Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-02-2025 14:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe
-
Size
1013KB
-
MD5
f92359062dc66a57f6ab00e784f1e495
-
SHA1
4c95214e1399b27d56872d6ec719f6118f12e569
-
SHA256
13c915b6798a47b5dd873b24b1c276eb5ffb190e62d12efe3d0d6a580eb65da3
-
SHA512
dce4035fffd6b3a2cdd5f4b5384448339537853defdc3466e039eb4073b6ce07c73b60f7d8b9420afc5a28d215287b8b1caa75b369f460dca0411438f5368c35
-
SSDEEP
12288:7ng2XY3mqzJFrTjSWPob/0TuvRUpHdc709aWbFUBfo5Tvraiam3xPaqGhE/fjuSm:7g2XY3mqTjMvRUpCA9PTTn3NaBMf
Malware Config
Extracted
Protocol: ftp- Host:
fan-games.do.am - Port:
21 - Username:
8fan-games - Password:
16069812s
Signatures
-
Detect Neshta payload 3 IoCs
resource yara_rule behavioral1/files/0x000c000000012266-3.dat family_neshta behavioral1/files/0x0007000000016d0c-15.dat family_neshta behavioral1/memory/1736-153-0x0000000000400000-0x00000000004FF000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PE1.exe -
Executes dropped EXE 6 IoCs
pid Process 1236 Ingektor.exe 2020 Ingektor.exe 2924 svchost.com 2980 svchost.com 2252 PE1.exe 2572 PE2.exe -
Loads dropped DLL 11 IoCs
pid Process 1736 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 1736 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 1236 Ingektor.exe 1236 Ingektor.exe 2924 svchost.com 2924 svchost.com 2980 svchost.com 2980 svchost.com 2924 svchost.com 1236 Ingektor.exe 2924 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Ingektor.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe Ingektor.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE Ingektor.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe svchost.com File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe Ingektor.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE Ingektor.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe Ingektor.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe Ingektor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE Ingektor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE Ingektor.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe Ingektor.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe Ingektor.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE Ingektor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE Ingektor.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe Ingektor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe Ingektor.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com Ingektor.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PE2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ingektor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ingektor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Ingektor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2252 PE1.exe 2252 PE1.exe 2252 PE1.exe 2252 PE1.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe 2572 PE2.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1236 1736 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 30 PID 1736 wrote to memory of 1236 1736 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 30 PID 1736 wrote to memory of 1236 1736 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 30 PID 1736 wrote to memory of 1236 1736 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 30 PID 1236 wrote to memory of 2020 1236 Ingektor.exe 31 PID 1236 wrote to memory of 2020 1236 Ingektor.exe 31 PID 1236 wrote to memory of 2020 1236 Ingektor.exe 31 PID 1236 wrote to memory of 2020 1236 Ingektor.exe 31 PID 2020 wrote to memory of 2924 2020 Ingektor.exe 32 PID 2020 wrote to memory of 2924 2020 Ingektor.exe 32 PID 2020 wrote to memory of 2924 2020 Ingektor.exe 32 PID 2020 wrote to memory of 2924 2020 Ingektor.exe 32 PID 2020 wrote to memory of 2980 2020 Ingektor.exe 33 PID 2020 wrote to memory of 2980 2020 Ingektor.exe 33 PID 2020 wrote to memory of 2980 2020 Ingektor.exe 33 PID 2020 wrote to memory of 2980 2020 Ingektor.exe 33 PID 2924 wrote to memory of 2252 2924 svchost.com 34 PID 2924 wrote to memory of 2252 2924 svchost.com 34 PID 2924 wrote to memory of 2252 2924 svchost.com 34 PID 2924 wrote to memory of 2252 2924 svchost.com 34 PID 2980 wrote to memory of 2572 2980 svchost.com 35 PID 2980 wrote to memory of 2572 2980 svchost.com 35 PID 2980 wrote to memory of 2572 2980 svchost.com 35 PID 2980 wrote to memory of 2572 2980 svchost.com 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Ingektor.exe"C:\Users\Admin\AppData\Local\Temp\Ingektor.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Ingektor.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\Ingektor.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\PE1.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\PE1.exeC:\Users\Admin\AppData\Local\Temp\PE1.exe5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\PE2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\PE2.exeC:\Users\Admin\AppData\Local\Temp\PE2.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
859KB
MD5754309b7b83050a50768236ee966224f
SHA110ed7efc2e594417ddeb00a42deb8fd9f804ed53
SHA256acd32dd903e5464b0ecd153fb3f71da520d2e59a63d4c355d9c1874c919d04e6
SHA512e5aaddf62c08c8fcc1ae3f29df220c5c730a2efa96dd18685ee19f5a9d66c4735bb4416c4828033661990604669ed345415ef2dc096ec75e1ab378dd804b1614
-
Filesize
547KB
MD5ad98b20199243808cde0b5f0fd14b98f
SHA1f95ce4c4c1bb507da8ed379503b7f597ee2016cd
SHA256214f478e94658fa2bd7f0bc17022831baee707756798addb41d9c5bee050e70b
SHA512ee1251c62530b3027e2cd5669533c633577ffbcf854e137a551148fc0de3ee6cc34253a0bdefdbd4843929843b0790f1de893aa6fbae1c969f057b9f8486afef
-
Filesize
186KB
MD5248a8df8e662dfca1db4f7160e1a972b
SHA1dca22df5bca069f90d84d59988abe73a24704304
SHA2566c7abeebd50487ca33315f5e507c9a5346e6e7a4b732103b35b8006ed58d7bb2
SHA5120042e806d50c938fb1f08506327c87cd99e4f5f9520636b20695d94a696bb8b3f500f6d9507cb46fdba27c60cc0cb9e3c1e7c35dcfb7fcf4dadac3270e654f75
-
Filesize
1.1MB
MD5dc6114cf663ccdb1e55d37e6501c54cc
SHA18007df78476f6e723ddcb3ad6d515e558dcb97c9
SHA256d566164c874ef66149b493e3220616cdb9090a8cebb4a1325c48c705aea5c348
SHA512677464e6dab367f9158655533cade6e1ec4b39c4e64b05395e72e4099ca7f8fa82b8e49846932956da5fef760cc109a348e1c599d986166998e4d2623022a28c
-
Filesize
381KB
MD52352318f01171370a31048e3ef80a4a9
SHA1aeca009b93c80a3a51eaefa035b09f8a5aa6d252
SHA25688b241c269c0b657ed4a2b09b0835f15f4dee77d0bb8fec3240bb14d93ba0b62
SHA5127783abcc2a0e448ea476c53d70b8d04f4c90c3b30b72a1b89310fb6f9f05efcc7e511276cc045c3e3f476e932874c3aef30366872b408fa257561aba2d907b3b
-
Filesize
140KB
MD5efa16affa5bb0cd11601b66850e36fd8
SHA1fc6e8f93e0caf43ace7d297bdd9fe430cfa10a67
SHA256ceb004f43a4edc51ce5f3f4e51c67df5569da17c4ce189509973cce27050d92a
SHA51290a36edf39606fc30cda1da07cbdf4b9399377a00f59904a97b87ee41ee443a570231c79432155aea08a5d20bcbfd0e897b682d736a873547acdbeb5b259cd90
-
Filesize
155KB
MD56e2056a06a20c59fa9bfdef3490accf0
SHA14f84138c0c61e1c37e7c0b316c77b48a6401c3e1
SHA2563ec70e2e58fc40e7031e37af2ea1f0ed1202d9608b91b29d5cef568a8900d387
SHA512191a9a19d2eee3af36571177109a394a5f0582fc5c763c38b4490253c7f58329bb391981bf1702dda672e5a6b908585ddb92cf4ece71c082311b1e096430bd3d
-
Filesize
230KB
MD594a6f89a6391389a41d4ab2f660ccbad
SHA161a95366a8fee5c11120f25d5d2f5202f4a550da
SHA256da4ac3ca15fae5fa60717bf9a20e113d4108c7be883be4fe39d9e1fa91059325
SHA512cf27c8767ebedb492a4f3eff73ac2884cde945eadc1c75ea20df5e981770423b0b5a7b76083c8d0499469d33f83d61c2c5608ff0b618d1fd420cf9e3163ad39d
-
Filesize
207KB
MD5137088e3f14337e7dd22e79ad53bf6bd
SHA1fa12820a19d300a11e839457c4db2c4f9b19a93b
SHA256d10e2f064a6beac6affab5cb5e7105961f5671f73dc22e2ab4a0a23dd91e0e21
SHA51252056afdc54c16f8db18ea10769d44a98df8a2974edf9d0abf6e7677dd4b5505183d5d472142ec8998ce69da3471df940f424383a572d23ccfee11105dd33646
-
Filesize
265KB
MD5f38304be865a9f773dcac807b42684a4
SHA15dfb3d4424b20bec9a93cac785c4d6b65ec847d9
SHA2560cd50ff5ddf00cdcf95370e5f169038293b1f4783380f88d2ce12e14eb73eafd
SHA512ec81d5b8859937281e0018ba9ee9874e1de59f1f413440b5a3115662154c71546433efacf7e51d71c2893f81ebb41cd2268134849b07625e9861ba1d370ed3a0
-
Filesize
439KB
MD5e9228ebf8b765c170034519a798bc2a3
SHA1a28837f4aca4e86450ed38557f5f9dd4bec7eee0
SHA2566a7e5d2f0c486637a27014308bb90944b571b3b1b09d70d37cfbfbc56ff575c9
SHA5123139cf9ff431a5091512919718da45e86517c63511d90f1643897369d95af0bddaadb00a51bc3da82ebab6c76616d3ee9d3ee7f9f29e98802bf0b28737102423
-
Filesize
170KB
MD5bcb3a4cfb104d4640666022cb8f25f31
SHA19be06951a98f46fe08c815a04ea65a87a552f581
SHA256eb8026666033365e44ba6a474f6c8495c73ef7418e8d524b7b633f278d25f2b8
SHA512ce787c3dc0133a9b6ddc229ec57b0756d527ee1b285142194d03c9ed5d944e3c182304bd25e0e14bb38af9b61136aea1deaa4e8464d35e96c6aca3441378af11
-
Filesize
109KB
MD5e7453c1dd4fed00fef5b207154b1865c
SHA1d564582f8ee7a0995724cd6ca0e05f77833344e6
SHA256a4681090000fda2fefe58adab06039ba2fc21d58226f93230be5a19a46eff6a7
SHA5124a4df1d30264afec9a81c92e5563daa5417863553f1ab159bc90d1e67e7de894af138ac4dc1df87fab835e6c033a07e838144b1cefe983afdfff7b43369d5305
-
Filesize
392KB
MD562070adb54d3d6be66cf523a2dabdc9d
SHA1db079cf6656b3f743b4d5844fd292aab090a0f09
SHA256352d8b4010e648b5839b25c3d97edad29741577b773c54a0de6fcc98f6186f37
SHA512571d435555e5e4d8b0ec5c49377a190d2926616519408a475191b4b5b73da20dded3f2ddf15934ef66ffd4c1fb7c9a45d0eeeec761156038afa32dd5face1212
-
Filesize
485KB
MD5048da0aced67fe14cbc1801a057b8cef
SHA19ddac6ad86b54d0b7e1d22fbc1ff75ccfa9c17ea
SHA2562f37cac4a1dbf7944d43f1154ce293311c3f9d44317276a06b49cd41123d9d96
SHA5121d2b23dc25ea03002a3ccbcdf08a7ebf47ee2158bf9211b71830a92dfa4bef584529c1804148ebe2cb662e579cc97e9f702a6a42071f2600a129c642a6b92c16
-
Filesize
714KB
MD56686e6b195120668e21177aff058e81e
SHA1a56f0d0e942b2b657e0dd7848e78d53c6740880e
SHA256ca99df46bb3b85ee7be086eaf3b10eee8abc4c8dbeef690ca8c0bfc9eec845d9
SHA512de1b827b645740f6d7895e6333fa73b2b0b4af500a5457740d810580a67f327e5bdd98ccf1e1cce44a64869b0ef3c52b224dd148fe37976d58f66e0823215559
-
Filesize
674KB
MD580c124900fe2a6955fa8ef8e317da894
SHA14a6224f6b9344261cd8d373b572dc5a89f9e1ae7
SHA256244efc6b493b0e65285259a2c1755d5fc84e3622b2487bd8d89dbc077654fdd8
SHA5125a1a34a6e6179ab3a690e8186abf5b7e2407126632758e127b55f5af6af5eb7657629472bf4898b1883e7d725f03e7e8e45337687ebed19f6204b74593d8b047
-
Filesize
536KB
MD5a4520658cdbf168d2c320e37bb9dfdba
SHA1519f1e681069148ffd29d1043d6f815b37797572
SHA256fbd2d02523b9729e8cf84435700ab889b0648e9c367a889b765479b35e5409bc
SHA512b9fb491858ee8cf42cabc7ceefb8c00a543cebbf59e1e7d0c659de2488886e354183f4d00b87c023bf59b29a4904c76d42c3507254aed6505ad368c4ec73100e
-
Filesize
485KB
MD5f8090e8496b322fd6dd512c484f10b3c
SHA14ca215ba4ffe3dc657081da15e66f1494378e1bc
SHA2569625759a71f257480d6c5956adaf86eb178ecbe62521ed91d2ad2a45813d1e00
SHA5129c2eae3b34504dc2e4fafc3e08cce8ed240de871a6d47d57ac84da2e0fb7a4d445a9f2bbb4f2844eb4112a8e9b4ac9c226daeadfc14fe568bafe2d7659560a2b
-
Filesize
536KB
MD507e2e5e4db50a75a4bbfe44dbdc1f5aa
SHA1c25f3772cbc726f82ea206b2462360cf29156dce
SHA2560a978dbd27bf909ed5df411f963d44eac3ccebb493740e1fdbbb59801fb783c5
SHA5123ad076f0c2cf3bf1bc51e292275f85387beeaae4984af597186f4821ec5c85b2a6118342e85340609d0248cce21a6b585c2e21c48534dec568fa2a0fbf09badc
-
Filesize
26KB
MD5be686ea0e2b57294fb4b0578341613b4
SHA1c86068b25721456e79a67748883ac5889881c45b
SHA256abfaf3015363fcd4e22e46582dfcdeaf22cb2a5946509bc0424912390f5f3a79
SHA5126d1486f3c665021ece38353c34a26662e5c40ef129cfeb33edf3a6fe7b98006808f06fb68a233a188d59b3a96a371abd130ef4eccdc02364fc2c6348d4cf44b6
-
Filesize
579KB
MD5b9940c6838debd2a4118bac000958a69
SHA15ae0388a8f557d805d5fbbdbeb61ba38dce41b41
SHA256d59e99796805e6773f7d2e7ab23c200d104401121b2345f6def90fa01732a3be
SHA512e95e9074b4e0edfb58cbc280d0cd8e9ab015fcada40914f2bc4f023629a419e2dc7752e0507d20038aca966f1d8d879bb77b870c4773c16b7501fb53cfbda0c2
-
Filesize
8B
MD5b0bb716aeb29434c89466b52d0197ba4
SHA1bbf5b34e56ec01dfbb06b07d08783b096863d8c2
SHA256beb5e2717e701c7dffd829f6aa695cdd7d2a0401cb864fdfabf4db4cf82fcedc
SHA51223236cf8b56b99da16ffb98cb1f8e17e2790e2e258a79085f954cecaa5f6b9fb63d32eb1b1e47da24333056ef1d55e69eef2970e66266a4575380521a581999d
-
Filesize
43B
MD590653a16a90c8ab4e5ebbadb75a4aa74
SHA11be2d311bbb06ccd61ed1c58aa18adfc7a61a1c7
SHA256f453097b9fbbae95f533e63f912165b7071b2a3e365a715582e3f6e622947e66
SHA512ec9c520cacefa06d672d295966409b750470b8a30d960c1ef25f14368a3c7c5a0f57347651f44bbcfecad259896cd878bcf234116cfc208b84de7269b3fd82da
-
Filesize
40KB
MD543fc4929871d14a18f2b3cff223b3aa9
SHA13a88de51da5bc9396042b14f39ecf192ee961251
SHA2568a92655b90065f6e17165c09de1e045dcedcf05f335aa25e1d3d7acd057f9e47
SHA512c7b6daeb476805e03f07cf24bb113d74601628afd3831fec3c8f5a8a02b0a5784a864576240f6d7674e7ba4ecf525132bf88c9044133bff244e1662dd1332a35
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
652KB
MD5023fe8eda5c78704631d2bed34f13617
SHA141e355629590f0c46e206553b734b2b493c85736
SHA256c0e47754f65040feeba68633a138d6bc86a4d1673749e33b88ad58e541f0ecde
SHA512b5ac5b65c8211cef0133592b55f0abc9a324032a02e590898ad67cbe4c3f4dd7cd078d6bb803d9c9c9045103e8381247e1d562de1c0de328fbd7f207a7dcc770
-
Filesize
693KB
MD5e122a745429bbe9429528392cf2f64fc
SHA1b27cf1d499d32b569c765ff74f38278b08675d9c
SHA256fe4e03644a5e1a8da8c2b7ad61eb350165f5c1d797bb5257f5a3a49ebb8df11f
SHA5128be1b16c28e7a1183896f0edaf414fd797cb15b476bde5fdc5275b3d8c83636e5a0fae27847f62c0428ed3b6a358db5c9654572051bffcdd0f68d421f8ca5134