Analysis
-
max time kernel
94s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 12:44
Behavioral task
behavioral1
Sample
bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe
-
Size
3.7MB
-
MD5
bd732f8c32faa0991c349bbc53d7d6b6
-
SHA1
680f7c93874526a2a6b89f5f24c281af15cc937f
-
SHA256
ecda3142407a9f09a1293af2856be4bff978a1c8faeb4ab02c5052fddfea5a02
-
SHA512
3ffa9586f1df18ae16623c23e2397ea236258502ff6c79f3c5946ff862300fed5a073713f1ee2c63598309f0549224fd290d65b3b577b80252105d28b72d6d73
-
SSDEEP
98304:9IqsAhajXR3EyV19YsMMN1J1UEacaoMQlOo75+367ohH9LEbM3:hPWXRUA1uU1J825lOo1+367OLEG
Malware Config
Signatures
-
Detect Neshta payload 43 IoCs
resource yara_rule behavioral2/files/0x0007000000023c89-31.dat family_neshta behavioral2/files/0x000600000002021b-48.dat family_neshta behavioral2/files/0x0006000000020217-64.dat family_neshta behavioral2/files/0x0006000000020223-63.dat family_neshta behavioral2/files/0x0007000000020283-61.dat family_neshta behavioral2/files/0x00010000000202ac-69.dat family_neshta behavioral2/files/0x0006000000020232-73.dat family_neshta behavioral2/files/0x000400000002030e-72.dat family_neshta behavioral2/files/0x0001000000020294-71.dat family_neshta behavioral2/files/0x000400000002034d-70.dat family_neshta behavioral2/files/0x000400000002033b-68.dat family_neshta behavioral2/files/0x0001000000020299-67.dat family_neshta behavioral2/files/0x000100000002022a-66.dat family_neshta behavioral2/files/0x000400000002033a-65.dat family_neshta behavioral2/files/0x0004000000020348-60.dat family_neshta behavioral2/files/0x00010000000214df-83.dat family_neshta behavioral2/files/0x00010000000214e0-86.dat family_neshta behavioral2/files/0x0001000000022f41-90.dat family_neshta behavioral2/files/0x0001000000022f7f-93.dat family_neshta behavioral2/files/0x0001000000022f7e-98.dat family_neshta behavioral2/files/0x00010000000167c0-109.dat family_neshta behavioral2/files/0x000100000001dbca-118.dat family_neshta behavioral2/files/0x0001000000016912-130.dat family_neshta behavioral2/files/0x000300000001e8bb-141.dat family_neshta behavioral2/files/0x000300000001e86a-139.dat family_neshta behavioral2/files/0x000b00000001edf9-153.dat family_neshta behavioral2/files/0x000500000001e8b4-152.dat family_neshta behavioral2/files/0x000b00000001e610-150.dat family_neshta behavioral2/files/0x000e00000001f3b9-149.dat family_neshta behavioral2/files/0x000200000000072b-162.dat family_neshta behavioral2/files/0x00020000000215d2-164.dat family_neshta behavioral2/files/0x000b00000001e7fa-171.dat family_neshta behavioral2/files/0x000600000001db5f-170.dat family_neshta behavioral2/files/0x000500000001e6a9-168.dat family_neshta behavioral2/memory/852-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3292-194-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3292-196-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-197-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3292-198-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-199-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-204-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3292-203-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation SetupShim.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe -
Executes dropped EXE 7 IoCs
pid Process 5072 bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe 3540 SetupShim.exe 4856 svchost.com 2760 SETUPF~1.EXE 1848 msedge.exe 852 svchost.com 2908 msedge.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE svchost.com File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE svchost.com File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe svchost.com -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys msedge.exe File opened for modification C:\Windows\svchost.com msedge.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msedge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SetupShim.exe -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings SetupShim.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings msedge.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3292 wrote to memory of 5072 3292 bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe 82 PID 3292 wrote to memory of 5072 3292 bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe 82 PID 3292 wrote to memory of 5072 3292 bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe 82 PID 5072 wrote to memory of 3540 5072 bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe 83 PID 5072 wrote to memory of 3540 5072 bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe 83 PID 5072 wrote to memory of 3540 5072 bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe 83 PID 3540 wrote to memory of 4856 3540 SetupShim.exe 84 PID 3540 wrote to memory of 4856 3540 SetupShim.exe 84 PID 3540 wrote to memory of 4856 3540 SetupShim.exe 84 PID 4856 wrote to memory of 2760 4856 svchost.com 86 PID 4856 wrote to memory of 2760 4856 svchost.com 86 PID 2760 wrote to memory of 1848 2760 SETUPF~1.EXE 87 PID 2760 wrote to memory of 1848 2760 SETUPF~1.EXE 87 PID 2760 wrote to memory of 1848 2760 SETUPF~1.EXE 87 PID 1848 wrote to memory of 852 1848 msedge.exe 88 PID 1848 wrote to memory of 852 1848 msedge.exe 88 PID 1848 wrote to memory of 852 1848 msedge.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\bd732f8c32faa0991c349bbc53d7d6b6_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\PdnSetup\SetupShim.exeSetupShim.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\PdnSetup\SETUPF~1.EXE" SetupShim.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\PdnSetup\SETUPF~1.EXEC:\Users\Admin\AppData\Local\Temp\PdnSetup\SETUPF~1.EXE SetupShim.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.getpaint.net/redirect/pdnexpired.html6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\msedge.exe" --single-argument http://www.getpaint.net/redirect/pdnexpired.html7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\msedge.exeC:\Users\Admin\AppData\Local\Temp\3582-490\msedge.exe --single-argument http://www.getpaint.net/redirect/pdnexpired.html8⤵
- Executes dropped EXE
PID:2908
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD539c8a4c2c3984b64b701b85cb724533b
SHA1c911f4c4070dfe9a35d9adcb7de6e6fb1482ce00
SHA256888a1dd0033e5d758a4e731e3e55357de866e80d03b1b194375f714e1fd4351d
SHA512f42ca2962fe60cff1a13dea8b81ff0647b317c785ee4f5159c38487c34d33aecba8478757047d31ab2ee893fbdcb91a21655353456ba6a018fc71b2278db4db2
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
5.7MB
MD509acdc5bbec5a47e8ae47f4a348541e2
SHA1658f64967b2a9372c1c0bdd59c6fb2a18301d891
SHA2561b5c715d71384f043843ea1785a6873a9f39d2daae112ccdeffcd88b10a3a403
SHA5123867bf98e1a0e253114a98b78b047b0d8282b5abf4aaf836f31cc0e26224e2a1b802c65df9d90dc7696a6dbcb9a8e4b900f1d1299e1b11e36f095ebaf8a2e5b8
-
Filesize
175KB
MD5576410de51e63c3b5442540c8fdacbee
SHA18de673b679e0fee6e460cbf4f21ab728e41e0973
SHA2563f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe
SHA512f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db
-
Filesize
9.4MB
MD5322302633e36360a24252f6291cdfc91
SHA1238ed62353776c646957efefc0174c545c2afa3d
SHA25631da9632f5d25806b77b617d48da52a14afc574bbe1653120f97705284ea566c
SHA5125a1f7c44ce7f5036bffc18ebac39e2bf70e6f35fa252617d665b26448f4c4473adfa115467b7e2d9b7068823e448f74410cdcdfef1ac1c09021e051921787373
-
Filesize
2.4MB
MD58ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA2568268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA5120b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427
-
Filesize
183KB
MD59dfcdd1ab508b26917bb2461488d8605
SHA14ba6342bcf4942ade05fb12db83da89dc8c56a21
SHA256ecd5e94da88c653e4c34b6ab325e0aca8824247b290336f75c410caa16381bc5
SHA5121afc1b95f160333f1ff2fa14b3f22a28ae33850699c6b5498915a8b6bec1cfc40f33cb69583240aa9206bc2ea7ab14e05e071275b836502a92aa8c529fc1b137
-
Filesize
131KB
MD55791075058b526842f4601c46abd59f5
SHA1b2748f7542e2eebcd0353c3720d92bbffad8678f
SHA2565c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394
SHA51283e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb
-
Filesize
254KB
MD54ddc609ae13a777493f3eeda70a81d40
SHA18957c390f9b2c136d37190e32bccae3ae671c80a
SHA25616d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950
SHA5129d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5
-
Filesize
386KB
MD58c753d6448183dea5269445738486e01
SHA1ebbbdc0022ca7487cd6294714cd3fbcb70923af9
SHA256473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997
SHA5124f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be
-
Filesize
92KB
MD5176436d406fd1aabebae353963b3ebcf
SHA19ffdfdb8cc832a0c6501c4c0e85b23a0f7eff57a
SHA2562f947e3ca624ce7373080b4a3934e21644fb070a53feeaae442b15b849c2954f
SHA512a2d1a714e0c1e5463260c64048ba8fd5064cfa06d4a43d02fc04a30748102ff5ba86d20a08e611e200dc778e2b7b3ae808da48132a05a61aa09ac424a182a06a
-
Filesize
125KB
MD5cce8964848413b49f18a44da9cb0a79b
SHA10b7452100d400acebb1c1887542f322a92cbd7ae
SHA256fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5
SHA512bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d
-
Filesize
142KB
MD592dc0a5b61c98ac6ca3c9e09711e0a5d
SHA1f809f50cfdfbc469561bced921d0bad343a0d7b4
SHA2563e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc
SHA512d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31
-
Filesize
278KB
MD512c29dd57aa69f45ddd2e47620e0a8d9
SHA1ba297aa3fe237ca916257bc46370b360a2db2223
SHA25622a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880
SHA512255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488
-
Filesize
366KB
MD5f1dd0a0fe1c98603a4d5666f5175a911
SHA112bc988ea7a55e6d7fd4c7a59d74393bb8473d4d
SHA256f5bf98813e2d5a12f3b78f02108f7d16436e2454770599859b1e694d97df4264
SHA5123196905919cb6c45d287ab9a26d5970ccf710d092c166202e0919989703584dfeab416adc998a50104a7a76fe175838de5544904a32bbc96e19c2f68362ce895
-
Filesize
325KB
MD5892cf4fc5398e07bf652c50ef2aa3b88
SHA1c399e55756b23938057a0ecae597bd9dbe481866
SHA256e2262c798729169f697e6c30e5211cde604fd8b14769311ff4ea81abba8c2781
SHA512f16a9e4b1150098c5936ec6107c36d47246dafd5a43e9f4ad9a31ecab69cc789c768691fa23a1440fae7f6e93e8e62566b5c86f7ed6bb4cfe26368149ea8c167
-
Filesize
146KB
MD5cdc455fa95578320bd27e0d89a7c9108
SHA160cde78a74e4943f349f1999be3b6fc3c19ab268
SHA256d7f214dc55857c3576675279261a0ee1881f7ddee4755bb0b9e7566fc0f425a9
SHA51235f3741538bd59f6c744bcad6f348f4eb6ea1ee542f9780daa29de5dbb2d772b01fe4774fb1c2c7199a349488be309ceedd562ceb5f1bdcdd563036b301dcd9f
-
Filesize
433KB
MD5674eddc440664b8b854bc397e67ee338
SHA1af9d74243ee3ea5f88638172f592ed89bbbd7e0d
SHA25620bbf92426732ff7269b4f2f89d404d5fee0fa6a20944004d2eeb3cc2d1fa457
SHA5125aced0e2235f113e323d6b28be74da5e4da4dc881629461df4644a52bccd717dc6d2632c40ed8190b3ad060b8b62c347757a0bbe82680d892114c1f0529146b7
-
Filesize
198KB
MD57429ce42ac211cd3aa986faad186cedd
SHA1b61a57f0f99cfd702be0fbafcb77e9f911223fac
SHA256d608c05409ac4bd05d8e0702fcf66dfae5f4f38cbae13406842fa5504f4d616f
SHA512ee4456877d6d881d9904013aabecb9f2daf6fc0ec7a7c9251e77396b66a7f5a577fe8544e64e2bb7464db429db56a3fe47c183a81d40cc869d01be573ab5e4c1
-
Filesize
250KB
MD55d656c152b22ddd4f875306ca928243a
SHA1177ff847aa898afa1b786077ae87b5ae0c7687c7
SHA2564d87b0eb331443b473c90650d31b893d00373ff88dcbcb3747f494407799af69
SHA512d5e50ee909ea06e69fc0d9999c6d142f9154e6f63462312b4e950cf6e26a7d395dbb50c8e2a8c4f4e1cfb7b2c6ae8ad19e3b7c204c20e7557daa1a0deb454160
-
Filesize
1.1MB
MD5188427035abdcfe851a88f9f64f758ac
SHA156ce77858707c45d2d4192f6effd8d1abefd0a6a
SHA256b71438fa2312dfd2a65277703cc1eacc080cd7e953de519ba9c54cc081ae51b1
SHA512416ca0aee94276d6076355fb42dacfffbecf9b210e981ba52e4720e09bb3a5372db3ce27e1682355011e1777c138e785c16821d530c443ff646e724b31e370fa
-
Filesize
3.2MB
MD55119e350591269f44f732b470024bb7c
SHA14ccd48e4c6ba6e162d1520760ee3063e93e2c014
SHA2562b3aa9642b291932ba7f9f3d85221402a9d27078f56ef0e9c6bca633616e3873
SHA512599b4ec673169d42a348d1117737b4ad4d7539574153df5a5c7689130c9ac5ff5cd00f3c8ec39adf32ff2b56be074081efcabb6456272c649703c3ea6cdaded4
-
Filesize
714KB
MD5e19544c111fefa491cfe53b99f8bebc2
SHA1a05e096689dd82751ccd0a4eec0db54a5f972830
SHA25682a14caee30a4f86dd143015fc852220a36cc96cdbb9f65aaca87d80f2c43762
SHA5120f017e3aeea8de42195687c2745b9eccc174e6430149edf22a8f4b5fc24e7881654ba7c55ed2327b9c710787dffa3c438c0d99b06e7e12f6126bc3e86392d4db
-
Filesize
715KB
MD53db4bf90dbae706c47d2323421600d28
SHA1610e38d5e2e71b582ea2ac2309da9ea5b64999a3
SHA2568ca4e66b53ca9f10fd589fc2e273077707b24e0f8223a143673125ce45b5e00c
SHA512edb88cbf54f42a5eab6537972799acdd9ec034b45854fdca9f850111169021d2299683b61fe10302a5d590ca11c1388d1380fa1a1bd44507281e89b373222b8f
-
Filesize
650KB
MD5558fdb0b9f097118b0c928bb6062370a
SHA1ad971a9a4cac3112a494a167e1b7736dcd6718b3
SHA25690cee4a89cc1401ac464818226b7df69aa930804cefce56758d4e2ea0009d924
SHA5125d08d5428e82fb3dad55c19e2c029de8f16e121faac87575b97f468b0ec312b3e0696225546cba91addaaf8f2451d44ae6386b4e4f7f621ce45055f3be797d7c
-
Filesize
485KB
MD587f15006aea3b4433e226882a56f188d
SHA1e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA2568d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1
-
Filesize
650KB
MD52f826daacb184077b67aad3fe30e3413
SHA1981d415fe70414aaac3a11024e65ae2e949aced8
SHA256a6180f0aa9c56c32e71fe8dc150131177e4036a5a2111d0f3ec3c341fd813222
SHA5122a6d9bdf4b7be9b766008e522cbb2c21921ba55d84dfde653ca977f70639e342a9d5548768de29ae2a85031c11dac2ae4b3c76b9136c020a6e7c9a9a5879caeb
-
Filesize
650KB
MD572d0addae57f28c993b319bfafa190ac
SHA18082ad7a004a399f0edbf447425f6a0f6c772ff3
SHA256671be498af4e13872784eeae4bae2e462dfac62d51d7057b2b3bebff511b7d18
SHA51298bcde1133edbff713aa43b944dceb5dae20a9cbdf8009f5b758da20ccfbcdf6d617f609a7094aa52a514373f6695b0fd43c3d601538483816cd08832edd15ab
-
Filesize
534KB
MD58a403bc371b84920c641afa3cf9fef2f
SHA1d6c9d38f3e571b54132dd7ee31a169c683abfd63
SHA256614a701b90739e7dbf66b14fbdb6854394290030cc87bbcb3f47e1c45d1f06c3
SHA512b376ef1f49b793a8cd8b7af587f538cf87cb2fffa70fc144e1d1b7e2e8e365ba4ad0568321a0b1c04e69b4b8b694d77e812597a66be1c59eda626cbf132e2c72
-
Filesize
6.7MB
MD563dc05e27a0b43bf25f151751b481b8c
SHA1b20321483dac62bce0aa0cef1d193d247747e189
SHA2567d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce
SHA512374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3
-
Filesize
485KB
MD586749cd13537a694795be5d87ef7106d
SHA1538030845680a8be8219618daee29e368dc1e06c
SHA2568c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA5127b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c
-
Filesize
495KB
MD59597098cfbc45fae685d9480d135ed13
SHA184401f03a7942a7e4fcd26e4414b227edd9b0f09
SHA25645966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c
SHA51216afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164
-
Filesize
495KB
MD507e194ce831b1846111eb6c8b176c86e
SHA1b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA51255f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5
-
Filesize
3.6MB
MD50f8a97136a22f9f04f4ba93fa82a7ed9
SHA1d98a8a249725462929a9ecca8f418b6e42f20bd6
SHA25642f7df69816af88366b35a8ea6bf37f72ed0d5147f7452c7f0c51dd4e1dad5c2
SHA512aed1e2feb8babc2d4314c662c2bf8713ccfc2efe0103d55bf67692ff85ddd0f163357dedfdb2ab49a4564a63b6f5f544421320856961c6082fec91bda6247dd7
-
Filesize
3.2MB
MD5ad8536c7440638d40156e883ac25086e
SHA1fa9e8b7fb10473a01b8925c4c5b0888924a1147c
SHA25673d84d249f16b943d1d3f9dd9e516fadd323e70939c29b4a640693eb8818ee9a
SHA512b5f368be8853aa142dba614dcca7e021aba92b337fe36cfc186714092a4dab1c7a2181954cd737923edd351149980182a090dbde91081c81d83f471ff18888fe
-
Filesize
552KB
MD5be359415d2f8e7452a11998d0f950f7a
SHA158db4281475dca15824f347294683ca820a83844
SHA256ab9b3b48417fd7daece8f5452e7234d7743321db22a7b5178f8d1f11f93be274
SHA5125d61d377d459c1a7d610df5611a7bd31b69a687213892cf916aede964e2b7119ea936c267570ae6b466ca08beeabbdce4677913ce7905f82d80c49a56a43e2b1
-
Filesize
92KB
MD540c8120eeb698c29e5a40e9cb389e01b
SHA17b28adccad49c4937643473923c13161750f2036
SHA2562b2ce3519c95b06aa887d5e449fae5b5f2decdf23fc7d9afb8fd87224950b64f
SHA5124cc6ec9e28529182529c696c4b43003f60ce2e2a2852c20e0b60990a349890cb319b72f8bd12519b97f17a69ef0a44874292973ca241436a46e06c25883ba4fb
-
Filesize
89KB
MD583c5cf4cdfe84dfde372bedce6c4b18f
SHA1947650502c065787eb3666d02d17e2f925b4b1fe
SHA256dbc7079c055eb648cbda96d7ddb8ccd10e942025a973542e9ca0f108ce7845c5
SHA512918c919eb34ee30f99c9d75c8ce5f18d4b4d4ee960b40ac4764d19d68ce815f608344fc668d9a76c55565ce1a68819bc81494a5581f55c301967a870a03b7ec5
-
Filesize
104KB
MD53a35ddd7e645cc72463e65bf069af34c
SHA142ea566b749a6c3457fb228a1b99b51e7b47f83a
SHA2567a044ee7aa10e66e85907e7980299886c759f6bdc99f6fe087b91347bcce741a
SHA512621f1f120ecb8d794132350458f289ba4417b6b642f8a85c399556c9d888b94810fb6de6c8f869e76a6f185cb3e2533d360a5798223791fa37422c83c6691e18
-
Filesize
64KB
MD530ec851e863543f39517bdd57b1b7e45
SHA1b0be403bb0ad710511bab100700a10e3d9ca4480
SHA256ccbce0b243818447e3a77e185ba83c18f551ae1d0477f5754902371c1f1086ac
SHA51253525d00f16ea772a6af86d7c38bfd4b4e5474b018e476de4c47b600ff9b0506b30651e55d04b6d534071bcd48ef21b715fa53ad4d158385c5baa24a4ef0632e
-
Filesize
63KB
MD50753296ccb4b8341b9a51295125d9c4c
SHA1cb9513f6058aeb891924d290bfb1488d93f365df
SHA256e8a262217986c6f2e300c6be56a0b74623ece096f3cfd1ce9f54faef031a139f
SHA512d215eb376a0dd373f8c20fceea0c298c350a68e7d05f1c15dd3486d955adee6385e5ec2e12fafea4c15d01fa7d1708779c4b5e15de080bacb22fa3330b8dca36
-
Filesize
8B
MD557f777ba6bf4be7e709f7d52ab2ee56c
SHA1209bd7dfe3df1520e8673851541285950b15a04d
SHA2565b5f61bb844f84ffc3af920773ef699a3a712b84eefcef7da548593bc409d14a
SHA512b69c6327a30a8cfdbbe154de76f037dc27b9ab82c4a238db9ee59c8b26bc23ca409f3336452d902b8a493fb2466ef802d7fd1b75b018b001882f39f69cc7f6b7
-
Filesize
55B
MD5cc2f3b51f2e78cafce999e604a8b3277
SHA1f2e64b7d1f0581052cbfea99a8a809922a62e69c
SHA256e6475c558d13bbad756c32a904648acf36c3f9bddd7aad597847cc159696c06f
SHA5122cba040b4f1a5e137e9e44b1364ccec43173b677a24a3318b599c86ea4482ae2aaeb9f2af3be72fe6514dda0879b0bd506acd1e08b48f963c6ae446fc06cb6a1
-
Filesize
72B
MD5c9d79515bb506e31a426107ee5fa5e32
SHA14afde3be27b00dc755dbf77ec6de8ab57f15d9f6
SHA2567d7c33f649a910db68290bcda66b773c3e17ac9d5eae56397a245bcc37ea8fe1
SHA51280404ed01270ec0be2074aebace97484ddf61eaa8055e60610c52deeb3bcd2cd3cca977faa313c07fd77c9faf6d368221812095a28200f72f5591590c17722b3
-
Filesize
40KB
MD5eb016acd5b7c3d7a351042922627471b
SHA167c10c065ab4a8d1467a5cae7d810cf07d7f89c5
SHA256f824307212a801f5e311f6af0f5d05830ed3873795d1313c1aa380cf62393d21
SHA512031d97dafecace124e6d32844df24f1bcb6a736b7211c4d02fec2b5f0e30686e4a764c77964bc38408aa0dd05dd0c1e6a6b58dffe426166c77cac30054cd696e