd0f785752a27923329b51f7df7f0ba432e16f5bd8a6b7e523a0ec959f3814aac172c6a23
-
Filesize
8KB
MD583cc20c8d4dd098313434b405648ebfd
SHA159b99c73776d555a985b2f2dcc38b826933766b3
SHA256908b275d6fc2f20e9d04e8609a9d994f7e88a429c3eb0a55d99ca1c681e17ec8
SHA512e00009e1f322a1fe6e24f88a1cc722acf3094569174e7c58ebf06f75f50a7735dcebf3e493886bbdc87593345adc8bb7b6f2daca2e64618f276075a0bb46bb8c
-
Filesize
56KB
MD5c0d18a829910babf695b4fdaea21a047
SHA1236a19746fe1a1063ebe077c8a0553566f92ef0f
SHA25678958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
SHA512cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823
-
Filesize
1.2MB
MD59b55bffb97ebd2c51834c415982957b4
SHA1728262abdfc4f0e8a84eb3b5cd2be9ea9d0acc16
SHA256a62cee3d2610ed0f693179838803e5c60dcd4f68028c60f5761b90c750125e11
SHA5124fa9d641aba15fd07a0711530ab1f1a4e8dbafe03e1ab71845bcdcd0a1efa9e59a05915834c5c717beada659dd5ee459aa7e08b4b0acc8f867ace07430eb11f2
-
Filesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
Filesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
Filesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
Filesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
Filesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
Filesize
5.9MB
MD5d0c0ed74cb8878f734ad674f4c6f6430
SHA1b18eaaaf110caa25c101b86fd088e700fc5eec9b
SHA2560125d17f17f3cf5b115c1202de3931b3082ca56d2d473447e4dac039c53b517b
SHA51242a3ce63865b3f8b417bc48bdabc68a9436b11cc3574aff4d8c91b8ec7b7ed34b7e11d7b7ae35f01ad40fe1c1b5616773c3fdbd59e9fb68ace3d1493c62c56d5
-
Filesize
3.3MB
MD589086cb8af781cacdb7f54885b9f3c93
SHA190dd7b1f35b151efa68e691212a9fdd72188faef
SHA2561c8fd4b23994f2dbffb0f51debe3551b796ab2bc280242c325de14d650ecb227
SHA512d7b2d92536a6bfabc80f3b12284df5969e3b4f3d47c6c44e0b7702a043915e31914161be9b76f2d9db88ca47788eaa6522f6d1475b4b15a9d7c68379b041037f