Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
01/05/2024, 10:14
240501-l945gsef62 1001/05/2024, 10:10
240501-l7lv5acd8z 1001/05/2024, 10:06
240501-l5drqscd4z 10Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 10:10
Static task
static1
General
-
Target
0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe
-
Size
4.2MB
-
MD5
0b84369c3ae7ea35924c82465ae768c8
-
SHA1
9a263fe01ce2d94a7054905323f596ef8cd6047b
-
SHA256
06d60d2e4f630514526ac63ab10360a1405899f4dac32888d231f5fcf9abb2d1
-
SHA512
fbc19f8fbddffd0806e41d0b33b93cfaded708687d9d514543ce8302eb351222df4c6ff90df9a52e4371aa4ba3fb272672c850b92ecb0179f5618d7e01f5c6bc
-
SSDEEP
6144:UfqGzAH5bdSZRg4WR223vZezQDP9RB49qRqe90hfduo+Ppt:U9kHXsRO2auufi6qNi
Malware Config
Extracted
qakbot
325.14
tr01
1596554163
94.59.241.189:2222
86.98.66.175:2222
94.96.84.73:993
71.83.16.211:443
24.110.96.149:443
78.96.199.79:443
216.201.162.158:443
68.60.221.169:465
95.76.109.181:443
189.231.175.46:443
70.164.37.205:995
108.27.217.44:443
71.220.191.200:443
92.59.35.196:2222
71.192.44.92:443
108.30.125.94:443
93.151.180.170:61202
189.130.26.216:443
47.146.32.175:443
24.71.28.247:443
12.5.37.3:995
79.113.219.10:443
70.126.76.75:443
78.100.192.173:443
199.247.22.145:443
5.193.178.241:2078
144.202.48.107:443
90.175.88.99:2222
81.133.234.36:2222
151.73.120.201:443
166.62.180.194:2078
201.216.216.245:443
103.238.231.40:443
187.205.235.21:443
189.210.114.157:443
68.116.193.239:443
84.117.176.32:443
151.52.157.19:443
188.26.243.186:443
108.45.89.47:443
179.14.167.91:443
189.223.67.126:443
94.96.84.73:21
75.170.94.218:443
174.80.7.235:443
68.134.181.98:443
86.120.237.47:2222
51.9.198.243:2222
94.96.84.73:20
172.87.134.226:443
189.150.106.26:995
188.15.173.34:995
24.204.155.208:443
63.155.9.141:995
96.20.108.17:2222
187.192.233.135:995
115.21.224.117:443
98.4.227.199:443
5.15.54.233:443
217.165.112.13:995
207.255.161.8:993
86.126.206.141:443
188.25.192.41:443
78.97.207.104:443
189.140.64.53:443
209.182.122.217:443
173.173.72.199:443
35.134.202.234:443
134.0.196.46:995
75.136.40.155:443
70.95.118.217:443
67.6.62.74:443
186.28.178.94:443
98.173.34.212:995
173.22.120.11:2222
108.46.145.30:443
108.35.135.148:443
94.96.84.73:443
86.97.9.224:443
67.11.43.93:443
154.56.71.174:443
24.99.180.247:443
65.48.219.163:443
69.47.26.41:443
188.27.27.107:443
67.247.254.82:443
172.78.82.95:443
72.204.242.138:6881
199.247.16.80:443
80.240.26.178:443
76.187.12.181:443
5.13.102.138:995
86.153.98.2:2222
208.93.202.49:443
96.35.170.82:2078
2.51.240.61:995
67.165.206.193:993
5.15.84.129:443
67.8.103.21:443
151.205.102.42:443
96.232.203.15:443
72.240.200.181:2222
70.123.92.175:2222
73.228.1.246:443
75.111.145.5:995
24.231.54.185:2222
98.115.243.237:443
96.234.20.230:443
96.255.188.58:443
174.82.131.155:995
90.68.84.121:2222
73.227.232.166:443
71.182.142.63:443
109.92.251.113:995
24.139.132.70:443
130.25.130.19:2222
35.143.248.234:443
190.204.24.148:2078
45.32.155.12:443
173.163.115.89:2078
207.246.75.201:443
35.209.218.146:443
45.32.154.10:443
217.162.149.212:443
72.142.106.198:995
75.137.47.174:443
83.110.92.29:443
36.226.77.179:443
5.107.157.123:2222
176.205.255.97:443
213.120.109.73:2222
41.97.200.95:443
2.88.50.153:995
173.44.112.112:443
200.38.254.177:443
24.229.150.54:995
71.10.43.79:443
72.82.15.220:443
99.231.221.117:443
47.44.217.98:443
186.6.197.11:443
217.165.164.57:2222
71.88.104.107:443
68.204.164.222:443
73.104.218.229:0
173.245.152.231:443
24.203.36.180:2222
86.98.89.132:2222
24.28.183.107:995
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\DeviceDesc 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e1b320b09bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "52569441" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31103920" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31103920" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421323266" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f026af20b09bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "54600815" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31103920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dd375db7411044b87316e7a135016a600000000020000000000106600000001000020000000b9613e472b931f60dc88bba1ad0729430f0d332dc7c6c3de225b245a466cc764000000000e8000000002000020000000c21e2e6b0d01768c1cca15f1222750564470bafce52b104f41100c491589c85f200000002e7c91a1e95b6eff34a9a50cc573024d91c6577e18415c0d614b89453666d44940000000766fa46a33285a0e940c4335a2fdef58d862592e3d1e045e68dd403dbfa45764672125c35f2ce5a2b645d44c6d4902cd51a62d3c6491b289ec985a01a627d9bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dd375db7411044b87316e7a135016a600000000020000000000106600000001000020000000f62ebfa4774e24d9529b9368909b6cd88ec070f60efe22384c71effc0bd4915e000000000e8000000002000020000000a2c28148ab0623919e4a60389796d8e842311e2f55b8102c6521188bacc38a6e200000003812f70fdf0b1387012ba4640f9ac1bee5c7bf2aeb800fe53c1135f179c5215840000000d6ca176c62c8f0b9948859723804395bd0a3f16d85514eea8da07198811d5f2e240e30e9ecde7f1b0356ccd4f0e6d761dd03f1871504bc32aba540c71caedd8e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2EC485F5-07A3-11EF-8FD7-423B00633FB2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "52569441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3816 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 432 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 432 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 432 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 432 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4832 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4832 iexplore.exe 4832 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1160 wrote to memory of 432 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 87 PID 1160 wrote to memory of 432 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 87 PID 1160 wrote to memory of 432 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 87 PID 4832 wrote to memory of 2140 4832 iexplore.exe 93 PID 4832 wrote to memory of 2140 4832 iexplore.exe 93 PID 4832 wrote to memory of 2140 4832 iexplore.exe 93 PID 1160 wrote to memory of 3988 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 94 PID 1160 wrote to memory of 3988 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 94 PID 1160 wrote to memory of 3988 1160 0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe 94 PID 3988 wrote to memory of 3816 3988 cmd.exe 96 PID 3988 wrote to memory of 3816 3988 cmd.exe 96 PID 3988 wrote to memory of 3816 3988 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe /C2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.13⤵
- Runs ping.exe
PID:3816
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1116
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -nohome1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4832 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
16KB
MD5deef7b3b6626ba83e6da301fe03b12d8
SHA1cf531d081337bb606a13fea1cb7df8d2e67ff4a4
SHA256090f74579d7807868e33ee7b0efc7e1a75320b2a21f94492054401d2645fb48f
SHA512b967aff74191fd811116464d0271d4aa14d955504e99f87a3ff8a9b0a2b71ca27a6760491861cc945e7de431d8189ffbbf399981308e6495d633d3cd36edf437
-
Filesize
928KB
MD5c96a9276fde5c127fa033a152162bb83
SHA13cdf097ccc520b948e8a3e087a8dcfebd9bfd79d
SHA2565634dd23b40bf213868df142b3d6e3959155600b1ad5e4b2e94fa7eaf1b10ab1
SHA51200172ec227aa29ec26dfa428be9c880e2ea73efdaf531ffd2d0e34f1b4acd11b9bfc3c1df3eabeb3475e015a4df333cf3e5b78d2a42177cfa562f286f964903f
-
Filesize
457KB
MD53f43e5889d690428b590bba5bdbc3c20
SHA197459763ce3387123cac321e74f5c9104bcfeb22
SHA256639686af59fcc1137b9611bbe1619582aa567b313edf75422c31cfb4b0bc1eec
SHA512ef8643c44cf14b7b8889799f10acbcf7c991375872ced24450d8e19c22deca3707e23789c6eaca541b8311850bd100e83d609589b669d2a528f0a11cf9dc9863
-
Filesize
575KB
MD53bdf4f5fa27d6013b60dca69a7e18be7
SHA15cbc245cce47e771ecb758ca8216d7a341cdf726
SHA256fe88de63a5cf10bc309e5cfb7d5ac04d9bd5592309628bec920530ab25a5eebb
SHA512e1ff6a8bb2f87ca578149fa988dafff570ee17362edb972802ea8c819873ccc2ea6d45eb618dbb1e73ebed80c7188b3173b5c5183b551ba209a02fc35b7f3fe5
-
Filesize
899KB
MD5c0e1dd6b78335035bc04f2008b349734
SHA1167365d1bffed24894c456223d32841ad1d5ad7f
SHA2562f8167ad154bba0d1aa5b1b0087e3896ce20827ce4cc178b135acc8a3ea86a10
SHA512960a133de29b5ccbfb44704d65f81f2aa8120f8ab6927797cf6c835c93d552e55dbae0ba90b51d021dd9eba869548f9eadeb3e2b30ccecca2a4abe63e578d5ac
-
Filesize
987KB
MD50b5dfe50d008ef22f79535fbd6611519
SHA1e78cbb9ddfca2c07bd6f4ea15eecf05c21ca2cd5
SHA2560ad697f7877a23a4356c952c4c186cc4ab63a2f5ea057514d4a4285505bc8313
SHA512b453054df055f940f438e7510dad34129cbb2281df8590ee2114c5065ddcd838584152b2fa24421b85fb5b0c609580d9f070022e8eaf13adb1c16662e8d154ff
-
Filesize
368KB
MD5393ef4a06b73f5fb12eab2e46bbdbf38
SHA1dfbf8d13de70c9d12756bfe9ac466eaccd9f9329
SHA2565438301f624f776acd3d1aeba9c5977031d960af1a2515a32232cfb5d39cfa51
SHA512bae0752be97be89a5701a01a4b51e4b5a96432140945efbdc28f7ae641d91af246ad6c1fada605a11c5f3bfebebce68b03a5134605d752eab733f439ed6a9bbb
-
Filesize
781KB
MD5e1b185c57392a7c0e64079d5443b6f32
SHA1e47ca7953e28076a8678bb5f2f552541cf263c55
SHA25621e975cf372baad488c4d8618400ed714d385ba97e0fec086274eaeae102b2ea
SHA512442a55e27fde89f05b9f292e76b63dc3ae8497ea878016d7fd510d3f87413e3230750f9eeaa7e7513eb9775a184ce966e3a2a14e5211774b9bb759b784e3538c
-
Filesize
869KB
MD5d92c413928efcfb1020c095245830901
SHA1bf345d6057aeceb249ba6dd0d61610c8b9d564c9
SHA256967dd655cfa504c2129d7d9504a97021b720d597d99f6aa3c12cab9d86e701e4
SHA512278eb9edd9dd15a6669a2d42059074931863c3148674d111c12481145e858a4e9ab2f24455ee6c0a82aa45f8dd4ecaad20b040ad50d0ef096232f46f91c49c07
-
Filesize
752KB
MD50111329b73b2c75a4447a44093acfca6
SHA105b1a520ff2d1df790e3fc37f7b794a9192d7d88
SHA256e0660a6586b49a39e23288fa948a623ef8fd9ad186c7ebd30f1a7231be80a241
SHA512ad3b9f5365e4309a65364fc35083d2051373f27d983418727f9a952762c2da415e60da0cc8726530997840d2685bb17b02f3232c1d166a9ee7b75801760c9b20
-
Filesize
2KB
MD56c8bc66d5b0b682ffe8a08e46750df8e
SHA1bb73e3324897cc06b8a8abab2da602ecd4529438
SHA25600d121ab54dbf1e00a3ad7bfdfef86e25f0b374594ced76d0b3c59e15020c3f3
SHA512b18fa41ae7cf1b063b9963c6b12d29f0fc5f27a0b9afef70d08138901f087bca49b705a1587694cb7a842857b18e599512d207831003bd7e254bee1c9938d0da
-
Filesize
1.4MB
MD547139e7fad76454ac9e57062cba35b06
SHA1a7c5945b80a2cbdce9b8cbaf553cf8075adf10e8
SHA25676f3c6e9089aa1937bd3dbeb01b05ecc2e82f949c6aa57c4408ce91e1fa3946b
SHA5128a14bf435093077b33fecd450059c5d7744697d679065a55af82592c780dd06f6891377437abd47a82f3df0a2175ab829d959ec724b701f8113ce3f19d2a4cae
-
Filesize
604KB
MD52c3c89b2e9b820b1cfa5b16178236142
SHA1d313f9b3ed4cb051b89008bebbb044454388ee13
SHA256658f922fca4cbbeca8d03823d914aca6f26c4731d2fb979cca9f85fbfb08b5bf
SHA5125d92155bbdd6360646762454bb7f04e838e26dcfcb5f9646a612e8ee010aae29c94f9879d139c052877efe4b0ec5aa869256d3e8e7cc22211caec69cff57ed11
-
Filesize
545KB
MD5478dd02ddfced09838e6530abb43fed4
SHA1d17dcfb141aa26e08084e7cbac7243d4952c6f22
SHA2564616d35cfd7318055e75b2d3c698954d02cb58668f77337499814e9e73ad4f65
SHA512c3b6ed1f8c5ac141944e66bcaeb428d7e245dcb47f2c81691dc9d73f621f83976bbb5711a4b42efb8f6ec874d86706c5593acaaa07c9dc392cadeead01a91218
-
Filesize
634KB
MD562b2ce8165c5788ae9a224a99a8be9fa
SHA1bdab596ff1e57f6c055643b1261edef434b5a6fb
SHA2566f1d8a45d933b008d24977fcfef24c3cb7b6f03d8abcf0c1a4fa62fda3f8532f
SHA512dcecfc8915020aa019a5570ac8488307417c001fa31e7a24ec151e393d40aa3f9e39d30e1e93709a9a07aa8940c8f79caedd8c4e95f76ad17168601cae4f4b80
-
Filesize
486KB
MD595b2fd6c76e126070e53033b84bf2d04
SHA1322031b76799d372500d411016e42f9a0821c4f1
SHA256f0126e4def4a3850205a3bbec52fa9bd52877cd9444250246df8c40eb420c0ee
SHA5122af4c42e3a475bb05b18f38bd618ead14beaf79bc1674f2830713240622f2b9e000f757096132d73a2b9392a861ecd1277e9361b6922c2fe0425b7d58324360b
-
Filesize
516KB
MD5665f6b0ecfc62a8d0a407522e3c43a86
SHA1bd2cb8a8722b5a149c256bf8dfff3bc8c485baad
SHA256cac90062d12ed30d1435915758a395728c414cf1caa0b6a109f97292aaaa4c8d
SHA5124bad62d4c929fc34ef8c1a85817146620be2d537f952200c86e1069aaf0f0c016acabc79a6054be9e27f1e7d09552b619e5afc2811bd0d7c3b9e9cc011471126
-
Filesize
1017KB
MD586738b1446284667f3fe4f28cfd63963
SHA1d3d76d8c7a5c1cc53d9c5686e53f23603b54c148
SHA2566d0c339dd6cfd144dda18e70b0a978fb635dc028b6c8661b92cfd4ea3a3294f5
SHA5122593ed5dbbdcb5d25d65beb6b58b920bfdc5ed0b53e79838f1b127887ca1606e088bbe5e4d387fd98694d0aa2e7cc796f51df2fbf4d70c19cd7191022856c4cc
-
Filesize
427KB
MD50424834ed84644b16500df80f0f9de6e
SHA1bd3dc181b47f683393405e352a9299530db95d6e
SHA2562380654a8af8e86b35a1da9da661c8320a068a9174dfc229fd4baa2d5fe29533
SHA5126a3ce1f4f943273a4452a124629b359e0ad894e60145e7bebbc40664ea220433cd00f4f055267f2337b020677ba082a244ad62bf07993a98d8d3505cbd924888
-
Filesize
722KB
MD546a7a4f0490bc07de03a4ed3c3a4ef07
SHA1f9f377ad82685079d1e868d5ae7bb36cc03c2bc2
SHA256ca408d416f631dbbefb538da05c3c52b5db6ca0a1ea1030a5ff0d7d6703575bd
SHA5121d355acdf67b5f1417c19445d6a95d3a4948d46153cd7ed44aceec1388d1c6cea73f4331b315a6a6ed7f33a93151f84d80ffb5e0e5264bd30b1f24975253be37
-
Filesize
663KB
MD5be195cf86612a6372e33c2daae5c16ed
SHA1459066d0386a82be712f51c55e5c5f4473ebc764
SHA2563a9f06642f3c5601162c94a0e4019ebe39190c6ba26852ee8a0227f6ad125953
SHA512bfde8b48c5712b47aeb9bad0f8aee05ae9ca4bfe620b473ded914440bcfc51e239501824d9f85e449b54fadbc7c8d8a5a5849bdbf7c313d31491ae3797adfb6a
-
Filesize
811KB
MD5588fb5cafee08ded04b0dd604649c0cc
SHA15d57b2c356906e099516456fb43170da7ca26482
SHA256fc26d0e1ea043e7b2278718425c645e0d476144d2cb6399f23b88ca08d26b3aa
SHA51253d15c62d476f7288a513ba807dac140d5eceac8ca4c460f9bb09b53ce980e7a7862ab5a300cd29d3a22d492c3ccf0c8d1b8db8cd4bd129cde930ba13f5dfb3a
-
Filesize
693KB
MD50c65bd0f524132f4a6882c9f2d229528
SHA1e343886a34e32a62578d8e4564c6c26f154ea6a3
SHA256f4d774cdde7c0a309d50bd18c18c2de78d3a2eafe6a7bd331d24313b74825cf0
SHA512386238a392c3da4363a5fb16044dc23030d58c95632833fdb625b31f46fc82dda1562d1f6c6bcf4d4fc0e6381b95259832f3f3f459591c62ae39cab70c57c22d
-
Filesize
1.0MB
MD53170c45eb59683d087ba4631debdc008
SHA129ca73bbae346a356753cf949ce7140707707b76
SHA256df8347dd9c331ba40cbc893c4e96a1ba5efc0f10be24bf77a4b1e680bbe321ff
SHA512df66d0d5acd4740bf7b49504bc68c013e13b25c0cf5f01acc911a501932c7518797fb02a13fd1cc2d6568a9b76fa254e624bcc5ebc6f5766a7cd6247c6e6a44c
-
Filesize
958KB
MD51edd60395489628c726cb5348314fa95
SHA19f4b3da1336fa868e46d3fccae8ca063bafccccf
SHA256458a75d7a79878b2e9e92c1a6d47888677fae212f45483a6e74aa5ebd5905b60
SHA512c9afaa64b3d7543e1bd1a5eb530274f447a5316b014323c94dbb18e51c1ae71c2112b1a4a110c8f50a23f846b2594e1153be5dbb19215e41bbfaff5c988ce0fa
-
Filesize
398KB
MD58e6ff5e54bd061025e448bb4f7b6ca60
SHA1dc2297eef6f46ff3262bf1e9c0537152f2aa503e
SHA2565ca2ab3b7820e55cdb188a4d72c3c4a680e3908a89a95483a357ed3e091104f5
SHA512f0329d64a8a3010eea811dc3ecc65eb5e5aaa4712e039283a19675ec618bcfc4fc839489bcfd05430093e877b85634c3c3101a66e2c1c3b93f93bb8e9eb1b621
-
Filesize
840KB
MD593fd2138d64aae566f68aab4e5d0f5e4
SHA14f6cba5cea6b4aa1a2b82cc1bc8f12293fffcc02
SHA2562e2a35bc89602bce350bd53e315d3906a62722398a0dc2750736154239965f77
SHA512e20a93a685f95ef195107b10821d9700a26e4f8a857cce1ef13f15ed1861dc5d40f124f44a453d0667b812f6d08a931732e7b1881e62f58da1a63a4fe582946d
-
Filesize
2KB
MD5a657344ef8e30d4903d9b7b5b9070afb
SHA181f2198234b6c1322b5810434efdb31896ecb6be
SHA256e2720676b79ae3e2877688e2ee213aa94d1b35f8649ba3261d8fc78032c88532
SHA5126a1ef8d525d2f8f2643644a204fa0952c760e28285b1592e4cbca27e97c0770822f7f894892dd39baa5b644e32e83c32723f22d4bbf6d3d90d32e1faea55efd4
-
Filesize
1000B
MD5b1044dcc41a9e985ab900637ece5ab0f
SHA1f7360ce050358e69b86386f78be6277a477826fa
SHA256588e47033988f3e4e33fa7814615fa4941c489367cb39f49416249317a816305
SHA512627d501fd1b8917b0ef34f06409b597d29fd1e2b6d0bc83bde7740ed43258b6a83103bb4a5caf2c56238dee52a6919c46df8fd58bfe911e03a8f5e474db0f8c5
-
Filesize
2KB
MD5a49ad499282c1acc8d1d2f02d7ce1479
SHA1fee6a14a6bfdab0461ac1693fd3e220f0e9b5c69
SHA256a9add39e99c2b8bcf19084f0da73f3e618302d24eddca13959785dea76effed7
SHA512e4a75d5ea710fbf6915358997462f97dc3342390c4770bea8b3af9e722195d2bad140976f4de8c7288cbdf95630b5870b5a7a9d2641b6bdd089e14e0123c2101
-
Filesize
923B
MD5b8aa2738f74479ba1d35e8e26f9f719b
SHA1f1d7e7b7ff938ee068d1740be90fb3d0cebbdc83
SHA25638170da5d717ec3f57f59f39cc706508bb41165fb76c3811a18fe48f0007c412
SHA512debb74d941d21c9b5d70aeaab4df08ad201443ea9d641c6471b91f57e5359c04b30979165fde9de6f461c4476f7575e0545adb3b3dbe8b2285c162ae46833d06