Analysis
-
max time kernel
164s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 00:37
Behavioral task
behavioral1
Sample
ca0aa2179c974faa17ac77d52610e6b9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca0aa2179c974faa17ac77d52610e6b9.exe
Resource
win10v2004-20240226-en
General
-
Target
ca0aa2179c974faa17ac77d52610e6b9.exe
-
Size
862KB
-
MD5
ca0aa2179c974faa17ac77d52610e6b9
-
SHA1
eaa0b8b57420f282695da3114bd8a956b5494d8f
-
SHA256
014526d65a3edda386a301dadd624f575c4895f2666d843fd2a5d1cb2be18d4b
-
SHA512
17d330adacac922b3110f561c56190a21ccb551ef02eb553aa00ff9c46395c01dfd134aee03670d1be8088652b385cc1111722bddb78de4692bd418973feee45
-
SSDEEP
12288:MB2EKwuo3ERIzwRe6axp0fmaxcsaauf854:MB2EFwne1saLf8K
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/memory/3812-21-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020043-25.dat family_neshta behavioral2/memory/3812-37-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3812-71-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3812-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3812-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3812-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0007000000023232-123.dat family_neshta behavioral2/files/0x0004000000009f88-128.dat family_neshta behavioral2/memory/3812-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020170-130.dat family_neshta behavioral2/files/0x0004000000020162-135.dat family_neshta behavioral2/files/0x000600000002005a-143.dat family_neshta behavioral2/files/0x0004000000020136-142.dat family_neshta behavioral2/files/0x00010000000200bc-141.dat family_neshta behavioral2/files/0x0004000000020175-140.dat family_neshta behavioral2/files/0x00010000000200d4-139.dat family_neshta behavioral2/files/0x0001000000020052-136.dat family_neshta behavioral2/files/0x000600000002003f-134.dat family_neshta behavioral2/files/0x000600000002004b-133.dat family_neshta behavioral2/files/0x00070000000200ab-131.dat family_neshta behavioral2/files/0x0006000000020062-144.dat family_neshta behavioral2/files/0x000100000002135f-149.dat family_neshta behavioral2/files/0x000100000001680e-162.dat family_neshta behavioral2/files/0x0001000000022cd9-186.dat family_neshta behavioral2/files/0x0001000000022cd5-185.dat family_neshta behavioral2/files/0x00020000000213f2-188.dat family_neshta behavioral2/files/0x0002000000000729-187.dat family_neshta behavioral2/files/0x0001000000016923-184.dat family_neshta behavioral2/files/0x000100000001df94-183.dat family_neshta behavioral2/files/0x000100000001e00b-182.dat family_neshta behavioral2/files/0x000100000001df9e-181.dat family_neshta behavioral2/files/0x000100000001dfa9-180.dat family_neshta behavioral2/files/0x000100000001df9f-179.dat family_neshta behavioral2/files/0x000100000001df9d-178.dat family_neshta behavioral2/files/0x000300000001df9b-177.dat family_neshta behavioral2/files/0x000100000001dfa0-176.dat family_neshta behavioral2/files/0x000100000001dbe6-175.dat family_neshta behavioral2/files/0x000100000001dbe4-174.dat family_neshta behavioral2/files/0x000100000001dbda-173.dat family_neshta behavioral2/files/0x00010000000167cf-172.dat family_neshta behavioral2/files/0x00010000000167f5-171.dat family_neshta behavioral2/files/0x00010000000167f6-170.dat family_neshta behavioral2/files/0x00010000000167d1-169.dat family_neshta behavioral2/files/0x0001000000016811-168.dat family_neshta behavioral2/files/0x00010000000167d9-167.dat family_neshta behavioral2/files/0x0001000000016861-166.dat family_neshta behavioral2/files/0x00010000000167d5-165.dat family_neshta behavioral2/files/0x00010000000167d7-164.dat family_neshta behavioral2/files/0x00010000000167bc-163.dat family_neshta behavioral2/files/0x0001000000022d92-161.dat family_neshta behavioral2/files/0x0001000000022d95-160.dat family_neshta behavioral2/files/0x0001000000022d53-159.dat family_neshta behavioral2/files/0x0001000000022d56-158.dat family_neshta behavioral2/files/0x0001000000022d94-157.dat family_neshta behavioral2/files/0x0001000000022d55-155.dat family_neshta behavioral2/files/0x0001000000022d54-154.dat family_neshta behavioral2/files/0x0001000000021309-153.dat family_neshta behavioral2/files/0x0001000000021308-152.dat family_neshta behavioral2/files/0x0001000000021307-151.dat family_neshta behavioral2/files/0x00010000000223fe-150.dat family_neshta behavioral2/files/0x000100000002135e-148.dat family_neshta behavioral2/files/0x000100000002135d-147.dat family_neshta behavioral2/files/0x000200000002013a-146.dat family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation ca0aa2179c974faa17ac77d52610e6b9.exe Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation ca0aa2179c974faa17ac77d52610e6b9.exe -
Executes dropped EXE 2 IoCs
pid Process 4936 ca0aa2179c974faa17ac77d52610e6b9.exe 2432 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ca0aa2179c974faa17ac77d52610e6b9.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{17316~1\WINDOW~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13185~1.17\MICROS~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI391D~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{FB050~1\WINDOW~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~3.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI9C33~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ca0aa2179c974faa17ac77d52610e6b9.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com ca0aa2179c974faa17ac77d52610e6b9.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4312 schtasks.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ca0aa2179c974faa17ac77d52610e6b9.exe Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings ca0aa2179c974faa17ac77d52610e6b9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3812 wrote to memory of 4936 3812 ca0aa2179c974faa17ac77d52610e6b9.exe 90 PID 3812 wrote to memory of 4936 3812 ca0aa2179c974faa17ac77d52610e6b9.exe 90 PID 3812 wrote to memory of 4936 3812 ca0aa2179c974faa17ac77d52610e6b9.exe 90 PID 4936 wrote to memory of 2432 4936 ca0aa2179c974faa17ac77d52610e6b9.exe 105 PID 4936 wrote to memory of 2432 4936 ca0aa2179c974faa17ac77d52610e6b9.exe 105 PID 4936 wrote to memory of 2432 4936 ca0aa2179c974faa17ac77d52610e6b9.exe 105 PID 2432 wrote to memory of 4312 2432 svchost.com 106 PID 2432 wrote to memory of 4312 2432 svchost.com 106 PID 2432 wrote to memory of 4312 2432 svchost.com 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca0aa2179c974faa17ac77d52610e6b9.exe"C:\Users\Admin\AppData\Local\Temp\ca0aa2179c974faa17ac77d52610e6b9.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ca0aa2179c974faa17ac77d52610e6b9.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ca0aa2179c974faa17ac77d52610e6b9.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cvGpia" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF3B2.tmp"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /TN Updates\cvGpia /XML C:\Users\Admin\AppData\Local\Temp\tmpF3B2.tmp4⤵
- Creates scheduled task(s)
PID:4312
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5744389fb1d6b175819d8d280eec195cd
SHA15a7f6a54a8e097d8d706de5326a009333bc358d4
SHA2562c324c7bf3b2b273cb6abd0454257a486d4d5359bf05866c75da3de5ad653819
SHA5122223bde199a8da84f94b6a0ab17668524d52cebe877b44c09205524c76de47d5d66297f0212d04715a99a82161f65a0ed74521ec3cdac20ad38d58d9f746213e
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
128KB
MD5f20e2a96ebdb73b70efdc988fbc5e219
SHA1864073a5d990ceadcf6d0133113911611a639488
SHA256e65d3d210c37fbff06eb1fa74cd12820a2d688fd76c99c97a8ac5f254f2011b5
SHA5122387d41b4bce0209c2ee74182d3add0109c0de4c997b481f60804b1818ff1da3f477cc1a9d122209236ed0914abcd68e43010358e361065e35689e38c019551b
-
Filesize
175KB
MD5576410de51e63c3b5442540c8fdacbee
SHA18de673b679e0fee6e460cbf4f21ab728e41e0973
SHA2563f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe
SHA512f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db
-
Filesize
1.8MB
MD5149895df94b0a1ef21a32c4574de81f6
SHA166d23a17da10752356f49da929c9cd02d867800d
SHA256532ae73fb92addb987eb0a75de2aa4105cbe99dea5721c0f2c7707bf396c8ed3
SHA51269471f7404f5f86f543360f809f3257caf03f31ed666305c2232150f11fa20d755857218bb7a5ff2dcd9a92028516aa3f16810efde3e4e58bb72116a48944e03
-
Filesize
2.4MB
MD58ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA2568268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA5120b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427
-
Filesize
128KB
MD5de4e02489a3a401dd45ee0b77a37bc0f
SHA157c12bf56834f3d94adf2e33375b7acaacad1d23
SHA256217c1010b8607d7d716c1bcbd4d1543723eee70a5a6b8e3eccc78c9a6589e8b4
SHA5129c405d07f5c8fb31272f65ed8e0de329df731e1a9753cf28c3f632e077e2892329cdd535106385fd255b4525675ef4771541ea80e05775fcf418e4eb759a01cf
-
Filesize
92KB
MD5176436d406fd1aabebae353963b3ebcf
SHA19ffdfdb8cc832a0c6501c4c0e85b23a0f7eff57a
SHA2562f947e3ca624ce7373080b4a3934e21644fb070a53feeaae442b15b849c2954f
SHA512a2d1a714e0c1e5463260c64048ba8fd5064cfa06d4a43d02fc04a30748102ff5ba86d20a08e611e200dc778e2b7b3ae808da48132a05a61aa09ac424a182a06a
-
Filesize
147KB
MD53b35b268659965ab93b6ee42f8193395
SHA18faefc346e99c9b2488f2414234c9e4740b96d88
SHA256750824b5f75c91a6c2eeb8c5e60ae28d7a81e323d3762c8652255bfea5cba0bb
SHA512035259a7598584ddb770db3da4e066b64dc65638501cdd8ff9f8e2646f23b76e3dfffa1fb5ed57c9bd15bb4efa3f7dd33fdc2e769e5cc195c25de0e340eb89ab
-
Filesize
125KB
MD5cce8964848413b49f18a44da9cb0a79b
SHA10b7452100d400acebb1c1887542f322a92cbd7ae
SHA256fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5
SHA512bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d
-
Filesize
142KB
MD592dc0a5b61c98ac6ca3c9e09711e0a5d
SHA1f809f50cfdfbc469561bced921d0bad343a0d7b4
SHA2563e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc
SHA512d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31
-
Filesize
128KB
MD55cf8ce062d84ca8d1d6ab40eec38d4b6
SHA15897be9c993881d5013179b3034a56906c6c4a00
SHA25672ec5df02aaf6417ba9cbaaebe4292358e93f8553d230be0eec0ce2926936fe6
SHA5123903a0ba01bc0a31415d86604c949bd66a0f36d2b1324277befa27e418ad523154d45f31000dc50196d07b45c36664f7d3cd443281dbe7de18363359c1392e0d
-
Filesize
454KB
MD5bcd0f32f28d3c2ba8f53d1052d05252d
SHA1c29b4591df930dabc1a4bd0fa2c0ad91500eafb2
SHA256bb07d817b8b1b6b4c25e62b6120e51dec10118557d7b6b696ad084a5ba5bfdeb
SHA51279f407735853f82f46870c52058ceee4d91857a89db14868ee1169abd5c0fd2e3fa1ed230ab90b5f479a9581b88998643d69b0df498defea29e73b0d487f3b10
-
Filesize
1.2MB
MD5d47ed8961782d9e27f359447fa86c266
SHA1d37d3f962c8d302b18ec468b4abe94f792f72a3b
SHA256b1ec065f71cc40f400e006586d370997102860504fd643b235e8ed9f5607262a
SHA5123e33f2cdf35024868b183449019de9278035e7966b342ba320a6c601b5629792cbb98a19850d4ca80b906c85d10e8503b0193794d1f1efa849fa33d26cff0669
-
Filesize
555KB
MD5ce82862ca68d666d7aa47acc514c3e3d
SHA1f458c7f43372dbcdac8257b1639e0fe51f592e28
SHA256c5a99f42100834599e4995d0a178b32b772a6e774a4050a6bb00438af0a6a1f3
SHA512bca7afd6589c3215c92fdaca552ad3380f53d3db8c4b69329a1fa81528dd952a14bf012321de92ad1d20e5c1888eab3dd512b1ac80a406baccc37ee6ff4a90dc
-
Filesize
1.2MB
MD5d1c48274711d83d4a1a0cfb2abdf8d31
SHA1b4367dd7201ef0cc22d56613e428efda07da57a8
SHA256ade1db79870327538841d5470483c6474083f08d871bb7d56cfc9e76971c8640
SHA5127a3e7927b8be3dc1706e6511bf04475558da076696435f937c4eafa94111c378f3bcaa1ea4e5063e91e3e333c91f086a75baaff6c5cc190d3d314c5eee1687a3
-
Filesize
771KB
MD5028aea45f143a63ba70146a4abe2ceeb
SHA1c616258da4d8a7c9ff7dd5fff089d983d1553e09
SHA256adc7b8fc26491206149496e2bceaf3686424274f444f14e2dd6fbf2ac7423ddf
SHA512a266d0e2fd2676db41317622938cc03ff33c1904129d4ba0ef2d97a88313c882e719c8d4798c18a97ca64bc5ebdb90dd05290f25569e967966e2f5399f1f511d
-
Filesize
121KB
MD5cbd96ba6abe7564cb5980502eec0b5f6
SHA174e1fe1429cec3e91f55364e5cb8385a64bb0006
SHA256405b8bd647fa703e233b8b609a18999abe465a8458168f1daf23197bd2ea36aa
SHA512a551001853f6b93dfbc6cf6a681820af31330a19d5411076ff3dbce90937b3d92173085a15f29ebf56f2ef12a4e86860ac6723ebc89c98ea31ea7a6c7e3d7cdc
-
Filesize
325KB
MD59a8d683f9f884ddd9160a5912ca06995
SHA198dc8682a0c44727ee039298665f5d95b057c854
SHA2565e2e22ead49ce9cc11141dbeebbe5b93a530c966695d8efc2083f00e6be53423
SHA5126aecf8c5cb5796d6879f8643e20c653f58bad70820896b0019c39623604d5b3c8a4420562ab051c6685edce60aa068d9c2dbb4413a7b16c6d01a9ac10dc22c12
-
Filesize
325KB
MD5892cf4fc5398e07bf652c50ef2aa3b88
SHA1c399e55756b23938057a0ecae597bd9dbe481866
SHA256e2262c798729169f697e6c30e5211cde604fd8b14769311ff4ea81abba8c2781
SHA512f16a9e4b1150098c5936ec6107c36d47246dafd5a43e9f4ad9a31ecab69cc789c768691fa23a1440fae7f6e93e8e62566b5c86f7ed6bb4cfe26368149ea8c167
-
Filesize
505KB
MD5452c3ce70edba3c6e358fad9fb47eb4c
SHA1d24ea3b642f385a666159ef4c39714bec2b08636
SHA256da73b6e071788372702104b9c72b6697e84e7c75e248e964996700b77c6b6f1c
SHA512fe8a0b9b1386d6931dc7b646d0dd99c3d1b44bd40698b33077e7eeba877b53e5cb39ff2aa0f6919ccab62953a674577bc1b2516d9cadc0c051009b2083a08085
-
Filesize
155KB
MD596a14f39834c93363eebf40ae941242c
SHA15a3a676403d4e6ad0a51d0f0e2bbdd636ae5d6fc
SHA2568ee4aa23eb92c4aba9a46b18ac249a5fa11c5abb7e2c1ca82cd5196401db790a
SHA512fbf307a8053e9478a52cfdf8e8bad3d7c6664c893458786ae6ee4fffc6fe93006e99a2a60c97fb62dad1addd5247621517f4edee5d9545717c4587a272cef9a2
-
Filesize
230KB
MD5e5589ec1e4edb74cc7facdaac2acabfd
SHA19b12220318e848ed87bb7604d6f6f5df5dbc6b3f
SHA2566ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67
SHA512f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a
-
Filesize
155KB
MD5f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA51228bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c
-
Filesize
265KB
MD525e165d6a9c6c0c77ee1f94c9e58754b
SHA19b614c1280c75d058508bba2a468f376444b10c1
SHA2568bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217
SHA5127d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf
-
Filesize
342KB
MD55da33a7b7941c4e76208ee7cddec8e0b
SHA1cdd2e7b9b0e4be68417d4618e20a8283887c489c
SHA256531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751
SHA512977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6
-
Filesize
439KB
MD5400836f307cf7dbfb469cefd3b0391e7
SHA17af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8
-
Filesize
207KB
MD53b0e91f9bb6c1f38f7b058c91300e582
SHA16e2e650941b1a96bb0bb19ff26a5d304bb09df5f
SHA25657c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d
SHA512a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f
-
Filesize
139KB
MD59a91d53f0dc073ae102fcb107e1cab49
SHA1081d577751e2ef831cae482a2dfcb071b8d33121
SHA256a0aa8127c0c49516d7229f55e26e20269127e2b6bcfcf8d39b067c96208f61ba
SHA51244bd2eac46a1b19a5df0c8df4c1d9b12f591eb0f556df6f0ac872e2b87f4176af65c6954805c65021b8668d567b940d47060064d4ba38983840f9f06b2e5df14
-
Filesize
139KB
MD5147b5ade315673b925bdd21eba5d9732
SHA1212b9882f166b187ef578298ee4bfdd174529115
SHA256d49c72831f1b505b1846b23c3bf836219e27ea69e8fd43e8e4ca3ead7601252b
SHA5127bb8186c67a20471d54fd37f3db55edaf86cdb34861359df092e1251ccadb80e2a71197304d192ccb5df0111676017be6823fd85617fefcb366ac405878caab0
-
Filesize
768KB
MD583ca87d8e9c97a883a76389f2afc916a
SHA1733f74f02841d9731a19fcce88a20c9ecf52f388
SHA256bf12317d9f68c8df7d64685537a33970d19123e24ffac3345272e6a57ece9b08
SHA512c27fdc46788ab5a73d69e7e5e3e9ea3a9f47c17e521630ee028335ecae70391da992cb51b639a97a33d5f64e5c1d03a9228b8d88e0317f928fe5188299b84171
-
Filesize
242KB
MD5247348036dbe419034c3289f577ec6ea
SHA16adfd450bd84a629c612c7a2f8b2a613afb49245
SHA25629af76a6a5c935cae799cba744b4604da06d69f30e272a873f15ecfd57043b1d
SHA5121c8c636f9a1c3c0e4f92ef026f9509fd29d696823bb1c7086b877f6f32663c2c42a83ea51c9751192cae331ad25733b417030dba81654fd747903cc3eae11025
-
Filesize
302KB
MD50f087e158950e3f1d665448e3336bf19
SHA10e2ce75f02bbfe87b0837651e3e027075190be34
SHA25632de49b2fe1b519af7ab9b31986f3fab62718e2235c4e50d60be83b6ac25b9fb
SHA5125fce7ac2e152e110eab3ee775e077f85b21f55681934c5a86fe35c765882ad8309a494ca541efc7f3cfd4f6f565420626319521e3a96df489568727d2117ce10
-
Filesize
256KB
MD54cffb68680511742ad8a15d3c261387c
SHA1754153050f13c2e54713b7be3c939a0d04cc87e2
SHA2569700b052d9424d6397e8c0da2274b5bdd9c49a5b6943def938481a0b9a05aa60
SHA512edeaa427cdc0c2a18c679ced0cc6ddfcd6e619fbe344b86486ea6ad8f3b93cf874a1055b9260159108a9698acdaa11ea82e6fac91938886f670c66dad6f52981
-
Filesize
223KB
MD59a4c4a24d3fb6b6c731cd3b4d750336c
SHA1cf2c5968b62ce3afb3c5cc56b0e1f6b9982590e4
SHA2567e08ef2506ca12f42eb5c640a3b69d096e8a91be924f4c81f2841c2532640d65
SHA512616fdf320f979c4b34f6790e4aa6228e29e7f1bf0e232597e81c57252b5b2aefa4664cf59f0f2cfefdd281ee5846f5f465b9cc81ff9c14c665e03cfbc7536726
-
Filesize
704KB
MD5fbcaa39db1800d5c0796bfb8f522d2be
SHA1b0ce75a0faca137a0b0f6c32dd623336f79d9e44
SHA256a1af174cd642729faf85b1400d082152a6c40e162f106e772bc397fe1942a283
SHA51249345e90519913ff9a8df3bd8e940997995835965939890bf40ce3fe5436677fe4a504db4ae39f9fffce96ba3dc4730b1c431d8ffe007e1b288432ed81fb81b5
-
Filesize
250KB
MD55d656c152b22ddd4f875306ca928243a
SHA1177ff847aa898afa1b786077ae87b5ae0c7687c7
SHA2564d87b0eb331443b473c90650d31b893d00373ff88dcbcb3747f494407799af69
SHA512d5e50ee909ea06e69fc0d9999c6d142f9154e6f63462312b4e950cf6e26a7d395dbb50c8e2a8c4f4e1cfb7b2c6ae8ad19e3b7c204c20e7557daa1a0deb454160
-
Filesize
448KB
MD5529fa6a4681fdd5335f8c6a2a9c82171
SHA196fe17259a1f6dbd93a6dab0b8660fdada06a338
SHA2568abc395e5a57899be1813429b2274d029bd6d9c482f1f9c4cc99d48884d7b915
SHA5125cf980e28febb6ce59695f881890ee2ce8ee262b1bca3db4aaf9c52be5186eb375621e67fa73a1a0a3b79da5b6499966dc5019dd26609d6307764a2dd90a92d8
-
Filesize
138KB
MD55e08d87c074f0f8e3a8e8c76c5bf92ee
SHA1f52a554a5029fb4749842b2213d4196c95d48561
SHA2565d548c2cc25d542f2061ed9c8e38bd5ca72bddb37dd17654346cae8a19645714
SHA512dd98d6fa7d943604914b2e3b27e1f21a95f1fe1feb942dd6956e864da658f4fbd9d1d0cf775e79ceaae6a025aafd4e633763389c37034134bd5245969bec383e
-
Filesize
1.1MB
MD5f7407ff9b14d8028eda4ffa8b28fbe7d
SHA15a314c2a85c05e44318f1c9becbe5a933383135e
SHA2565b3f205d7a933ba481670d11719d20b482b220fad1b7addcb2e9d8ed7a087380
SHA512547d76af3aaa123c756fb11f5e9e4612dc3e0919911954a3cb7bd85d84eaf46b69c2982e16edf067f8f2091303fbe4247f3ff26c975923cde896ff85b41e72cc
-
Filesize
1.1MB
MD5301d7f5daa3b48c83df5f6b35de99982
SHA117e68d91f3ec1eabde1451351cc690a1978d2cd4
SHA256abe398284d90be5e5e78f98654b88664e2e14478f7eb3f55c5fd1c1bcf1bebee
SHA5124a72a24dec461d116fe8324c651913273ccaa50cb036ccdacb3ae300e417cf4a64aa458869b8d2f3b4c298c59977437d11b241d08b391a481c3226954bba22e4
-
Filesize
2.9MB
MD5e7f9cd602ec546e97a2177569d75cb9e
SHA15b324cdc7a80b8513db9e1f6b9437f4635eea1ad
SHA25647b99d0545c24f1f0db67a30a32920de5426632b81bab3803d7623900888b4ba
SHA512dbb542bb12211bffe848d42c9b273ea6660621baf4c0600703767c86616a589ad0dc0790ccb5165b24b02cb8f83b018159df580c20476432a74205e74e9b7f41
-
Filesize
1.1MB
MD5a5d9eaa7d52bffc494a5f58203c6c1b5
SHA197928ba7b61b46a1a77a38445679d040ffca7cc8
SHA25634b8662d38e7d3d6394fa6c965d943d2c82ea06ba9d7a0af4f8e0571fb5a9c48
SHA512b6fdc8389bb4d736d608600469be6a4b0452aa3ea082f9a0791022a14c02b8fb7dcd62df133b0518e91283094eaba2be9318316f72d2c4aae6286d3e8686e787
-
Filesize
1.0MB
MD56441af29c59c1670428c4aff4c0e009e
SHA1dd3834f4e73454d9b5dfc8e916403a40a1a7dc11
SHA2567c878ad4a29f561f9067962c42a376d736221c258e445d30ac7b120cbeeb43ae
SHA512befd65212b88cfba9764d1aae7340f3a952534e57d55f5f546be82b290e891ca9ae825cd467b32e5e8d9ea24382462ceabfce2a59cc87dd5fffb3bc2bcb6069e
-
Filesize
1.1MB
MD5c01d5e00e6054b5bff0e481679de9baf
SHA15604d230a3632b553969264b9d86d67826eb2ff8
SHA256500786bca789a2215274db8e93399742a42a7afedc4878b6addc294c7c60cdf0
SHA512a4625f52517f93dcb20a901851c737374b560d55933e8e23451e00af55a75c73b6d1f50c3b669e61a0404d396e0a08fa16b37d29a9402c7e0e09b28120634af1
-
Filesize
1.1MB
MD53d86c8ed30f3da75c74290d1062ff3a0
SHA147bbdb86abf99cb29906bf82361fb957a5c38f5a
SHA256169a2fd3212d941896fec019f76949be5ecdfac4db768bf226056021895d185c
SHA512ac762cee6161dea924d766e3829a730bcacecfee2900a8eaf7323a686cbf38abaa47c54b3f707e1f086e480c4980b5429c8d726295cde20e263656721395d9c7
-
Filesize
896KB
MD545c4a3d8db836381c7774a79f7ac2167
SHA122c94fc7ebdd83545005f3dcd1276c8d2390d13a
SHA256e7bf9c74717271d3df1db0fda4cab41947073b9ef8587d480314d539bdcbc0d8
SHA5125e656dbe3fd72af3eb8bab665e5f3ead0c3467d6ec9ae419ee8b73d677c0880769eb79b3b913e5401c59038381c1479efebc06b5950dc9b70702a54bc91cc249
-
Filesize
1.1MB
MD5663f283633cdfbdda06cbf2d9dcb7e69
SHA18efacd03b81412a20a43fa8426a1dd7f08fb0ebe
SHA256610c169dc92b699dd53941eb103bf9b84664d508327f2ef941c9a557f063c2f0
SHA512df1963a14c490624a55243121373e4665b870f78a164f5153c115bd3097effac189efa7fb7680403795f37cdff7ac61ba0664be880d7fe547024789caa7c9ac4
-
Filesize
960KB
MD5971c27fa60d3c67bb7432e6933782ef8
SHA1f3f7ad5bad872de866273ff28f9d069b2c963229
SHA2560aa681a6d07ea5d55c63191904229df8722a0e619061346a3889090dfc34e221
SHA51281ad83e023d3b91e38a4c5c3bafdf063062128e86dedf36753679e386c597e13294f11bd8a1a15e4d4f31bc655886f072abdffc4919f82655c7935b36253c41c
-
Filesize
960KB
MD5394121cf27ddc9ef4abdca0d740bea0a
SHA1c88c2a3c91a7a897368c2629ec6f71eb2019ad96
SHA2566d847ed36db9f2263eabe1d40c9488a2a1f80d7e1c1033230467b69dae6f6093
SHA512642b70d80facc52213817afdd1c7bed10fe65d1b3ff661636c9a6499184b230f2a0e4e4ced3eeee808217dbdc98ca7e092313e68b066ebc136ccd4f8e18dff3e
-
Filesize
2.7MB
MD552004b43ee9a1d78263e7db0c78f0513
SHA1198e8e50db549c67856ec364460423e1ebf23f05
SHA256bfc3feeb5981fd3eb9fb2cd4954db5184ccc1de8399406472021374c1dc91eeb
SHA512924978542aa7755067efc91a8e268e9be4383aacb7af5f97811b4467bc718204bf9edfdd7d52fa5cfabe69ba91974e88f335642ae5c4ed0d018984240bc7ce0a
-
Filesize
267KB
MD515163eb05b0a8f65a5ca3c74a658077d
SHA18b116062a5754fa2d73fc4df9f635283ae1ccd02
SHA2568751c43ee0f3f0e080103a9b77be9e79346004769ed43d4cadd630ea15d26dcf
SHA512a8299e9a522aa58429847920b999598551c1863f63ba473178f61cde43fb91cab6ef62c9e1a51268e54338e012ccfe6428a7c37bc89007d1604fafa2560258c9
-
Filesize
141KB
MD57e3b8ddfa6bd68ca8f557254c3188aea
SHA1bafaaaa987c86048b0cf0153e1147e1bbad39b0c
SHA2568270ecef6079a21f5ae22f1a473e5eb8abac51628367f4acf6466529ba11d7e2
SHA512675ca07cdb787b3f624eae9707daf519214f8dc4670c524cef5110c9dba197e833cedb051919c757c58a3687e63cf175d1397d8ce69c5995f4eab3b85f6dafbb
-
Filesize
494KB
MD505bdfd8a3128ab14d96818f43ebe9c0e
SHA1495cbbd020391e05d11c52aa23bdae7b89532eb7
SHA2567b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb
SHA5128d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da
-
Filesize
655KB
MD5e51fc34da2e81b0a84acb8a0df517371
SHA1028603e296e795bfdfd9c9dc2e346b31c480249c
SHA256acd3378684bcd368137473008667f6276cfa379d6efe33508e2a1dc1f17a857a
SHA512c749dc4800f386e05677f5488913ac8992104f2fb20de58c7e7ef23eaa9b9af2c9437069f982fa3520e843c523897077b31954e3ccad0af85eeec997dc3d14d5
-
Filesize
821KB
MD5cf8dd046f58dfe82372d7f9df42ef1db
SHA1fe31c3fdc5e48b10b2efd1ffeb97f7af3c2951de
SHA25614fc6925bb633e40aa4a08854f24cb49523b39f777871bce1a746a9d44863e9c
SHA512394d76cfab6b009b02b6f07b8d86457c78facd9c3d9d06097e8a0e8b76895747ca89a136ee7b9334ca4126e48d847fa8c0ba163a6538bcb9f5c82443ec9f1b04
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
1.7MB
MD5ebe77a8a265ed2c2499f9e7350f825fe
SHA1111c130b464e24078bcb6463821e39e9fc87df5e
SHA256a5049d975270799544ceeab15826fc49da544faf431a93e7e3b809d6cf64fbf9
SHA51297826e2314b43a605917db0c18d6886bb40cbdccf3518c965733121b660891ca30853f54ff02a476c75f517ccf2c54c9fbe76f8cd4be2605a74b489840c7200c