Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe
-
Size
551KB
-
MD5
43f405e410aa0f572c5eb728ab307f7c
-
SHA1
6c1b056b155a56bc5096c60df1dd758eedde8363
-
SHA256
593d1b4fdbe3976c3c4803a60009f872a25e630318a79fa4ee14c48b7f872734
-
SHA512
086db99ec6e2ea91e4986d37d8ff1ef4f9cb49a0acfae84eb4006eea8dfd1b04a8c9db0433afe9bb711b7fc222201022ebfc83956d508bd930348c0c76a561aa
-
SSDEEP
12288:h1OgLdaO+Wctn+MEfOUgbJuMmFcouJqkF:h1OYdaO+tMOUgJHJJqkF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 1116 regsvr32.exe 1116 regsvr32.exe -
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\falddnaepocjlkhddgjgjibfmicidhop\5.10\manifest.json regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\ = "SaveNsohare e" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\NoExplorer = "1" regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5} regsvr32.exe -
Modifies registry class 63 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\ProgID\ = "saVVensharue.5.10" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\ = "SaveNsohare e" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\SaveNsohare e\\jo6aCpQhK.tlb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue\CurVer\ = "saVVensharue.5.10" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\Programmable regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue.5.10\CLSID\ = "{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\VersionIndependentProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\InprocServer32\ = "C:\\ProgramData\\SaveNsohare e\\jo6aCpQhK.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue.5.10\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue\ = "SaveNsohare e" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue.5.10 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue\CLSID\ = "{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\saVVensharue.saVVensharue.5.10\ = "SaveNsohare e" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C9A89C2-9794-FDCE-E12F-7782D8236CD5}\VersionIndependentProgID\ = "saVVensharue" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\SaveNsohare e" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3620 wrote to memory of 1116 3620 43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe 84 PID 3620 wrote to memory of 1116 3620 43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe 84 PID 3620 wrote to memory of 1116 3620 43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43f405e410aa0f572c5eb728ab307f7c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /n /s /i:"" vABtozbFE.dll2⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:1116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zSBC89.tmp\[email protected]\bootstrap.js
Filesize2KB
MD5bcec35cb78ecd7db21ed800f4bdd4775
SHA1b37844ada16ed1e9a49e0094786cedb07f620dca
SHA256160e652c1207e257c52069b578644f35438f13ef5dfa6a3e59299ba9e93bb999
SHA5126fe1931849dba3f3fd88b57655fa0d672efeb0069177e4e3e813903adcc9c81aa9937ebd08396541e0962cd2003e1580eb906bc75c23481a5c5adc1c98403189
-
C:\Users\Admin\AppData\Local\Temp\7zSBC89.tmp\[email protected]\chrome.manifest
Filesize112B
MD5bdc52159b08a6e2771f66f2b1645073c
SHA11f44fe7c2954ab357e66a21292e25f70cbd960b1
SHA2568adff82e3cbbcbb107aac1501ebbeb3c08d9cd2a16f88ffd6e255e8741ddc58a
SHA5129013a4268362eeb2a8a7f2676ae940b47911869ecc779e7fbb506d674414b0e9475589d302588a758ff3077e0de01b5a728a112e2c4d7bf8152c5f8f4aeb882f
-
C:\Users\Admin\AppData\Local\Temp\7zSBC89.tmp\[email protected]\content\bg.js
Filesize9KB
MD5bbcd3ce9f51ca445204dda068ffbfd1d
SHA181176e173308f4d85899890dad04049910753410
SHA25685d8e010ae483b997c346fd49085a680e77dba5dc4a304c244702daf830fdbff
SHA51263af7e7ae265fccf0aaffdda4a605a52fa433c27f6beb0108211d1577655fc0930545e6c5038ba4e944260b1731516a1a0be2c03623da08361857de65fa0dfc5
-
C:\Users\Admin\AppData\Local\Temp\7zSBC89.tmp\[email protected]\install.rdf
Filesize608B
MD560d44dd1ae82449f6a2850b871ca6d9f
SHA127a7b3a03b4b0767dfe25f979504396d235f425a
SHA2568adda67e2357fbcec518f897ecad6c571fe84b0a5b435bd7b8e2f872d32d56d5
SHA5129a302177c243141875e9df2d56a7bce11fbdc343efe508d1e4f57173c5bb9e029bd3e498b4316cc5a0b64d335cfcc30c5207f6635b4783729648642d89b9777e
-
C:\Users\Admin\AppData\Local\Temp\7zSBC89.tmp\Preferences.C__Users_Admin_AppData_Local_Google_Chrome_User Data_Default_Preferences
Filesize7KB
MD574cd48e981e45e692192949f8bec1944
SHA16d2dd9a845e4b9d36cd9e49384ded4b60f3bb1c3
SHA2561c1c0bc783045c410be3ddd32e159808204d686cd36295cb6d2014829eb7aee6
SHA5120230ebe458a183f0325ca1a958341045b503e25c6d441ad151f987a851cea609780e6d574efc725552814fbf3806aaf457a631836d3ab6554cee8a53a5452157
-
Filesize
5KB
MD5a081a9af2495aab9515c1c2628c19863
SHA15a27b013ac67897f91d018e71714c9d0a3f37ebe
SHA256db7f4a08d71582de652c76a8d34c91a1c28c504ac84c08e93283d61f4e98178f
SHA512b91a70a18d5ea38cb74b9f3e5f1356fa5c94cfb449c1d737f0629541e6d95a2720c45d343a6fde3f96181a4b95712be11905284b2bc44fc2c40ee87db0858e1d
-
Filesize
147B
MD505e90d8b9214f40ec08631687017dcff
SHA117167ad4734d6c9d25b85c01780bc45fc9110e18
SHA256ddce03f595ddf8c89e7ff8599a0ef9c6fb45402e486887170fa23a47221102a3
SHA5128186a96b09e6d9dcbf2b66ae52ccf18f6aaf4b37fd550bad2fabc32819f813e1459db23232b487751ab8a3712c7095ca93bde1f1ae621a84e1dee5bbeef367ad
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
506B
MD589f77da89c0addb1fcfc3098fa492cea
SHA116d603efce97ca5a8f6ce2469c255a797788898f
SHA2564b86f9e812c39f5b311042771c47d30f2b28d2815a06c592b9454fd7b1a58c88
SHA512d9d81a5224bc1a5456435c4c70ba8372778e70050810584098f53ddde97c2f9b612130937e9ff42f837211381877a3bd0bbee60a28ed52ad63b2fe1649493764
-
Filesize
1KB
MD54591b1f79c430c9ae41dba454f23ec99
SHA19a58d0d9f56fd24a363581e70948e44c90c1aef2
SHA256c8bef0db7aa850661fd15856c23fbc4ac716aeb9f535c40fe9cfd5d0b0ecfa25
SHA5128a67f04e0b74731b32442fdced3a5b38e6affb3003f098cbe316cdee71b90b8ecde0d986021d64ddf2f9609fac9b6869903a45a4c54f3a8aa1c7cfee6e6fb2e7
-
Filesize
180KB
MD50e093772550eb9541dd715c016b5584a
SHA120338dc859a5652f5661280dc508f4e5b533e76d
SHA256028999304f35f7a6fc2cf6e360d4ea587612d63ce191fa979cc98ccca46ab149
SHA5120030b395e2fde6bc9f70f52e71d8e87d306cff8afd2acbad725c4cc92b6d7916a38c1d6d156feaec841966492d32394982ef51989e2b8673d7c00e103f744dd5
-
Filesize
2KB
MD548e9706fe9f76731f3576122fc3e9e33
SHA1387c8c4898ead8ace488a7df80fead429eaf167b
SHA2567bad79916803a14ca817e5c39f5ec2f0f240044d6dc24fb4916c8fda338060f1
SHA512e9b44a2b1b7a806066182a084ec9df81916fc6db79710256e173377e7cd64a732c006830bbe324a9a734731ecde8b8251cfa995399f6d4df5322faff99c458b6
-
Filesize
7KB
MD5e6c980388b2e61ee1230f4719dbb9f2e
SHA126a0a082e85255918f10702ba20dfc33ebcf9594
SHA2564e5e9f48a79aa9d50cbfa6b950251e17fe9f55468275b3a7609580f298bc55da
SHA5126eae3a05f014ddfda3ac928aa28bfe8b3c5614ee199d0b0a1967d87b32d8ecf05af09895af4b80030900d91c81f64705e3f50a02f040ae6d850c4bd1cebe0aaf
-
Filesize
203KB
MD541b13b132cb601ecc466654b90296353
SHA1245258ddccb48826f22d57444f49fa30be1b36fd
SHA2567fa4bb68c313e1090587a64b90e87bdcbc14ea3fb7c0e8cff94c657c969b70bf
SHA5120e8de7bbe3695848e299fe3f3506f2e982a60cf0a0dd11cde86de4af67ef3c7b46458680d7bad9cedaa266ea33cb2e77f2aa83fcf1bdd20bf31d1936f2bd69a6