Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
782a27adf82c279dd5f5ad2df218d8d4
-
SHA1
821cd1b08324ff4e48032644799baf28237693e8
-
SHA256
d73eb41e4f5c041fa715b811036b1f0b43321848eb52933cf62aba5a84b183ce
-
SHA512
8e4a381f780664ecb2e083a565177577512dd77c15d57e35bbed2e74153c4ae5c6df7ac72568784f455ceaa1ec6d932ab6c58c41be03b5c78066ec31516942bd
-
SSDEEP
24576:ijRdwFjVUK0ElMZPh6/08PWf4XlAiYqiMGGFnNEj5qBTMq8yN7Zb:GaFpJlmh6ZPWf4XyiTxN6qBEadb
Malware Config
Signatures
-
Detect Neshta payload 51 IoCs
Processes:
resource yara_rule behavioral1/files/0x00080000000120f9-3.dat family_neshta behavioral1/files/0x000900000001707f-13.dat family_neshta behavioral1/files/0x0008000000017570-36.dat family_neshta behavioral1/files/0x0001000000010314-35.dat family_neshta behavioral1/files/0x0001000000010312-34.dat family_neshta behavioral1/files/0x0013000000010321-33.dat family_neshta behavioral1/files/0x000f00000001033a-32.dat family_neshta behavioral1/files/0x000100000000f7d8-45.dat family_neshta behavioral1/files/0x000100000000f776-48.dat family_neshta behavioral1/files/0x000100000000f7ca-50.dat family_neshta behavioral1/files/0x000100000000f7e6-54.dat family_neshta behavioral1/files/0x0001000000010b94-62.dat family_neshta behavioral1/files/0x0001000000010361-66.dat family_neshta behavioral1/files/0x0001000000010c12-67.dat family_neshta behavioral1/files/0x0001000000010f30-73.dat family_neshta behavioral1/files/0x0001000000011876-76.dat family_neshta behavioral1/files/0x00010000000118e3-81.dat family_neshta behavioral1/files/0x00010000000118ea-82.dat family_neshta behavioral1/files/0x00010000000103d4-86.dat family_neshta behavioral1/files/0x0003000000012159-95.dat family_neshta behavioral1/files/0x000300000001215e-99.dat family_neshta behavioral1/files/0x000300000001219d-103.dat family_neshta behavioral1/files/0x0001000000011607-118.dat family_neshta behavioral1/memory/2864-120-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0001000000011872-123.dat family_neshta behavioral1/files/0x0001000000010f32-125.dat family_neshta behavioral1/files/0x0001000000010f95-136.dat family_neshta behavioral1/files/0x0001000000010f4d-135.dat family_neshta behavioral1/files/0x0004000000010f46-134.dat family_neshta behavioral1/files/0x0001000000010f44-133.dat family_neshta behavioral1/files/0x0001000000011875-132.dat family_neshta behavioral1/files/0x00010000000118f7-138.dat family_neshta behavioral1/files/0x0001000000011906-145.dat family_neshta behavioral1/files/0x0002000000011080-147.dat family_neshta behavioral1/files/0x000100000001107f-146.dat family_neshta behavioral1/files/0x0001000000010fca-144.dat family_neshta behavioral1/files/0x00030000000120dc-161.dat family_neshta behavioral1/files/0x00030000000120d8-158.dat family_neshta behavioral1/files/0x0001000000011288-157.dat family_neshta behavioral1/files/0x0001000000011b5a-156.dat family_neshta behavioral1/files/0x0001000000011274-155.dat family_neshta behavioral1/files/0x0001000000011b1f-154.dat family_neshta behavioral1/files/0x0001000000011a15-153.dat family_neshta behavioral1/files/0x0004000000005725-169.dat family_neshta behavioral1/files/0x000300000000e6f5-175.dat family_neshta behavioral1/files/0x0003000000005ab6-174.dat family_neshta behavioral1/files/0x00050000000055df-173.dat family_neshta behavioral1/memory/2708-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2464-179-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2464-182-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2708-184-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 4 IoCs
Processes:
server.exeClient.exesvchost.comClient.exepid Process 2708 server.exe 2464 Client.exe 2864 svchost.com 2728 Client.exe -
Loads dropped DLL 11 IoCs
Processes:
782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exesvchost.comClient.exeserver.exepid Process 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 2864 svchost.com 2464 Client.exe 2708 server.exe 2708 server.exe 2708 server.exe 2708 server.exe 2708 server.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
server.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" server.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/files/0x0007000000017570-23.dat upx -
Drops file in Program Files directory 64 IoCs
Processes:
server.exeClient.exedescription ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE server.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE server.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE Client.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe Client.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe server.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE Client.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE server.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE Client.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE server.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe server.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe server.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE Client.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe server.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe server.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe Client.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe server.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE Client.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE server.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE server.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe server.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe Client.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE server.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE server.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Client.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE server.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE Client.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe server.exe -
Drops file in Windows directory 4 IoCs
Processes:
server.exeClient.exesvchost.comdescription ioc Process File opened for modification C:\Windows\svchost.com server.exe File opened for modification C:\Windows\svchost.com Client.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exeClient.exeserver.exesvchost.comClient.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe -
Modifies registry class 1 IoCs
Processes:
server.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Client.exepid Process 2728 Client.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exeClient.exesvchost.comdescription pid Process procid_target PID 1204 wrote to memory of 2708 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 30 PID 1204 wrote to memory of 2708 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 30 PID 1204 wrote to memory of 2708 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 30 PID 1204 wrote to memory of 2708 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 30 PID 1204 wrote to memory of 2464 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 31 PID 1204 wrote to memory of 2464 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 31 PID 1204 wrote to memory of 2464 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 31 PID 1204 wrote to memory of 2464 1204 782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe 31 PID 2464 wrote to memory of 2864 2464 Client.exe 32 PID 2464 wrote to memory of 2864 2464 Client.exe 32 PID 2464 wrote to memory of 2864 2464 Client.exe 32 PID 2464 wrote to memory of 2864 2464 Client.exe 32 PID 2864 wrote to memory of 2728 2864 svchost.com 33 PID 2864 wrote to memory of 2728 2864 svchost.com 33 PID 2864 wrote to memory of 2728 2864 svchost.com 33 PID 2864 wrote to memory of 2728 2864 svchost.com 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\782a27adf82c279dd5f5ad2df218d8d4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Client.exeC:\Users\Admin\AppData\Local\Temp\3582-490\Client.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2728
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD502ee6a3424782531461fb2f10713d3c1
SHA1b581a2c365d93ebb629e8363fd9f69afc673123f
SHA256ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc
SHA5126c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec
-
Filesize
547KB
MD5cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
Filesize
186KB
MD558b58875a50a0d8b5e7be7d6ac685164
SHA11e0b89c1b2585c76e758e9141b846ed4477b0662
SHA2562a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae
SHA512d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b
-
Filesize
1.1MB
MD5566ed4f62fdc96f175afedd811fa0370
SHA1d4b47adc40e0d5a9391d3f6f2942d1889dd2a451
SHA256e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460
SHA512cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7
-
Filesize
354KB
MD5c7021f05bd12860e1d3350f0a444f99a
SHA1747241c3429076691338dceb1672080829b662e7
SHA256db106d65f64f3cff8d79fba4b7aff6436ed8d4972bae7a7be19d4b6fbc5db92a
SHA512de937f0c8e8ad97aa3528314f0cc1406808a5b3ef9f0b32cb7554adb1e0a15ca1e6ec7cd40bfeea9772cb87bb9716b4cc8d9cdf94a0dd696dcc3648f5795afa0
-
Filesize
569KB
MD5eef2f834c8d65585af63916d23b07c36
SHA18cb85449d2cdb21bd6def735e1833c8408b8a9c6
SHA2563cd34a88e3ae7bd3681a7e3c55832af026834055020add33e6bd6f552fc0aabd
SHA5122ee8766e56e5b1e71c86f7d1a1aa1882706d0bca8f84b2b2c54dd4c255e04f037a6eb265302449950e5f5937b0e57f17a6aa45e88a407ace4b3945e65043d9b7
-
Filesize
381KB
MD53ec4922dbca2d07815cf28144193ded9
SHA175cda36469743fbc292da2684e76a26473f04a6d
SHA2560587fd366ea7e94b3ae500874b1c5d684b5357fcc7389682d5a13c3301a28801
SHA512956c3a1f2689cb72600edd2e90d652b77592a8a81d319dce026e88f6c02231af06aebd57d68460eb406de00c113522173423cb1b339a41a3918f379c7dc311f7
-
Filesize
137KB
MD5e1833678885f02b5e3cf1b3953456557
SHA1c197e763500002bc76a8d503933f1f6082a8507a
SHA256bd9a16d8d7590a2ec827913db5173f8beb1d1ef44dab1920ef52a307f922bc14
SHA512fe107e1c8631ec6ac94f772e6a7be1fdc2a533fe3cfcf36b1ff018c8d01bd7f1f818f0a2448f736838c953cd516ea7327c416dea20706ed2420327af8ef01abe
-
Filesize
588KB
MD5c275134502929608464f4400dd4971ab
SHA1107b91a5249425c83700d64aff4b57652039699d
SHA256ca5263f340cc735ba279532bbd9fe505fcf05d81b52614e05aff31c14d18f831
SHA512913cadcb575519f924333c80588781caecd6cd5f176dc22ac7391f154ffc3b3f7302d010433c22c96fde3591cac79df3252798e52abf5706517493ef87a7ef7d
-
Filesize
571KB
MD5d4fdbb8de6a219f981ffda11aa2b2cc4
SHA1cca2cffd4cf39277cc56ebd050f313de15aabbf6
SHA256ba3dc87fca4641e5f5486c4d50c09d087e65264e6c5c885fa6866f6ccb23167b
SHA5127167e13dbcc8c96114fef5fc7ae19afa31173617db153dd283aa6d8256f6b8c09c8f906f5d418efe9f7f242cdfaef24b93c11c451701c4d56eb48d18de4e88bf
-
Filesize
198KB
MD5f562021a3a2e1a11351e0b6da28be149
SHA1b591c3f6647b7d8ec0a45c7cddbd69eaf4d07e7e
SHA25658abcadd2bff81ed5fd90e3b16f7339ca7bdae6b3058709ef72d5879da57618c
SHA512802b396422608ec1f8c49c957af04d8a77b42ae6d37914257268ab0bc52fe841a10bae1fd53fd8d9d5b4165e133787833f6d6c38b28ac4c31f54eebdf527b1ef
-
Filesize
543KB
MD562f45c5ec18ac85b8a015d5cd597a587
SHA17e8436990e9b2b39f7c39849b65e29e375cf9b1c
SHA256bb10f9800ccd5cdade599f7bc36f4addadb2bbb01509be3167fe3074fc01bfe7
SHA512a37225931ed6c243fbb0e92deede53ae0856b9589c23c2d9492dff894e490b466779cc604a5519bd5f71ee818033f02e1611e17507f81aa81874f69dd76b1066
-
Filesize
153KB
MD512a5d7cade13ae01baddf73609f8fbe9
SHA134e425f4a21db8d7902a78107d29aec1bde41e06
SHA25694e8ea2ed536484492d746f6f5808192cb81ae3c35f55d60826a2db64a254dd5
SHA512a240f5c59226749792cfb9fbd76b086d2544a493b834a72c0bfd8b076ed753ec8876ff056fc35f63f5497183d985f8f8c5c7b6abbcad70981f1ec83af1b3bd76
-
Filesize
539KB
MD560f6a975a53a542fd1f6e617f3906d86
SHA12be1ae6fffb3045fd67ed028fe6b22e235a3d089
SHA256be23688697af7b859d62519807414565308e79a6ecac221350cd502d6bf54733
SHA512360872d256ef91ea3debfb9b3efa22ee80859af9df29e0687c8e1b3c386d88ff1dc5635b86e714fbf1a7d4d6bc3d791efa31a9d9d13e0f79547b631bddb5108d
-
Filesize
205KB
MD5da31170e6de3cf8bd6cf7346d9ef5235
SHA1e2c9602f5c7778f9614672884638efd5dd2aee92
SHA2567737ab500cbbd5d507881d481eef9bd91cf6650bf8d2b41b47b1a8c5f2789858
SHA5122759d938d6ad963e0bf63481a700f7c503d06011a60bcfc1071b511e38afa87d903deb36f9cbfa0b3fd08f1ecb88d2c0bddf0d3b5f2dea2a0cca1a80471669f3
-
Filesize
226KB
MD561c4eb4385ee3530cb2022fe6fc5bc45
SHA1551c8baeb6dac4470dbaf68091ad9b864c022e90
SHA2569cdb825851f24e29737dfa6fd3f8dc1a314956b1224c8a438e614ca8229d1dfe
SHA512a4a4dd302df0696c43765aec07df39d1dae7e4e9db7fc2e1c4df7cdf4ad88f6026d912d3be323d92e286b6e694cba9d81a50e6f52a037e30803c38d009963c9f
-
Filesize
271KB
MD5eadb2e7c90f5deabad2e2757622ddadd
SHA1947a77f92ae3fcbdac42229f69ac5c4dcc3cf74e
SHA256437dbdb218902cbf3bd4f1d5cfad46e2b0435ba7ae7d9de21d14bdd9206acbd2
SHA512eecf366b56eb4c9d18cabed5ecf70c7541469537a96540fccc8277c44d94294a9195ced436c51faf70f6c2f51e81367a29032282beab55d2c55db030c92dcc43
-
Filesize
155KB
MD5f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA51228bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c
-
Filesize
248KB
MD5863087d206bd42785c4d49facc32da19
SHA1d9546a1ebbb0a8359d75ce930c03086c7d5823f4
SHA256cce0b71faa0b880f11bddf648d6025d5816c7078006fa8c1e663ab957af20ea4
SHA5128f696f910e451ddff26f1e083fe8a889694305ea3cc226bdbb1c64cd0b6ee8b15b382a0eee77be159f347f1bbe55d12e8a0e2d63777ab62a74e17c15968465af
-
Filesize
1.7MB
MD5338f328b613632e6df24a00a49864835
SHA1249a3f7c546aa66d98c4fbda2001bc649bc80013
SHA256da5cc08eb0aa368f19ce481b3f9236203a6f40303d77ad30b94912dba22ca08d
SHA512f59dc126be5bf72f802e6681f5af30ce947d7ad6e6b506612c8d6b49e2a5e2d597838311c474fd59e0b976453cf389cecb5443971019b307f2b52a1564ae69a8
-
Filesize
109KB
MD544623cc33b1bd689381de8fe6bcd90d1
SHA1187d4f8795c6f87dd402802723e4611bf1d8089e
SHA256380154eab37e79ed26a7142b773b8a8df6627c64c99a434d5a849b18d34805ba
SHA51219002885176caceb235da69ee5af07a92b18dac0fb8bb177f2c1e7413f6606b1666e0ea20f5b95b4fa3d82a3793b1dbe4a430f6f84a991686b024c4e11606082
-
Filesize
741KB
MD55d2fd8de43da81187b030d6357ab75ce
SHA1327122ef6afaffc61a86193fbe3d1cbabb75407e
SHA2564d117648525a468532da011f0fc051e49bf472bbcb3e9c4696955bd398b9205f
SHA5129f7470978346746b4e3366f9a6b277aa747cc45f13d36886fc16303221565d23348195b72ac25f7b1711789cd7cb925d7ceea91e384ef4f904a4e49b4e06d9b2
-
Filesize
392KB
MD525b9301a6557a958b0a64752342be27d
SHA10887e1a9389a711ef8b82da8e53d9a03901edebc
SHA2565d916f7c7f6cb6cfd7545a57cb9c9d9c6df16af3517298c346901081a9135303
SHA512985f6b2fcac2f0425a1a339a55616012879a393caa747412d04c1ee4de3b12aff2cc051860066d84ecbeae335eaa5116ccb8a02090a2674eded367378c56b1ab
-
Filesize
694KB
MD57a4edc8fb7114d0ea3fdce1ea05b0d81
SHA102ecc30dbfab67b623530ec04220f87b312b9f6b
SHA256ff16fdc703e55ddfe5ee867f343f3b20b496e7199c6c4b646335a01026f74550
SHA51239519685b1dd872008abfa967f79fd3b7a5e6f6ee1b9c3de891aae64490b2d0feb56bcd3f5dab4527d2c6d07646db5966028df153f38a1c09ee88a1ba9a1ef44
-
Filesize
726KB
MD5c3ee902099b98a299b1a215aba1b27bb
SHA1602b023806464db25f5f8e4ffc157cc7d7e9886b
SHA256e657a9f85af7cb5ded734e162db514e466256a83d51f4454abbf19c54b30686f
SHA5123538548c99f266404395ce9bdcadb542171799865ac5feddce936305ff2b09ecb939bed60d1e7011a39ca8548af39f9b4ee723b15674a1df54404270fc5afc9f
-
Filesize
144KB
MD5a2dddf04b395f8a08f12001318cc72a4
SHA11bd72e6e9230d94f07297c6fcde3d7f752563198
SHA256b35e60f1551870c1281d673380fe3101cd91b1f0b4d3c14c2383060f5e120373
SHA5122159df98d90467720b738be68bee5aba38980d2449c18d2ea4b7b9bae7d222b4a85845d0f9597017d0ee417964190bc3d95cb4809e33aac16b6cfa6ec200dce3
-
Filesize
127KB
MD5154b891ad580307b09612e413a0e65ac
SHA1fc900c7853261253b6e9f86335ea8d8ad10c1c60
SHA2568a3598c889dbcb1dca548a6193517ed7becb74c780003203697a2db22222a483
SHA51239bf032033b445fc5f450abec298ea3f71cadecfeafc624f2eb1f9a1d343a272181a874b46b58bb18168f2f14d498c3b917c3392d4c724fe4e5ae749113c2ad6
-
Filesize
308KB
MD54545e2b5fa4062259d5ddd56ecbbd386
SHA1c021dc8488a73bd364cb98758559fe7ba1337263
SHA256318f1f3fbdd1cf17c176cb68b4bc2cf899338186161a16a1adc29426114fb4f8
SHA512cf07436e0219ca5868e11046f2a497583066a9cf68262e7cca22daad72aded665ac66afea8db76182c172041c45fcef1628ea6852751c4bf97969c9af6cfefa1
-
Filesize
1.6MB
MD508ee3d1a6a5ed48057783b0771abbbea
SHA1ebf911c5899f611b490e2792695924df1c69117d
SHA2563f6decd82b72a5ba1ee224b52d9fbd6486be22a0b855e28eaad47ae92df266f0
SHA5121711d023c60d4b047d553a654797bc3a2eecd951b310698c1a2c549e136c33f55e0fc1167a4a38f793b7796f7cfc3fb30017935127b147a21da2812eb38faac5
-
Filesize
262KB
MD52d1b4a44f1f9046d9d28e7e70253b31d
SHA16ab152d17c2e8a169956f3a61ea13460d495d55e
SHA256d1d73220342ff51a1514d2354654c6fcaedc9a963cb3e0a7e5b0858cfc5c5c7d
SHA512dd8f5e343417a3e131b3362f1aecaf9ce0f8a55c9f90aa3b7e55b6ddb6c5f4e06b3e76a7f4481fa13e2f325ab2490553f6977178acf7c486c7315755c05fc7c3
-
Filesize
2.1MB
MD56b63036a88f260b7a08da9814cf17ce0
SHA1cac1bd549343a1c3fcefacc2d588155a00c4467b
SHA2568f9fb3c2ce132a64e157738feaf82bb512ec03d03fa2da95c26470defeef513d
SHA512383b8676a85e0f2447536bd15019c23bed15a51d633dafe5ac7bcbea75d8064ef9fd938461eab25df7f3eae3de18b87640e8cc12e95f7b58de1209937d8da284
-
Filesize
3.7MB
MD5525f8201ec895d5d6bb2a7d344efa683
SHA1a87dae5b06e86025abc91245809bcb81eb9aacf9
SHA25639a089d363b15c37cca9f747a17e89ad1dbe0bc86ff23466526beaa5e36d6d4b
SHA512f0a2070f11eb3f0bdf996ada42becc7710aab76e84268e5cdbbd9ecbf13ef5fb85b52b6227711137a9c511f8d731b018530cbf1935f8fcfd61ff2ef6c1348d63
-
Filesize
549KB
MD561631e66dbe2694a93e5dc936dd273be
SHA1b1838b8ca92fa5ca89e1108ceb2630a6ecd2b8c2
SHA2565811b7b694d99c703b4c4bc72d6b7d846d05b2b0f45a7e3e4279cdb6fd81265f
SHA512323463c267ccdb701d5967198f4f72158056f5a6e889c47bf19d1a670233ab071a5fe8c108430beb67753b77af1c59028007101a8e1266618fe91fa0127b4dcf
-
Filesize
606KB
MD59b1c9f74ac985eab6f8e5b27441a757b
SHA19a2cf7d2518c5f5db405e5bd8d37bf62dcaf34f5
SHA2562a189b995a7283b503bb5864dd9ca57976b3812a6a34aaf89a7551336c43bc24
SHA512d72e83aeaf1d34627a6c6aa469821af8a8d464a72c764fbb064484adea509a8c1d3628e2166859286e84daae8ebdf4f800693ce203984a8c313b1f2263e101c4
-
Filesize
1.4MB
MD55ae9c0c497949584ffa06f028a6605ab
SHA1eb24dbd3c8952ee20411691326d650f98d24e992
SHA25607dd9364be7babc5f9a08f0ccd828a9a55137845df1782b147f12943f234ea4e
SHA5122e99bb500c281c367cc54fa283905b2537905ea4fe8986f676adbb1aaf58460dd2db082bb46a3dbe9dc836fbae3ee8832990839432dd99c74de58cc9b9295788
-
Filesize
1.8MB
MD5fc87e701e7aab07cd97897512ab33660
SHA165dcd8e5715f2e4973fb6b271ffcb4af9cefae53
SHA256bb1814297615d6b22fa20ee4f8613c8bc9fa67d93cb7fe032f46f377569e2f46
SHA512b03e3b3f7b0f11b85757d8bf5678542f4281407e95cf8e074da4ddc421c217fcfaf23cc927ccd0bbca2891a424b2d3565072aba6406dc46c2fa1fdba7a249eec
-
Filesize
1.5MB
MD593766da984541820057ae0ab3d578928
SHA1ea19a657c6b1b5eb5accc09c45dcf04f063151c3
SHA256ad3a9f7beaaea0bc49a7ccba83198cfb2882d462441203684076695b0ef6c514
SHA512e14c86e13ab79fa9b9eb1a05d69764d522c4acfab7742c200080b215bb3bc31ec7f3dd2abf44cbc996d2e58a0ca1990b18ab055b232b243fe61b5fb018a9b719
-
Filesize
308KB
MD59a57f8da997449c9ae452cb759028f30
SHA1e2a4d1930b818cba011c57bc562777202895335e
SHA25648edc17d837b848081c41db9b277617e07634dfdf2dcf9aa4e08b73db129eff4
SHA512af95a0dffbac9877c5b67086513cc26a7d0bd5327fffeb02fe5796ac49ab868c72c3ff4def2d333bfd7df5819ec42dd6f28d67888b7cd6d482419cd23e5fd89e
-
Filesize
181KB
MD503e8d88ea2c40acbd13a14bcd703d690
SHA17edfb1f75e90cd839ffd09b87f734cfd54c45aac
SHA2563238959a01379682782d2e239f98f8026ec6c60d8da7fa7a6db50023f77c8c8b
SHA512c4e948da522adecf409a74257b7f770289454de6dc17c116231527064e94cf6e34fb3fc8a10ab0fd3da4f57abef1be47659aab1c1a072d7ab4664bc4003575d0
-
Filesize
536KB
MD537805b5430914afe29a0f8bff298f9ce
SHA140f50a314a46b824b49c71599aa022a6e53734cc
SHA2569fe21c23e316e7868124b9632b665674d69cb1baf063037e3c1268b1522a1990
SHA512f9f5bb78f12179a93ec012db09a5101682a89d28e9b6c163946e6d9c3b4a3055ea35ec7aa3e1b02bfc43f19e1dfb35a54c2ecec2eec5c28791109a1b099504ef
-
Filesize
526KB
MD5df428fddb4954aa26acbae724fc981a4
SHA19bc5e4d64db16f0a0b2589ce94742795a5c644bc
SHA256b19e317373bde9fb498198f733e84b1591328eb24419221e939a754730403f21
SHA512ccbcb956f783cc2662a286ae01b9b4386f999f7c96b562bd92e87184164440bed59d6c072a61b9a5974654c4c98c2ed07acc754719f4ea936ec9524a598a872c
-
Filesize
674KB
MD597510a7d9bf0811a6ea89fad85a9f3f3
SHA12ac0c49b66a92789be65580a38ae9798237711db
SHA256c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA5122a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb
-
Filesize
674KB
MD59c10a5ec52c145d340df7eafdb69c478
SHA157f3d99e41d123ad5f185fc21454367a7285db42
SHA256ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36
SHA5122704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f
-
Filesize
2.2MB
MD53233023d79714cc0e649c1beb75a23b2
SHA13052a8d2a143b846cd02b153bf6961052558c254
SHA25688e962e7fd534312bfa62a86a54f486d52091166ec06bee09125fe771816c8cc
SHA51270f0fcae8702b9cd232e7968da15849280c9377c44233a0c82f13aee439fd3998d8ac81be81c59d20aacd47ebde47248414234c5158f1cf2e15d95b7cdcf8826
-
Filesize
154KB
MD5f799f56ec4724f497d2f0c777fe4829e
SHA12076f7101b1dd146d11674517f822da52c70fef7
SHA256316762b502209f61769a6d903c897e9b592419c2a0cbc04779e6939b2dc47386
SHA5121a2eaa600e55019f55abe835513aad7011360d91140894383836cea569d3ce7aa2bf242da9ed32feda43e483b034a513156d2d144fcd1d9ec0af00dd6c4e3c9e
-
Filesize
40KB
MD536fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
2.3MB
MD542e31cc6bbb33fb0eeb39fa1079a1887
SHA1a64686dbb4aa55f29966d1da82df1b914c0015b6
SHA256d3bfdd4a88b2252288750871ac7c5704decc5ba7ac9b8c5ae5b565f5e11f93e4
SHA512f35cfce98adf36319e280c46fba4d8e23174d8ac46b9560d2ffaf1c92bca887f3cd429a6d30faf78ed8eeeeb2999803c1bd3f1b34d38f8e39ef47c5242718153
-
Filesize
195KB
MD59529e45f1d934314a2b25fbad6b6d8e8
SHA130453c0833fabe89438a07ee89a53eddacc19200
SHA2563238cfbd6a3e521c6a6452df83ed28f860d8309ee49e82695aa46b68f330b2da
SHA512f7bf2bb62e40e1d06d3e670bcdaef986ba6ef132f66e87281d5829be7fc8051e3555a8cbab7f78ab0fa12bb931478f248e482f75b0a428e60d6f5c52be2e4185