Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 14:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe
Resource
win10v2004-20250207-en
General
-
Target
JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe
-
Size
1013KB
-
MD5
f92359062dc66a57f6ab00e784f1e495
-
SHA1
4c95214e1399b27d56872d6ec719f6118f12e569
-
SHA256
13c915b6798a47b5dd873b24b1c276eb5ffb190e62d12efe3d0d6a580eb65da3
-
SHA512
dce4035fffd6b3a2cdd5f4b5384448339537853defdc3466e039eb4073b6ce07c73b60f7d8b9420afc5a28d215287b8b1caa75b369f460dca0411438f5368c35
-
SSDEEP
12288:7ng2XY3mqzJFrTjSWPob/0TuvRUpHdc709aWbFUBfo5Tvraiam3xPaqGhE/fjuSm:7g2XY3mqTjMvRUpCA9PTTn3NaBMf
Malware Config
Extracted
Protocol: ftp- Host:
fan-games.do.am - Port:
21 - Username:
8fan-games - Password:
16069812s
Signatures
-
Detect Neshta payload 4 IoCs
resource yara_rule behavioral2/files/0x000c000000023d39-5.dat family_neshta behavioral2/files/0x0007000000023e29-13.dat family_neshta behavioral2/files/0x0007000000023e2c-31.dat family_neshta behavioral2/memory/1592-228-0x0000000000400000-0x00000000004FF000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 34 1588 Process not Found -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PE1.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation Ingektor.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe Key value queried \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000\Control Panel\International\Geo\Nation Ingektor.exe -
Executes dropped EXE 6 IoCs
pid Process 936 Ingektor.exe 1040 Ingektor.exe 4332 svchost.com 4524 PE1.exe 2020 svchost.com 4232 PE2.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Ingektor.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\IDENTI~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~2\13195~1.43\MICROS~3.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~2\MICROS~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE Ingektor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\MSEDGE~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe Ingektor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\MSEDGE~3.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe Ingektor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE Ingektor.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe Ingektor.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE Ingektor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE Ingektor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\NOTIFI~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\PWAHEL~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\msedge.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~2\13195~1.43\MIA062~1.EXE svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe Ingektor.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe Ingektor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\INSTAL~1\setup.exe Ingektor.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE svchost.com File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe Ingektor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\COOKIE~1.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeCore\132029~1.140\MSEDGE~3.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~2\13195~1.43\MI391D~1.EXE Ingektor.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE Ingektor.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE Ingektor.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE svchost.com File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE svchost.com -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com Ingektor.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PE2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ingektor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ingektor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PE1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1436 MicrosoftEdgeUpdate.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" Ingektor.exe Key created \REGISTRY\USER\S-1-5-21-3932017190-1449707826-1445630-1000_Classes\Local Settings Ingektor.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4524 PE1.exe 4524 PE1.exe 4524 PE1.exe 4524 PE1.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe 4232 PE2.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1592 wrote to memory of 936 1592 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 87 PID 1592 wrote to memory of 936 1592 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 87 PID 1592 wrote to memory of 936 1592 JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe 87 PID 936 wrote to memory of 1040 936 Ingektor.exe 88 PID 936 wrote to memory of 1040 936 Ingektor.exe 88 PID 936 wrote to memory of 1040 936 Ingektor.exe 88 PID 1040 wrote to memory of 4332 1040 Ingektor.exe 90 PID 1040 wrote to memory of 4332 1040 Ingektor.exe 90 PID 1040 wrote to memory of 4332 1040 Ingektor.exe 90 PID 4332 wrote to memory of 4524 4332 svchost.com 91 PID 4332 wrote to memory of 4524 4332 svchost.com 91 PID 4332 wrote to memory of 4524 4332 svchost.com 91 PID 1040 wrote to memory of 2020 1040 Ingektor.exe 92 PID 1040 wrote to memory of 2020 1040 Ingektor.exe 92 PID 1040 wrote to memory of 2020 1040 Ingektor.exe 92 PID 2020 wrote to memory of 4232 2020 svchost.com 93 PID 2020 wrote to memory of 4232 2020 svchost.com 93 PID 2020 wrote to memory of 4232 2020 svchost.com 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f92359062dc66a57f6ab00e784f1e495.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Ingektor.exe"C:\Users\Admin\AppData\Local\Temp\Ingektor.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\Ingektor.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\Ingektor.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\PE1.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\PE1.exeC:\Users\Admin\AppData\Local\Temp\PE1.exe5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\PE2.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\PE2.exeC:\Users\Admin\AppData\Local\Temp\PE2.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY0MzMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODc1OTU2NTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDM2NTQxMTc3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1436
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD50e232ded1fa1d4430b90a236eca9fc6d
SHA1fe93b9f81943e508f1c4c295414ec2ec6c374dae
SHA2569842b44108f51a5da5e89c761ddfe6f1fd43d791312b1239549515b5be71922b
SHA5125627da9e47b0addb94d8bfa6fa644ba6584a87cad254bb962566697996d9d0327b764439b2923bcc9717df2ede79eae7f9c091fa969fa287a8d0875aee0eb2cb
-
Filesize
131KB
MD5514972e16cdda8b53012ad8a14a26e60
SHA1aa082c2fbe0b3dd5c47952f9a285636412203559
SHA25649091e1e41980b39d8de055fe6c6a1dc69398f17817960d64743e7efb740efc4
SHA51298bbd6f06e3ff3e94aee3620f20f89e254dde157bc8129a64cf78fefe5cf9b13c7902128c2acbd54b3def527e09a039bd1f66ba64efb85f3f0404d894cabbee4
-
Filesize
92KB
MD53e8712e3f8ce04d61b1c23d9494e1154
SHA17e28cd92992cdee55a02b5ece4b7c2fc4dd0c5e4
SHA2567a8ee09f8a75b3e812f99a0b611c6720626c62c6985306a408694389a996c8e9
SHA512d07d924f338bd36ca51c8e11931f7ff069e65942725a8e1f1ff6b81076a987ab7d787452a5fb08314edf1489e081f4164db1ad299a6d78401e630796f4487dc8
-
Filesize
188KB
MD532370f43bb0a864b6f723f70faae22c1
SHA19502cb80ccc6414c62863389b04fe3e5f959f682
SHA256aa9c190653187d9bfda6c8c7264cf35829184ce39167a82ce1d5f5a82c9be16c
SHA51221b21ab01548ebb79c36272d64ce633955890f75815abf1eb04c5947f84e02af4f3a5245260630bc204914f0e94b4be09a0de45e7d7ee3200885eeddff95565b
-
Filesize
494KB
MD51b0841fe3786ef37affe9115404637a0
SHA1c3209520ae779f2fd2babe293e4b4fedb394aef9
SHA256e1a35f201df61ddcc4aa8ed88ecf5c46f376e39bfdee40a728083ae7f3431dcc
SHA512421e0ba5a08428ef2f1efd804b1c57de544a6f9128ed0f8fdbccb6c03fe08cb3128d2b0d99da22c38114183d7b538d560a889d6e4bfe9158e4e3678cc23dc569
-
Filesize
595KB
MD5c3c9aa04ba87f6759a557db06341f8be
SHA1ebb57b17b62fdc896f1f272ce41e3b7b3d397ee1
SHA256037ef9ddd200ff48535aeb2d6bd0f97e7113c5ae9fb79ad90e4018a0467e35ac
SHA51285978bcad611921d70c0552ea1c904de8f16213694e1e0e339a769a2d73694ff9fd247dc7f4e08960ba99d2e9c5e3880b3e5e56aeaafd1607a60c7a10a8cb9da
-
Filesize
325KB
MD5de9e6086062f01926b48c2d80508d12b
SHA113610cca5e38925e22b6a79067df0dd9eca49fe3
SHA256d2f956514bc885fed054dec3ad4c0e89e59a6a38390fa8432abd15eb201468b4
SHA51260478e55b6a3d49686ed8e95e939a2384fb1440950d710e7beedb9eda24be0e6996c931d0703d6cc0065fbe5a85eff463b9e9eaadf14746593abe723636137c3
-
Filesize
505KB
MD57aac73055860fcd079d9407cab08276d
SHA1482b9f337d60270c95950353f9ca8929d8926b1d
SHA25697508a81b805937e1ca57711a51d2e8d715a2748e2f9d27d39dfecc28f3fb9e5
SHA512f183a10eb13c083c7cd8e785a7978eee4998c33d1eb104a0ab0e54146e10651f68612249e668baa08919a5840f6f929b5452c93f71a232b30aab9e2857109fb5
-
Filesize
366KB
MD519ef16528bf35759773e9e82aafd0be6
SHA1e582a7a83bbe08faf9ad8fc6ffa73662263d9a0c
SHA256d459b1ce26b0d127b746b5f0b0c47a83864dc8487f830d5d7784f4ef8281e5a6
SHA512c82431209954926303574086e6b5d5526a39075df03d4e771de7f7f1ad4dd6ddc868f1d59cc29c6687b2cfb1a66b1fafd3a4225739b4bf5391cf0b33a8ae80af
-
Filesize
221KB
MD5a12297c17e3747647d5c29d67edd4d9a
SHA16a6ed9d50d8385b2fb1da6c700934bf213e1ec2d
SHA256288f7e376d1ba967276a05a1b00fddff236315ee0df24e543cf8b604768ae7f2
SHA512e1004b5307f26af7c22ec051539ed633105ac6673301d31a57cb530ab76551b51aa59741397d1b9fe860bed8c93c2a21d8e828edd1612750bcec1bd068898239
-
Filesize
198KB
MD52424d589d7997df1356c160a9a82088c
SHA1ca9b479043636434f32c74c2299210ef9f933b98
SHA2569d6982a566148cf69cb6aec417baddca680e647931315736a6c19f2ba91c4d60
SHA5124dd0a69c1dfb0e88fc6b24c97e14dd0ad1ac0226dd372d09123b6a2ec3c107fc94a810764d16e111d1cf7e81a23b70b84d36cbfbf1e32986d00de3cd9e315c2b
-
Filesize
258KB
MD578f77aff4993684fdbcad13c74d5f364
SHA10b02ed9112021b3c65778fdce0642e81dfb5b628
SHA2569f707deff2f5b5a8c611c5926362c4ffc82f5744a4699f3fb1ee3ef6bb9b2cfb
SHA512568c1abf5f6d13fe37cb55a5f5992dea38e30fc80812a977c0ae25ed30f67321db8f4c0da2ae4ae558e58dc430885fa13c1f7f1d6b2d6bb51ed031f042defafb
-
Filesize
433KB
MD5b6283a7eb554d995d9a7c72dcfca14b5
SHA167d64907800c611bbcefd31d2494da12962f5022
SHA256099da4830adbab785d86ca4680c041458acfe798ed8b301b2bb6bd47891ed881
SHA512a6d96a13b8672d0f1d50ac22ba95b715527050ce91bb67dc261732e0a114ef2902e3380577546ff34860f65723a143153cea47ae31e12bb27dd3f4f5ee2245f3
-
Filesize
1.7MB
MD5619314ef3e2e5abde1bb19dbce363220
SHA15fc9e9c74d8fdc9d185f524dc1364500883c4eef
SHA256763c48c14695500dd1f8b1b88f7be84a9fe95d9a7bb63211f74cbe210e0a58af
SHA5125389516629a884b109950254398d1453fd573ce6f73ff3479322c1361ec990b53cd0cec2fbe366e7ab0ba704bfb1f5fd58dc7ec3d81254c9256973f4983ec360
-
Filesize
290KB
MD54329c9444edcae6d28804a2f83a98487
SHA12e94a802e6e546489b89a61cd7f1d956017b8d1f
SHA256fed1f5db53a5b046e5dfe2bae8ac8c0c0fb1fc68babb4b9c625258225385d3d7
SHA51297e2112a212b64520014b2973810dd588cf952cf2c92093865c779051252ad2572a424b9b4bc98c41fb15ca2ab3ea83a7a163cd6800223be8ab6faf446b667a6
-
Filesize
557KB
MD57679e34fc882e5a30ab033ff506813d4
SHA16caa16b423d6cccf4197b3233045ac05c55514b4
SHA25644ca58f75a04e7a67ace15810cd3905a840443f27eba29beeaf5304fe6964e5c
SHA51268fb6e965b3e93f3632aa548fd27b0e26c582fca1e1d4ee48dcfaaf4af4c378fc0aef598866f935e389226be441e669ae5ec2233d5c2805ffe543191586b4fd9
-
Filesize
6.6MB
MD585b506435c4b023af9790319906b317f
SHA18b55cd704c5c4df6a73563f60d12b1b58effb4d9
SHA2569cab79c0a7eedd2f603c6e02eb6e17c15f2b9037dcdb7624c8d7e95c72445c98
SHA512ba113276b401669a607020470ae877c3244a7d799e9a18040d9817b253a0fd7ded3e4c049193071456cbfd32046d1386fa965d1cb81f5f83b50f9dbd05438b11
-
Filesize
202KB
MD51567b6ba2597bc8e19e1287d09f693c0
SHA1a5db29389a610b8aa44ac11412917668e9a57dae
SHA256470eea15071ace8629d7026a0009e7b409d4a0bf54a7eeddde0d8753e7294b60
SHA51247a93ca28e9acb30e9b79f82c8de460a78648441d3e58002d80dad59a9693169c9d7b2310b1086f95d4f1b4c93c16096977d84eb4fad83ff3835b0320efc9afd
-
Filesize
1.8MB
MD5db785cf66d6e434b146d4fa9fb544913
SHA13c358d1ff54b912fd8992d568872678c29ed2f9b
SHA2567432a81735678e4f3799de0e2746ba11a3054c5d312a1a2e2061ff59cfd0ce6e
SHA5125fc8aceeee777d09a014c099cdc7b4d51de2c9fd30a32f77dba6f67ce0831533cf8056af0cc8098665c215310a2b05354cfb0694537214fc91e7ff63013b2ebe
-
Filesize
1.1MB
MD505e4ae9d71f2e61f2ceea8258f049983
SHA14a59903212ae095ef48aa574c58993b059e0b9f0
SHA256f5b5eea7c5799108bf4c2569a9dd8186a9c364735c445e26a784a84c2b99c806
SHA512300001888a797a8f6c23321acae95edeca379eb4f09f562e7d650399115a5ff695e66de9d378d896c9c6ec51a4d12d726589de9cf04df707cc4960fbd2228649
-
Filesize
3.8MB
MD550daf3f01a373cd703394f982b411f28
SHA1a2daa08c8ce19d986f65c62615bb6f913f4ba55d
SHA2561c0ca922a9c4b61571626fa966e8de8a0c0ece6ecabf13146912c3f09d1ef6f3
SHA512b5f9120d81da341259d95896257f4ab1f0e6bbb9bd7a1c1f4c87ade15a4e660ee428791432f3bbe63236cc59516d273221addd1d1048f2befd8d7594ba4e0d63
-
Filesize
1.5MB
MD5b4a36a924b65d67e0aca125e3e70280d
SHA188ddfc7315d71715cfe313a5fa8c1bc0241c6168
SHA2560a34bbdbd8d9d0f6312b1706642854baacfd7958dd2d7950c1d5103407d015ab
SHA51299ec800ad818b8468b8639c07b61045c2cdf36cfba391dfd4d978f0ba0ca103150dc65b71317f8c2ca418188d07ab901363fb36571899cb54207e49b137dff38
-
Filesize
3.2MB
MD5856ac42fbc0c71b0b7de013db0bbd3f5
SHA1d668b09a9aefd0c5dcd969d6b2ec0cd59f58eaf5
SHA2566bb06e7c1b85c5b1e57317781168cb5d9259bf955a3cb7f17b98070dc72526c6
SHA512cb3a79f359ba1ebdf8cb381ed60443e4dea06da851dd67bc2c4d7931a22a7300836e30df66ac026389410852b2bffd574cbe5bb9b7de3530a509acfca79a3b15
-
Filesize
1.1MB
MD5ba8194af81a6e9720bc6e4e825534689
SHA195ddca9ae5cc4f80465c7206d18a5befd2d74678
SHA25649a0f652e005af8fa66aab3aa1fcafad235c84fb7d87b5c1337adbcf7a7ffc3e
SHA51259eafc2394e1a6ae5cc572d0b1b07526480e4d6ec794357d2761b7541f59c9b425f317e2e202b524ea8eef9feae00f4fbd495dc191600c1501af1c077487143e
-
Filesize
1.1MB
MD5bbf80e9092dc8e87e0e450df989cc6e4
SHA1fac018e4698f282b9d25e52ff9cdfcc646d97154
SHA2561519a3ea1203e03eb93b3bb00685f3ad7746732231e5a9ea7dfb098a00e202a2
SHA5120d1bc04cbe4a726c47152c7e2b295f487db4789c3b040add9fb2b68c278e4c77d06bc582359bc59672e635a7318fce94a2d3a6ba9730035dd5a85c370b9befb2
-
Filesize
1.3MB
MD517deadcebdf50756ce3471ee7801c7d0
SHA1cea7c1450375fdf6f49a5ecb4c08bdd8480da7dc
SHA256e6c464bf2a94bc6b3895dc82d9bce044c3845c8b13c8271399d64f68f4def13e
SHA51292511faa8c8c6da107fb99f0a0179c7bbe2a340a6ca4f71dcfbcbf9671f548abb68077c97cc080b203e0bd80e0ba54e6276ba7485bb51bdb898d8433501dc700
-
Filesize
1.3MB
MD5b8bffe8467716db4da9d94061dc33d07
SHA1db4bac1757b1b60b26e2fef0fc88ce708efad352
SHA256b03986224aa28f1e1850bd2fcd1a5f5f2fea34c2c0815d8e6943f0a98b754af2
SHA5125d6f6363c9c87c61d2be785280d420725fe7cc4b68908e78fc82dc480260a400500a84f1c9247b34437cd520d702ef5fc4546024fed891231630514d1418592c
-
Filesize
1.1MB
MD5ecda5b4161dbf34af2cd3bd4b4ca92a6
SHA1a76347d21e3bfc8d9a528097318e4b037d7b1351
SHA25698e7a35dd61a5eeea32ca5ff0f195b7e5931429e2e4b12d1e75ca09ddab3278f
SHA5123cd3d64e7670ab824d36a792faa5d16a61f080d52345e07b0ef8396b2a1481876a3b30fc702bf0018a1b02c7788c3c7f1b016590c5b31485a90e3a375f11dade
-
Filesize
3.2MB
MD5b30563cc31305ef1397cfa0f379b8963
SHA15a78c13fc0035cddb68117e2085dd794d17e13f5
SHA256c4443fb6195c73ee05f0718f948df0f3a8ec259d72196a2a0edc5f7eaed96bae
SHA5123b376c2b8daf658de6d6f23d3b36dd64b57b4bdcac045f2caa45ea22f9eed92ee1cb314b385776663bef563fb30e7b54c3cbe072c88e6b8db37171a14ff85a56
-
Filesize
526KB
MD5db8dba64b7556b0e7e7e12d63584e0a3
SHA120749fe0f2c90bd1f9afbc79ed7d591f7e962ce3
SHA256d169e4bc9e92f6f3a811e9a888f68d6da5a36a19e51ee5f97140d09169c46b68
SHA512bc05b208a5d1598167368ee12e08af2a2c5429f6c143a92bbcf79e22fdf0722a805ba5f6ce80fcfd29cd9a615d9da1b60f6aa92f827a1c24db6db382542bbcb2
-
Filesize
674KB
MD580c124900fe2a6955fa8ef8e317da894
SHA14a6224f6b9344261cd8d373b572dc5a89f9e1ae7
SHA256244efc6b493b0e65285259a2c1755d5fc84e3622b2487bd8d89dbc077654fdd8
SHA5125a1a34a6e6179ab3a690e8186abf5b7e2407126632758e127b55f5af6af5eb7657629472bf4898b1883e7d725f03e7e8e45337687ebed19f6204b74593d8b047
-
Filesize
495KB
MD596c338591ac8ea4483337c8371cfbab9
SHA121bed3f86db1c33912390db397678631c876f431
SHA2567237de120dcf61936d33394b8e211d4af88a7e4c6ee53cf053a54b8b60c23a1e
SHA51244e44c466ca812a1ce21f5ba8e3e57434ae7ff1549b0315d3887cd467da40e1604ec9a69f07d7e3c834aa1d96c8206628ce173ae8a8a59a9d713b516f58e9455
-
Filesize
494KB
MD52b10fad55bb461c01d3f922c3fbf7d2e
SHA1e899a087bc0a8b36c79d24505dc72813a25b0eb9
SHA2568f1d9b2c820fb05556bc9ddabafc7e5cf51c5c01075bab11d68ae965ca21f68f
SHA5122a47bf1f477dcf0070e9157cc0b816fd1563075a19286df7bb4d3fc368552d72a95505a35bba961b69b3561d1d858857c14762b7c046c6cf382d08e037f2ec61
-
Filesize
6.7MB
MD56300a726756bfdf266b92f280a0e79f3
SHA1c1d31d9e79102f137cb6825feb49090698486a22
SHA256e4150e18e46af7fbcd5ce928dba86e3eed7f5ab0f122b2bb9d1bab99122fef4b
SHA5122070828dc743a56866c2668337f04e7a052f501279d75bbae802424ed3ea5cc82ecb27c779a701b9d29953c07ee8eff7b61b326617001d9167389d02f068af7c
-
Filesize
674KB
MD5fc1fae6a02f5ef05113aec947eda5996
SHA1ed831802511f89d436c02f0fd3deecf37f770d3b
SHA256cc92fdf41d3600a028d91ba0c2d28d3c6cd77e3ed58d257164d5d3d907908356
SHA5120e6b3707c331cd2d1740513730cc6e0da3f750d5b9d08b398ef4cdd2ace9ee8f076f0706cdfe621de93bdf3d4e9ee015c6fbd68484da13affbbc05576eaa90da
-
Filesize
650KB
MD5fc3c02a4d4d5861fabd35e1fee6c471a
SHA11596a8ee947e5fdff7f1f03b694bfb71e9b1ddd1
SHA256741ab407aa8af5f0f09d42a3c4eca0cf39a40af9a261d3f0d653b13f7e5ad36f
SHA512d6dae86cdf99696c7af7b397d8a81d09671f96801472063567dc4f6780d35307e2f149af6762616ece84039c34099c26fa6e1460da5ffe8acbc56da5b28afc97
-
Filesize
485KB
MD5f8090e8496b322fd6dd512c484f10b3c
SHA14ca215ba4ffe3dc657081da15e66f1494378e1bc
SHA2569625759a71f257480d6c5956adaf86eb178ecbe62521ed91d2ad2a45813d1e00
SHA5129c2eae3b34504dc2e4fafc3e08cce8ed240de871a6d47d57ac84da2e0fb7a4d445a9f2bbb4f2844eb4112a8e9b4ac9c226daeadfc14fe568bafe2d7659560a2b
-
Filesize
650KB
MD5b4a9e8c5e7bcadb8fb1f496a8b3d432d
SHA1db0acfd1076ac8ca647c2b8bfc4cca14a73086fe
SHA25624239e1485e27b3056b5c7584be613d9648c631cd448421633a64d962ec98f80
SHA512329e3b7ed2d14c0d92384118f6f073135adbda07a7bdd82e21f489f194a36e245972af0271d3b4aaa9cf348e8704c1b03f8b8b2f2cd15f0c57822b3951b10dab
-
Filesize
691KB
MD511ff3ddf09535936e340e7d8c7e76dca
SHA1e34c5858e3c86e001bf430711157104a1aa12c44
SHA256e3ea727cbe63a89f8019d85ff01f57d73d6dabff43c46647f5e9f215095bfa85
SHA5127d6888803fc363ff0d72b49e46088f1da53f27659b4a6196c1ceec455619a7de0819f0bf24c76f8652b52255d2d0145dc1e8ed7407b1ba78b8ba82b5b4e9a1c0
-
Filesize
495KB
MD5e2b4d2c7b6fa09e5bd3f6df9fc6e8655
SHA1eca5d5cc3475a9628b504102f61e0bd9dac9ad02
SHA256b00ec004498d598e10f285bb322b859cd57b640c500c804e7b15a212aaded5fa
SHA512db02329122f67bb2241bbe91d5b0c2570782d643ba382e691cfa6ee306eb257b2f92c0920a34f2b56d656d8fb2c02e22cb933faa03884848d7b66028de05b1ed
-
Filesize
1.7MB
MD554a9fc4d1b76b9fc86bf6e2994b665d9
SHA1f4d4cf34fca1f7f2e4b9cd2bce384b55c6eeeade
SHA256abaccaaffcbd7e0ae5f8e8a88843d7cc6f6a8dee882565f58dc2c3d9fdd914b5
SHA512f75c920325a825f7dd84e5c9550cde80dd1dc8cc4f7ba617c00f83a5dbc12d61bcf404d912f9257b94cd737de8dbbc4cf9d568a6af76c0bae71d179cc1d17919
-
Filesize
652KB
MD5023fe8eda5c78704631d2bed34f13617
SHA141e355629590f0c46e206553b734b2b493c85736
SHA256c0e47754f65040feeba68633a138d6bc86a4d1673749e33b88ad58e541f0ecde
SHA512b5ac5b65c8211cef0133592b55f0abc9a324032a02e590898ad67cbe4c3f4dd7cd078d6bb803d9c9c9045103e8381247e1d562de1c0de328fbd7f207a7dcc770
-
Filesize
693KB
MD5e122a745429bbe9429528392cf2f64fc
SHA1b27cf1d499d32b569c765ff74f38278b08675d9c
SHA256fe4e03644a5e1a8da8c2b7ad61eb350165f5c1d797bb5257f5a3a49ebb8df11f
SHA5128be1b16c28e7a1183896f0edaf414fd797cb15b476bde5fdc5275b3d8c83636e5a0fae27847f62c0428ed3b6a358db5c9654572051bffcdd0f68d421f8ca5134
-
Filesize
26KB
MD5be686ea0e2b57294fb4b0578341613b4
SHA1c86068b25721456e79a67748883ac5889881c45b
SHA256abfaf3015363fcd4e22e46582dfcdeaf22cb2a5946509bc0424912390f5f3a79
SHA5126d1486f3c665021ece38353c34a26662e5c40ef129cfeb33edf3a6fe7b98006808f06fb68a233a188d59b3a96a371abd130ef4eccdc02364fc2c6348d4cf44b6
-
Filesize
579KB
MD588ac1d6e152252237eadc77097017608
SHA12c739896fbbcfe8eba48486f717df9292d6c7dcf
SHA256945f0772e443cb8e001ef0e17e304be7607318994a715d1f08bba0f0095779c6
SHA512a67fd174d527d1c7024fe72153d5c79ee3d9e6054ea51f921c3f5d855edee78163402d0e5edb4e3ed43d8fab01e3a457da214c938e1b9f598a91bf78b5c2c50a
-
Filesize
579KB
MD5b9940c6838debd2a4118bac000958a69
SHA15ae0388a8f557d805d5fbbdbeb61ba38dce41b41
SHA256d59e99796805e6773f7d2e7ab23c200d104401121b2345f6def90fa01732a3be
SHA512e95e9074b4e0edfb58cbc280d0cd8e9ab015fcada40914f2bc4f023629a419e2dc7752e0507d20038aca966f1d8d879bb77b870c4773c16b7501fb53cfbda0c2
-
Filesize
8B
MD5cf32d725d6adc35c0ce61373ee51435c
SHA1d5f99ec4fb438b7014faf9079d5b4c8eb37a5646
SHA25601ac858fb3d37921f318f55a21559f978df4bb7ed336dc987b323aa39c32906b
SHA51222e8052c73dcde3e0074968da3b33890fa284919eebee3b91da4bd150800e2e48f273e2e6bf53962f136c52438cbbe91d959e513e8e89633d17760cdbf5cb373
-
Filesize
43B
MD590653a16a90c8ab4e5ebbadb75a4aa74
SHA11be2d311bbb06ccd61ed1c58aa18adfc7a61a1c7
SHA256f453097b9fbbae95f533e63f912165b7071b2a3e365a715582e3f6e622947e66
SHA512ec9c520cacefa06d672d295966409b750470b8a30d960c1ef25f14368a3c7c5a0f57347651f44bbcfecad259896cd878bcf234116cfc208b84de7269b3fd82da
-
Filesize
40KB
MD543fc4929871d14a18f2b3cff223b3aa9
SHA13a88de51da5bc9396042b14f39ecf192ee961251
SHA2568a92655b90065f6e17165c09de1e045dcedcf05f335aa25e1d3d7acd057f9e47
SHA512c7b6daeb476805e03f07cf24bb113d74601628afd3831fec3c8f5a8a02b0a5784a864576240f6d7674e7ba4ecf525132bf88c9044133bff244e1662dd1332a35