Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe
-
Size
674KB
-
MD5
69ed8d950ab11568faf970c77050ad90
-
SHA1
94590af7ceeda99dc57e82f8e31c4078e966d530
-
SHA256
a3a0ad90fa7f0dee991112e3e30a8f48264c6ca2030ca7e8d5da9144936796f7
-
SHA512
ffa06f77f0707e5ef6a0ec0b85c4166066c7167e9c4a0d5bfed627704a0da308e5316b36c3b9c0cdf1862bc00dbada8006e7b009f5baa557b5311cf3e260f21d
-
SSDEEP
12288:Io8IJt524U/eCC02cSpVAqA+lOBsuVdC5D/ZLx2KXa84svzvF6TU:Tn524fAWlOYRzaDczt6T
Malware Config
Signatures
-
Expiro family
-
Expiro payload 1 IoCs
resource yara_rule behavioral2/memory/3980-111-0x0000000100000000-0x0000000100293000-memory.dmp family_expiro1 -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 6 IoCs
pid Process 1472 elevation_service.exe 3648 elevation_service.exe 2184 maintenanceservice.exe 3632 OSE.EXE 2388 ssh-agent.exe 3224 TrustedInstaller.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3442511616-637977696-3186306149-1000 elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-3442511616-637977696-3186306149-1000\EnableNotifications = "0" elevation_service.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: elevation_service.exe File opened (read-only) \??\I: elevation_service.exe File opened (read-only) \??\K: elevation_service.exe File opened (read-only) \??\P: elevation_service.exe File opened (read-only) \??\T: elevation_service.exe File opened (read-only) \??\X: elevation_service.exe File opened (read-only) \??\Y: elevation_service.exe File opened (read-only) \??\L: elevation_service.exe File opened (read-only) \??\R: elevation_service.exe File opened (read-only) \??\S: elevation_service.exe File opened (read-only) \??\U: elevation_service.exe File opened (read-only) \??\V: elevation_service.exe File opened (read-only) \??\W: elevation_service.exe File opened (read-only) \??\Q: elevation_service.exe File opened (read-only) \??\Z: elevation_service.exe File opened (read-only) \??\E: elevation_service.exe File opened (read-only) \??\H: elevation_service.exe File opened (read-only) \??\J: elevation_service.exe File opened (read-only) \??\M: elevation_service.exe File opened (read-only) \??\N: elevation_service.exe File opened (read-only) \??\O: elevation_service.exe -
Drops file in System32 directory 59 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\Agentservice.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe elevation_service.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\vds.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\svchost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\vds.exe elevation_service.exe File opened for modification \??\c:\windows\system32\wbengine.exe elevation_service.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\snmptrap.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created C:\Windows\System32\WindowsPowerShell\v1.0\odlfeqoq.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\alg.exe elevation_service.exe File created \??\c:\windows\system32\ihpkbmgb.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\windows\system32\qpfhgehd.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\searchindexer.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\dllhost.exe elevation_service.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\spectrum.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\wbengine.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\msiexec.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\locator.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\windows\system32\lpepicpd.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\alg.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\dllhost.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\windows\system32\cbefemkm.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe elevation_service.exe File opened for modification \??\c:\windows\system32\lsass.exe elevation_service.exe File opened for modification \??\c:\windows\system32\fxssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\msdtc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\lsass.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\msdtc.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\windows\system32\ggkeiccb.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\msiexec.exe elevation_service.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe elevation_service.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\Agentservice.exe elevation_service.exe File opened for modification \??\c:\windows\system32\searchindexer.exe elevation_service.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\Appvclient.exe elevation_service.exe File opened for modification \??\c:\windows\system32\locator.exe elevation_service.exe File created \??\c:\windows\system32\kaohfbde.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\vssvc.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\vssvc.exe elevation_service.exe File opened for modification \??\c:\windows\system32\fxssvc.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\windows\system32\qmnbehle.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\spectrum.exe elevation_service.exe File opened for modification \??\c:\windows\system32\svchost.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\Appvclient.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\snmptrap.exe elevation_service.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\pfbgpjqo.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe elevation_service.exe File created \??\c:\windows\system32\openssh\hiaqcoki.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe -
Drops file in Program Files directory 38 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7zG.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe elevation_service.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\klonohhl.tmp elevation_service.exe File created \??\c:\program files\google\chrome\Application\123.0.6312.123\defjjikm.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\program files\windows media player\klmaldhb.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\ddhabbeb.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\gipjfqfg.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe elevation_service.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\dklkkafp.tmp elevation_service.exe File created C:\Program Files\7-Zip\pijiegfa.tmp elevation_service.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe elevation_service.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\7z.exe elevation_service.exe File created C:\Program Files\7-Zip\ncjookla.tmp elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe elevation_service.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe elevation_service.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\amhadgcp.tmp elevation_service.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\nnknaeep.tmp elevation_service.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe elevation_service.exe File created C:\Program Files\7-Zip\afaqkaok.tmp elevation_service.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created C:\Program Files\Internet Explorer\ookgmffm.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\nklemblo.tmp elevation_service.exe File opened for modification \??\c:\program files\google\chrome\Application\123.0.6312.123\elevation_service.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\program files (x86)\mozilla maintenance service\njknpdjh.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File created \??\c:\program files\common files\microsoft shared\source engine\hncifaif.tmp JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe elevation_service.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe elevation_service.exe File created C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TrustedInstaller.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe 1472 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3980 JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe Token: SeTakeOwnershipPrivilege 1472 elevation_service.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer elevation_service.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" elevation_service.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69ed8d950ab11568faf970c77050ad90.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1472
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3648
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2184
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3632
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2388
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD598d15296461d2dc7698b8e99c840b881
SHA191758a0e85c93ca499385e041982b04712434866
SHA256b2f07ec95f287ecb75db7ad358d99fe22f486eede1ea494f470e9c5ff3c463fe
SHA5121a5ceda8fa4265d9d39b368dad6653c9ba16abd7c8a5d614e83ec08672ccf7808b0f877133a56899088c89fed3e74cc21aee393d5d87946bc67eedff345d014e
-
Filesize
781KB
MD5d068eac7fc60e3fb6f3063fb0564a90a
SHA17a7dc754b5cfcbdb67bc34952a712038ec58c9a8
SHA2563830ad857c838d493228ad762548c089b9b7ff8198c0bed6aef87511e292ed76
SHA512dacb56a2f92608b511391aa7b421e94eab57f3644ce058d58cbe500f15fd0421f478d03c2ce7c145efeed38d1b56788c81810607b086664535578d16ecd73814
-
Filesize
1.1MB
MD5a6ddedfbf3a2987238c5a3d429505ac1
SHA11878780667488e5ab70b51f6ab21d131c9098623
SHA25641e630bbcd79bbdaa4db643ebdf394c6c744f2a2aea716ff4292cc8331e6d2a8
SHA5129c54622d44fb67bd991ca62816511d269b775013e4d268166a343eec1837a483e53f4215934c17089a34bb1969f1293feaa96f79611b8b11b8f818d3d38eea2d
-
Filesize
797KB
MD54b35e00bc100b47c6c4063f4bac14b51
SHA1d7bec5d164eba6ac21fdaff5f2f9c89240b150ec
SHA2564730c36dbf73063403c996fc7067a70fe87b509d08c2abee5ed160ce5a630796
SHA51219dc16eb1ed014a7a5dfd098eca866cc9aa460665cb9475a766fefd71629a9d4e751410fcda85b9171039b90f197d1870a5c4de9f6ceb0018fec03499a5f9fe1
-
Filesize
2.1MB
MD509379951d2e90abbf7d1d12cddc46117
SHA1d026538cae4617cc9a340d9618efcf5205a8cb8f
SHA256d0d1bf43a94a929d83713f94844169495548e76bc8f5d188be535e8ea6b4ad37
SHA5123e0c5b27e4cbe5a33f1dbc0014fe1f666d1ad9bfdec8dabe03d1fc779b675bbcf5eeb8869dc34acccdae2f656f38875a33ea0529944590fcdda27f8656344b72
-
Filesize
932KB
MD567958bf0dc1f5fd8332db0ee897b8c39
SHA114381baf5e7c75860597c50ef75124f28e60eb95
SHA2565aed964117c1e4f3af75a6c13f0a4b2f42137f96c00aa3433469ee2cf70afad0
SHA51290d0672e17eb58bde6ac95ba9e6d731bb536af2891b6dbedd4fe82ab5186fac73e1ae93311ec34aa59fd1063a2840ca5c7e3b8f213568c7b1aeef6450522aaba
-
Filesize
1.3MB
MD57f361e9e17abaf09381468b6c5cc04f6
SHA1e86d4241d75937844c4296ecd6b5f2a798923004
SHA256242e19fdd73d95264410da15fdbd92ae6199515a104424d98edc171ea6ddd59d
SHA51295b9ea41e1567ee657d748a5db0d8451fd55bd9b0b223ef36001cdcfe38b0b1c68dac51d45a77212dc9c7580f38ef0c94bc7772fc982762ff878ef432c93f9e7
-
Filesize
193KB
MD5805418acd5280e97074bdadca4d95195
SHA1a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6
SHA25673684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01
SHA512630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de
-
Filesize
1.5MB
MD54b7b8d9c4de64115a99d1f5ca98ee10d
SHA1383f40adb2769ddeaa3f7e67caaa7337e1bfbe9a
SHA2560d4aa0465e6d445cbedd985e6f7b27d5f4b53ac19100706cfaaa894d1edac256
SHA5123e339b53ebed9e2b5d2e6779cf2c1c9bb7fd700ee64803e67f6977cad2d2a87d4b89032a073d393121c0b7fb70a054e79043685cfbbc942f22cc360f353b3bc1
-
Filesize
1.7MB
MD5d7d89aafd194681b79f4fef63ac8496b
SHA187007694d88771450bf486825036dfb652328f26
SHA256e01bdbbca3e948b12443cf73d4a7d527e2dd01b31f13126bae23e884d3bbac97
SHA512007cfa68e570d15492ebf249907c0c474742c202b74676e96a74b7cb6ce27688e08a8f9a36dd34fc3b21fc42b79345cd9a8d660bba720a4dc9dac156544c9d5f
-
Filesize
1.2MB
MD57633d9c29a1fa0930e60ea4a45c29bca
SHA174ab8c250f68cbbbf0e74e93887283459cfd394d
SHA2563febf179e8e462252326fdb79851b16dbccebaf5988f0dc48a718dcf0414f4f6
SHA51246c6761fc2307aa0f57cbdf5c783f56824e0a5396563971c9d211ae97a0d9469d85dcd53cff0bf0b418339cad2cafbb6d05c79391e1272bad6fe10e6164eb982
-
Filesize
700KB
MD53cd7df682f5ee9e9ed3c9d801b4e64ae
SHA1a28cf99e7907461ce2b47985f5e2da65e68968af
SHA25670ac9405870f4d51525b6819af5e6c1d885fdbeab7f93297cfe005914da49c70
SHA51261b9ba7abcd96466a9360acb3b8f3fa42a67f16a3baf50c7096fe8ee010f32e39dd289f1290d575bb9dacdd8ac9daabaa474bb0dffea4511acd17441384ec7e9
-
Filesize
623KB
MD5e6ee19745d2b4050818415769add9069
SHA1252034b56169c8a459efc36fd743e132f860d724
SHA25652d5df9c916c0b9fd92972b86729b762d988bf997e91fda9f4a170fbce4d4461
SHA51230250aa37409f59566ea5538577362eabe73f9d9ade64735fd55022801b9913a957fd043dc5b3309be431b08204d4581839832909015e5ebb923a5ee4e1182b2
-
Filesize
572KB
MD582f0253b0806626b1feebaabc31a9f1f
SHA10523c602db27aba4e4355da2d97a69b5afddfec7
SHA256fb9344fdc7f15ec887a3888ed3abc1700abe51b61cbf80380cfafca99cbe0afa
SHA51204a9edb577d53e1c5caf50ed2d11c494f54485b18facadf13f4a0111a06b9d7920e6b64817b0580ed905bf397edccce681d477127c62b79e7306580f7070956e
-
Filesize
2.1MB
MD52d1ab002ab725d49ceaa6ef239272cba
SHA14c4df39f65ef1c71183aba3a50e2084036e491c2
SHA256e1ba358e731aa1f0b9a9a74a62cdb4effe444775449900b5115df3a2479ce13d
SHA51269ae0ce55ba8ccbcc8db5f0e9008d424418e561aeecd95f2975fe4c820d2ef3427395a174a4080c4005de68be9ab17e55777ffeefbd92707e9395aeec64d2fb7