Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe
-
Size
1.8MB
-
MD5
a1ebd31cca0808cef68bb396c1c1c56d
-
SHA1
00405eaed613be4e596c203913ba2b7f880e94c8
-
SHA256
e787ef308f760af58ff6611390c0de24b3e62f71f7012326c2a04679223a2c88
-
SHA512
eac9f9bc05713a0ba533b8b9e4131b415ffa87e2eebb7af4abe158af2bb9f6e5a73f547383aad82826477a6716ab7ce33db4c499f90361cbec3c903a3394eced
-
SSDEEP
49152:xQcXy/RF6ZWpmcYbZtxPsxc6iFyVkaner:xQcXyNpmZbZty+/0kIer
Malware Config
Extracted
Protocol: ftp- Host:
ftp.drivehq.com - Port:
21 - Username:
slslasher
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule behavioral1/files/0x0009000000015eff-10.dat family_ardamax -
Executes dropped EXE 3 IoCs
pid Process 2452 VFRY.exe 2676 IconChanger38.exe 2060 Install.exe -
Loads dropped DLL 17 IoCs
pid Process 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 2676 IconChanger38.exe 2452 VFRY.exe 2452 VFRY.exe 2676 IconChanger38.exe 2676 IconChanger38.exe 2676 IconChanger38.exe 2060 Install.exe 2060 Install.exe 2060 Install.exe 2060 Install.exe 2060 Install.exe 2060 Install.exe 2060 Install.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VFRY Agent = "C:\\Windows\\SysWOW64\\28463\\VFRY.exe" VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" IconChanger38.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\VFRY.006 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\VFRY.exe a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\key.bin a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\AKV.exe a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\28463\VFRY.009 VFRY.exe File created C:\Windows\SysWOW64\28463\VFRY.001 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe File created C:\Windows\SysWOW64\28463\VFRY.007 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\28463 VFRY.exe File created C:\Windows\SysWOW64\28463\VFRY.009 VFRY.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\IconChanger\IconChanger.chm Install.exe File created C:\Program Files (x86)\IconChanger\unicows.dll Install.exe File created C:\Program Files (x86)\IconChanger\Admin_IconChanger.exe Install.exe File opened for modification C:\Program Files (x86)\IconChanger\IconChng.ich Install.exe File created C:\Program Files (x86)\IconChanger\Install.exe Install.exe File created C:\Program Files (x86)\IconChanger\readme.txt Install.exe File created C:\Program Files (x86)\IconChanger\IconChng.sys Install.exe File created C:\Program Files (x86)\IconChanger\license.txt Install.exe File created C:\Program Files (x86)\IconChanger\ichnrest.dll Install.exe File created C:\Program Files (x86)\IconChanger\IconChng.ich Install.exe File created C:\Program Files (x86)\IconChanger\IconChng.dll Install.exe File created C:\Program Files (x86)\IconChanger\IconChng.exe Install.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VFRY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IconChanger38.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\HELPDIR VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\ChangeIcon\ = "{C912EFA0-0076-11d5-B04A-BD6C80DF2479}" Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\ProgID\ VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\0\win32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\GROOVE.EXE\\50" VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\FLAGS\ = "0" VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\VersionIndependentProgID\ = "BCSRuntime.ActivateBCSSolutions" VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IconChanger.IconList\ = "Icon List" Install.exe Key created \REGISTRY\MACHINE\Software\Classes\IconChanger.IconList\DefaultIcon Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741} VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\FLAGS\ VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\ = "Befalig Class" VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\ChangeIcon\ = "{C912EFA0-0076-11d5-B04A-BD6C80DF2479}" Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C912EFA0-0076-11d5-B04A-BD6C80DF2479}\InProcServer32\ThreadingModel = "Apartment" Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\0 VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\0\win32\ VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\HELPDIR\ VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C912EFA0-0076-11d5-B04A-BD6C80DF2479}\ = "Change Icon" Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020D75-0000-0000-C000-000000000046}\shellex Install.exe Key created \REGISTRY\MACHINE\Software\Classes\IconChanger.IconList\shell\open\command Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\TypeLib\ VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\TypeLib\ = "{C21A7157-620B-B38F-B2D0-A4A8A1B53741}" VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C912EFA0-0076-11d5-B04A-BD6C80DF2479}\InProcServer32\ = "C:\\Program Files (x86)\\IconChanger\\IconChng.dll" Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\ VFRY.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{00020D75-0000-0000-C000-000000000046}\shellex\ContextMenuHandlers\{C912EFA0-0076-11d5-B04A-BD6C80DF2479} Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IconChanger.IconList\shell Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\ VFRY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\TypeLib VFRY.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{C912EFA0-0076-11d5-B04A-BD6C80DF2479}\InProcServer32 Install.exe Key created \REGISTRY\MACHINE\Software\Classes\Drive\shellex\ContextMenuHandlers\ChangeIcon Install.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\{C912EFA0-0076-11d5-B04A-BD6C80DF2479} Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IconChanger.IconList Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\InprocServer32 VFRY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\0\win32 VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\ChangeIcon\ = "{C912EFA0-0076-11d5-B04A-BD6C80DF2479}" Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\0\ VFRY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\FLAGS VFRY.exe Key created \REGISTRY\MACHINE\Software\Classes\*\shellex\ContextMenuHandlers\ChangeIcon Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\ProgID\ = "BCSRuntime.ActivateBCSSolutions.1" VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\ = "Groove XML Element Type Library Alpha" VFRY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\VersionIndependentProgID VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\VersionIndependentProgID\ VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ils\ = "IconChanger.IconList" Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554} VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\" VFRY.exe Key created \REGISTRY\MACHINE\Software\Classes\.ils Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IconChanger.IconList\shell\open\command\ = "\"C:\\Program Files (x86)\\IconChanger\\IconChng.exe\" *openiconlist \"%1\"" Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\ProgID VFRY.exe Key created \REGISTRY\MACHINE\Software\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\ChangeIcon Install.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shellex\ContextMenuHandlers\ChangeIcon Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IconChanger.IconList\shell\open\command Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\BCSRuntime.dll" VFRY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\{C912EFA0-0076-11d5-B04A-BD6C80DF2479} Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00020D75-0000-0000-C000-000000000046}\shellex\ContextMenuHandlers\{C912EFA0-0076-11d5-B04A-BD6C80DF2479}\ Install.exe Key created \REGISTRY\MACHINE\Software\Classes\IconChanger.IconList Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\IconChanger.IconList\DefaultIcon\ = "C:\\Program Files (x86)\\IconChanger\\IconChng.exe,-249" Install.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EFD2F230-02F7-4320-89B7-2E67B15F6554}\InprocServer32\ VFRY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C21A7157-620B-B38F-B2D0-A4A8A1B53741}\1.0 VFRY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ChangeIcon\ = "{C912EFA0-0076-11d5-B04A-BD6C80DF2479}" Install.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{C912EFA0-0076-11d5-B04A-BD6C80DF2479} Install.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\IconChanger.IconList\shell\open Install.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2452 VFRY.exe Token: SeIncBasePriorityPrivilege 2452 VFRY.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2452 VFRY.exe 2452 VFRY.exe 2452 VFRY.exe 2452 VFRY.exe 2452 VFRY.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2452 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2452 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2452 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2452 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 31 PID 2500 wrote to memory of 2676 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 32 PID 2500 wrote to memory of 2676 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 32 PID 2500 wrote to memory of 2676 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 32 PID 2500 wrote to memory of 2676 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 32 PID 2500 wrote to memory of 2676 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 32 PID 2500 wrote to memory of 2676 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 32 PID 2500 wrote to memory of 2676 2500 a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe 32 PID 2676 wrote to memory of 2060 2676 IconChanger38.exe 33 PID 2676 wrote to memory of 2060 2676 IconChanger38.exe 33 PID 2676 wrote to memory of 2060 2676 IconChanger38.exe 33 PID 2676 wrote to memory of 2060 2676 IconChanger38.exe 33 PID 2676 wrote to memory of 2060 2676 IconChanger38.exe 33 PID 2676 wrote to memory of 2060 2676 IconChanger38.exe 33 PID 2676 wrote to memory of 2060 2676 IconChanger38.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1ebd31cca0808cef68bb396c1c1c56d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\28463\VFRY.exe"C:\Windows\system32\28463\VFRY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\IconChanger38.exe"C:\Users\Admin\AppData\Local\Temp\IconChanger38.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Install.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5c2a51c40ba01e063c47e38653f987558
SHA12ea2a98a3b7869e540f5846dfe4741bf91c440ed
SHA2567640da75e2c4226091ef1360e0ba83013c66fbe79ac4fda66f6b1999accb5a53
SHA512660ddd4c88c0fe962d0a486b4ab1af0ec9080d80809d5d4fdf0ec61c90b3a7533c07ca398dae8cc6aeb434f908e0c76bb8b6e2d6a9256bed057b34ee2427a93e
-
Filesize
266KB
MD5ffbb8cc01a348c3e3d75df86ba138eb5
SHA1abbc2826a78da26f02ee3e2ab561a02668c2a895
SHA256896d7d7007dbac099315f28ed2ce4c85f65a04581e0ec2ce112b215e331a088b
SHA51272b63cece2c47c8c0656c6d2fe3c3dfe3b502ffaaa642efbbf398d33a15295b497ee81110eb4fe5cf3228f2f96d42745b6d3ba59c4048b13cf35ac088aef6251
-
Filesize
292KB
MD54f81b8ded878fd4011f4e1a64766d8d2
SHA10496e4bc13b3fafb2f206188091f83b9b8febc88
SHA256fa4fb70cf67eb9c2be24132cc10d150f0b4eee9e0d89d290d90dd5042405bafc
SHA5127a5f53e0fd515f271adec9544a15e34aa50058a279625c5ea2c61fdde9d29f80af54d3b237795161b87c7d57ebbd9092f4df6a6dd1a5d5dfae2d5dd0dc28a9b9
-
Filesize
916KB
MD55cc6646d965dd24198052f5030fe187e
SHA155d087f8ea38a1252cc350e889713b0f1a428412
SHA256ec3629904b0189dd939337bd7eb8f8eb1c05acaa3b16d52a4f7d3ccae6f9778a
SHA512fe703ae141bde3734f6c0d0cbaba3a387e498265e15ecfb8210264bc2af182ead70e2deb2c2ae4ca8673b1029239c1a99321a18f49dade2322c70054e7df3a3e
-
Filesize
8KB
MD54cf5637adb05be37e8a0bf32b9e64c1a
SHA1d697c9a0ade926816901d90e274829a5f8476d53
SHA256a47182da07fc84d86ce1dc0c1c843d16183fcea92a7a6b6d484867f3a1b94fac
SHA512e8eef9ef35b6f6b93e51d3f7dc6c4170642ce745c1a95e0c305133a929cf1a93a61a8cd9e78d9ed447098868b35a91d2d1208e5090b325d3066866d12b840bc0
-
Filesize
40KB
MD52e95639b460d6b2cc350ab339466c487
SHA19d84ff37b6d2bf94183ffcab6de78bccb87b28bc
SHA2569d8d3d79a2eedb17677d5c48e8dbe5ba0fbdb6eab2690c0bd05b998ca7fcaa40
SHA5122ccea3776d66107ab26ce49c55c2011e20dfac04109403032e13a36cfff119a8fbfb7b49a75fe32f260f0ba092c8a0ab26af75e980d5385d89dd054440125286
-
Filesize
48KB
MD55ea4715b208ca99c41e205d818ca0aa9
SHA118d28002a6a6ebb5df1deb06b1478f989da2da2a
SHA256890bcaad297dd2eda5b28998537a9ac953fe3cc1b1af20d797c54877e73dae2f
SHA51204a57e87f02b2b59532fe1553a30012473a9c5ef7e352b02a8c0d3062c519514b5e5bf174bf8ebdfc4cec1277be1442afa599b165ef23750d6f1be95d056dec0
-
Filesize
4KB
MD58700f7ae68723f3f31adccdccc0bfd6b
SHA1eff9db7b42e03b20df0d5dcaf28fc1906a811996
SHA2560533612feed6bdca335041c80a7e12249760e8883e0acdd78265e774a2775e22
SHA5128252539e2d45ff2f6e1d3d644dd0d52f3f93083425e29fd93193f3bb8433486f69f6fdb984416cc17eee749c6c756ca21c40cb954a06f00bf7a679b1cae57458
-
Filesize
3KB
MD5be87138f56180f5e9f2e527003121743
SHA16310e4703f7e9c501908fc8c22e3100a212c3390
SHA25678ee952aaaf5a84aaa80052b94139f9655dab11ff020e032619a160f6b0280f2
SHA512ef69e345b697abc9697b7ef57849ce82bc0921c6a22a8b78d7b67c6bab023b3e39805e891397ef033f57cbc87400302bdc5fcbbdfcc32d4aea9472463d35ab57
-
Filesize
239KB
MD5e1102cedf0c818984c2aca2a666d4c5f
SHA1d8d88ea7083aee9c40f6fdc6c56451a018d21a83
SHA25622f23cc65698741184ec34f46e6f69717644e0b5aabf5d5bd015101f2d72e56e
SHA512e58b35815801d6d3797f95c986834d2ca5450ccc3f1fa1d27d127a8d1d36f8e21279173715a00686c9c831d22d7c5b5b9cc5874170223a4d78f09c4eefa390a2
-
Filesize
457KB
MD597eee85d1aebf93d5d9400cb4e9c771b
SHA126fa2bf5fce2d86b891ac0741a6999bff31397de
SHA25630df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24
SHA5128cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6
-
Filesize
366B
MD5c4e794ea172c3a9e0e6fd0cbe1130f6e
SHA1884c4621f6bb03e6a5b23fa8d2e6f6192113dd03
SHA256eb8d170f146a3a004bfeb4fd9b49edefdd8468d06069a7c306d68946f4713437
SHA512763c8051e0689e8323e3666ed8c0cf11e7dfb980b0c8285ac4fe03691576a4009e3a806d4104111d9367a23903acaf41649a5ebcad2d9c268ef457eb42e4f1fc
-
Filesize
8KB
MD535b24c473bdcdb4411e326c6c437e8ed
SHA1ec1055365bc2a66e52de2d66d24d742863c1ce3d
SHA2564530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617
SHA51232722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de
-
Filesize
5KB
MD5a8e19de6669e831956049685225058a8
SHA16d2546d49d92b18591ad4fedbc92626686e7e979
SHA25634856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564
SHA5125c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8
-
Filesize
106B
MD5639d75ab6799987dff4f0cf79fa70c76
SHA1be2678476d07f78bb81e8813c9ee2bfff7cc7efb
SHA256fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98
SHA5124b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2
-
Filesize
4KB
MD5d73d89b1ea433724795b3d2b524f596c
SHA1213514f48ece9f074266b122ee2d06e842871c8c
SHA2568aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6
SHA5128b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41
-
Filesize
144KB
MD5b2dbe169afe0e6060a4b85a9813a6f23
SHA19a3ba3bb20bc3a240d4e1bd1c0758c4f50001b6f
SHA256539a1d4bd44fb87e6a1b78393206e923b33b7f6e4df6dc5a2be93757de8f119b
SHA512a291c86342d2f44e6bd8113f849ce1773e53f130c47f75b67f298e19d178d31b01a0f75e02a615cd639d261c44e55aa54778769d38ffc59f0086352c6f648116
-
Filesize
1.1MB
MD5714fec58517cf8ec758106f9e92cb4cd
SHA1b1b03ba2dd2f94ce07b055854687fe5853324309
SHA256a4ec43ad30c758d0a1737edcedd29934a442e0dc8b5ff95cb593b150becfad82
SHA5127eba6963e166e92992208587e11f20992f6166101708dee47282e405a393002266e098f6e7d2aade9c5edd6887c8192bf4eac3f5f797134beef334c81f459c3a
-
Filesize
646KB
MD5b863a9ac3bcdcde2fd7408944d5bf976
SHA14bd106cd9aefdf2b51f91079760855e04f73f3b0
SHA2560fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0
SHA5124b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a