Overview
overview
7Static
static
766f5fe2ff4...18.exe
windows7-x64
766f5fe2ff4...18.exe
windows10-2004-x64
7$PLUGINSDIR/IS.dll
windows7-x64
3$PLUGINSDIR/IS.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDIR/NET.dll
windows7-x64
3$PLUGINSDIR/NET.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI....0.exe
windows7-x64
7$PLUGINSDI....0.exe
windows10-2004-x64
7$APPDATA/U...e3.dll
windows7-x64
5$APPDATA/U...e3.dll
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Time.dll
windows7-x64
3$PLUGINSDIR/Time.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ef.dll
windows7-x64
3$PLUGINSDI...ef.dll
windows10-2004-x64
3$PLUGINSDIR/mt.dll
windows7-x64
3$PLUGINSDIR/mt.dll
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/10/2024, 14:11
Behavioral task
behavioral1
Sample
66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/IS.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/IS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NET.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NET.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/ividi_1.8.23.0.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/ividi_1.8.23.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$APPDATA/Unitech LLC/sqlite3.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$APPDATA/Unitech LLC/sqlite3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/Time.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/Time.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/mt.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/mt.dll
Resource
win10v2004-20241007-en
General
-
Target
66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
66f5fe2ff41e6be5a0174e3e13fece7e
-
SHA1
93598b0221984cc1a203d8ac6c8b335da827f837
-
SHA256
8c436076143b5d5a49ed25419f05c071654b0f0aa1a9f8c1b2db723964e45bf8
-
SHA512
b06ad2c34074248a4307a12e6fd813891fc689f1403913bed26a04360eaf5839fd795185da5d588844cd1f1f6389a0db6aefe4ef5bf2188b2ad2f2d3fc7a581e
-
SSDEEP
98304:11k8VO82XHJjC+56Natnm6k7g4QTgDvasops1bc:72XHJj7FtP4/DvRNc
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000700000001878c-25.dat acprotect behavioral1/files/0x00050000000194d0-81.dat acprotect behavioral1/files/0x000500000001a44b-3999.dat acprotect -
Executes dropped EXE 4 IoCs
pid Process 2540 ividi_1.8.23.0.exe 2484 ividi4ie.exe 2956 ividi4ffx.exe 2684 ividisrv.exe -
Loads dropped DLL 64 IoCs
pid Process 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 1804 RunDll32.exe 1804 RunDll32.exe 2880 RunDll32.exe 2880 RunDll32.exe 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\default\extensions\kpdhgpkkloealnjnmepfhanpcleldbef\1.0_0\manifest.json ividi4ie.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8B8B2E80-1444-451D-AC8E-EB9A847F3887}\ = "ividi Helper Object" ividi4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8B8B2E80-1444-451D-AC8E-EB9A847F3887}\NoExplorer = "1" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{8B8B2E80-1444-451D-AC8E-EB9A847F3887} ividi4ie.exe -
resource yara_rule behavioral1/memory/868-27-0x00000000743F0000-0x00000000743FA000-memory.dmp upx behavioral1/files/0x000700000001878c-25.dat upx behavioral1/memory/2540-83-0x00000000029A0000-0x0000000002A3E000-memory.dmp upx behavioral1/files/0x00050000000194d0-81.dat upx behavioral1/memory/2540-3264-0x0000000002CA0000-0x0000000002D3E000-memory.dmp upx behavioral1/memory/868-3270-0x00000000743F0000-0x00000000743FA000-memory.dmp upx behavioral1/memory/2540-3275-0x00000000033C0000-0x000000000345E000-memory.dmp upx behavioral1/memory/2540-3297-0x0000000002CA0000-0x0000000002D3E000-memory.dmp upx behavioral1/files/0x000500000001a44b-3999.dat upx behavioral1/memory/2540-11191-0x0000000002CA0000-0x0000000002D3E000-memory.dmp upx behavioral1/memory/2540-11192-0x0000000002CA0000-0x0000000002D3E000-memory.dmp upx behavioral1/memory/2540-11193-0x0000000002CA0000-0x0000000002D3E000-memory.dmp upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividiEng.dll ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\bh\ividi.dll ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividiApp.dll ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividisrv.exe ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividi.crx ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\uninstall.exe ividi4ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividi_1.8.23.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividi4ie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividi4ffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividisrv.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral1/files/0x0009000000018669-38.dat nsis_installer_1 behavioral1/files/0x0009000000018669-38.dat nsis_installer_2 behavioral1/files/0x000500000001a4e6-3998.dat nsis_installer_1 behavioral1/files/0x000500000001a4e6-3998.dat nsis_installer_2 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{56BD67AB-67CE-4FA1-8503-334F31E85DE6}\FaviconURL = "http://search.ividi.org/favicon.ico" ividi_1.8.23.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{56BD67AB-67CE-4FA1-8503-334F31E85DE6}\DisplayName = "Search" ividi_1.8.23.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{56BD67AB-67CE-4FA1-8503-334F31E85DE6}\URL = "http://search.ividi.org/?q={searchTerms}&src=tbsp&id=160e802a000000000000c28adb222bba&affilt=3&r=354" ividi_1.8.23.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{56BD67AB-67CE-4FA1-8503-334F31E85DE6}\Codepage = "65001" ividi_1.8.23.0.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{56BD67AB-67CE-4FA1-8503-334F31E85DE6} ividi_1.8.23.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\User Preferences\6256FFB019F8FDFBD36745B06F4540E9AEAF222A25 = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a2b7537641a7654979d7020049a5abfc6e35aaca6b19d1516beffe8bebce7582000000000e80000000020000200000005521647f1a677769b1d62ae95a10b63e4fceca221f126f827a7b2f213ffaebf0100000006fe062f948c63c51b17c2c99c240ed1940000000775a7cce1b2f48a4b804b5e938ec5abdbe32ac52f28b94d15bab410e8e27eaee65b39c3a499346a29794bfb401b2ced4384f63a811e9aac7fd0916255e3582c2 ividi_1.8.23.0.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\User Preferences\88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977 = 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 ividi_1.8.23.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\AboutURLs\Tabs = "http://search.ividi.org/?q={searchTerms}&src=tbnt&id=160e802a000000000000c28adb222bba&affilt=3" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8} ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8}\AppName = "ividisrv.exe" ividi4ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{56BD67AB-67CE-4FA1-8503-334F31E85DE6}\OSDFileURL = "file:///C:/Users/Admin/AppData/Local/Temp/Unitech%20LLC/ividi/1.8.23.0/ividi.xml" ividi_1.8.23.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\{56BD67AB-67CE-4FA1-8503-334F31E85DE6}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{56BD67AB-67CE-4FA1-8503-334F31E85DE6}.ico" ividi_1.8.23.0.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes ividi_1.8.23.0.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing ividi_1.8.23.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\AboutUrls ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8}\AppPath = "C:\\Program Files (x86)\\Unitech LLC\\ividi\\1.8.23.0" ividi4ie.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\User Preferences ividi_1.8.23.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{56BD67AB-67CE-4FA1-8503-334F31E85DE6}" ividi_1.8.23.0.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\SOFTWARE\Microsoft\Internet Explorer\Main ividi_1.8.23.0.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPageShow = "1" ividi_1.8.23.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8}\Policy = "3" ividi4ie.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://search.ividi.org/?src=tbhp&id=160e802a000000000000c28adb222bba&affilt=3" ividi_1.8.23.0.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9F5978E2-5D6D-4B23-96FF-A4BBD97F0133}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{186F4C6F-EE6F-46EF-A1A0-7F1BC88EF224}\ = "IIEWndFct" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{186F4C6F-EE6F-46EF-A1A0-7F1BC88EF224}\TypeLib ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FDD7D35E-DEE4-43B2-BADA-1901182B367B}\ = "IxpEmphszr" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\excTlbr = "true" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B1399F80-21CB-4EE9-9C64-A00018863C96}\VersionIndependentProgID\ = "esrv.ividiESrvc" ividisrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane\CurVer\ = "escort.escortIEPane.1" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ividi.ividiappCore.1\CLSID\ = "{211B330A-499B-415E-B1F1-B7132A8751D2}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947} ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\vrsni = "1.8.23.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FDD7D35E-DEE4-43B2-BADA-1901182B367B}\TypeLib\ = "{AA587238-8C5A-4876-A59C-FF55412CB518}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8E485B5E-A3BD-44F2-89D6-8E0FE65E4D4B}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F92D72B2-8B85-403D-B849-0D8943695829}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\postUninstall ividi4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\trace = "0" ividi_1.8.23.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8B8B2E80-1444-451D-AC8E-EB9A847F3887} ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{905E34C2-F4EB-49BE-A36B-47692CF957A8}\1.0\FLAGS ividisrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{211B330A-499B-415E-B1F1-B7132A8751D2}\InprocServer32 ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FAA44E54-BF05-48AE-A0D5-3D18BEF3D272} ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8E485B5E-A3BD-44F2-89D6-8E0FE65E4D4B}\TypeLib\ = "{AA587238-8C5A-4876-A59C-FF55412CB518}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F92D72B2-8B85-403D-B849-0D8943695829}\ = "IescrtSrvc" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.ividiESrvc\ = "escrtSrvc Object" ividisrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{905E34C2-F4EB-49BE-A36B-47692CF957A8}\1.0\0\win32\ = "C:\\Program Files (x86)\\Unitech LLC\\ividi\\1.8.23.0\\ividisrv.exe" ividisrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CC8903CC-2769-42BE-8F7E-52B5B742D3EE} ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\FLAGS\ = "0" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AA587238-8C5A-4876-A59C-FF55412CB518}\1.0\FLAGS ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E967BBC-8053-4135-B6A9-A5B8DFF3C0EC}\ProxyStubClsid32 ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8F5539BC-A423-4DE2-BB0B-6A3111E9064B}\ = "IEHostWnd" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C930413F-8F9D-47F8-B7F6-53F45EDC3F76} ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\escort.DLL ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C541A8F9-E098-4EAC-BDC6-D3FF5CAABFB4}\InprocServer32\ThreadingModel = "apartment" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ividi.ividiappCore.1 ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F92D72B2-8B85-403D-B849-0D8943695829}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\uninstaller = "C:\\Program Files (x86)\\Unitech LLC\\ividi\\1.8.23.0\\uninstall.exe" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FAA44E54-BF05-48AE-A0D5-3D18BEF3D272}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8F5539BC-A423-4DE2-BB0B-6A3111E9064B}\ = "IEHostWnd" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D198823B-F44A-4EBD-B18C-961622C0113D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D198823B-F44A-4EBD-B18C-961622C0113D}\TypeLib ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{676CA8F5-30D8-4292-8A1C-B5CBDE8C1B3B}\ = "IwebAtrbts" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A} ividi_1.8.23.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C541A8F9-E098-4EAC-BDC6-D3FF5CAABFB4}\VersionIndependentProgID\ = "escort.escortIEPane" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E967BBC-8053-4135-B6A9-A5B8DFF3C0EC}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\smplGrp = "none" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\rvrt = "false" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D198823B-F44A-4EBD-B18C-961622C0113D}\ = "IXmlCnfg" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F92D72B2-8B85-403D-B849-0D8943695829}\TypeLib ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.ividiESrvc.1 ividisrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FAA44E54-BF05-48AE-A0D5-3D18BEF3D272}\TypeLib\ = "{AA587238-8C5A-4876-A59C-FF55412CB518}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C9EBB4CB-D1A6-47A2-9375-7E2936360D2A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\ffxInstl = "all" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{FAA44E54-BF05-48AE-A0D5-3D18BEF3D272}\ = "IXtrnlBsc" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C930413F-8F9D-47F8-B7F6-53F45EDC3F76}\TypeLib\ = "{AA587238-8C5A-4876-A59C-FF55412CB518}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8E485B5E-A3BD-44F2-89D6-8E0FE65E4D4B} ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E967BBC-8053-4135-B6A9-A5B8DFF3C0EC} ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9EBB4CB-D1A6-47A2-9375-7E2936360D2A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CC8903CC-2769-42BE-8F7E-52B5B742D3EE}\ = "IRegmapDisp" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{186F4C6F-EE6F-46EF-A1A0-7F1BC88EF224}\TypeLib ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C9EBB4CB-D1A6-47A2-9375-7E2936360D2A}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F92D72B2-8B85-403D-B849-0D8943695829}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B1399F80-21CB-4EE9-9C64-A00018863C96}\LocalServer32\ThreadingModel = "apartment" ividisrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AA587238-8C5A-4876-A59C-FF55412CB518}\1.0 ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{CC8903CC-2769-42BE-8F7E-52B5B742D3EE} ividi4ie.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1804 RunDll32.exe 1804 RunDll32.exe 2880 RunDll32.exe 2880 RunDll32.exe 1804 RunDll32.exe 1804 RunDll32.exe 2880 RunDll32.exe 2880 RunDll32.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 1804 RunDll32.exe 1804 RunDll32.exe 2880 RunDll32.exe 2880 RunDll32.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 1804 RunDll32.exe 1804 RunDll32.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2880 RunDll32.exe 2880 RunDll32.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 2540 ividi_1.8.23.0.exe 1804 RunDll32.exe 1804 RunDll32.exe 2880 RunDll32.exe 2880 RunDll32.exe 1804 RunDll32.exe 1804 RunDll32.exe 2880 RunDll32.exe 2880 RunDll32.exe 1804 RunDll32.exe 1804 RunDll32.exe 2880 RunDll32.exe 2880 RunDll32.exe 1804 RunDll32.exe 1804 RunDll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 ividi_1.8.23.0.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 868 wrote to memory of 1804 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 31 PID 868 wrote to memory of 1804 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 31 PID 868 wrote to memory of 1804 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 31 PID 868 wrote to memory of 1804 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 31 PID 868 wrote to memory of 1804 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 31 PID 868 wrote to memory of 1804 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 31 PID 868 wrote to memory of 1804 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 31 PID 868 wrote to memory of 2880 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 32 PID 868 wrote to memory of 2880 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 32 PID 868 wrote to memory of 2880 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 32 PID 868 wrote to memory of 2880 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 32 PID 868 wrote to memory of 2880 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 32 PID 868 wrote to memory of 2880 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 32 PID 868 wrote to memory of 2880 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 32 PID 868 wrote to memory of 2540 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 34 PID 868 wrote to memory of 2540 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 34 PID 868 wrote to memory of 2540 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 34 PID 868 wrote to memory of 2540 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 34 PID 868 wrote to memory of 2540 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 34 PID 868 wrote to memory of 2540 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 34 PID 868 wrote to memory of 2540 868 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 34 PID 2540 wrote to memory of 2484 2540 ividi_1.8.23.0.exe 35 PID 2540 wrote to memory of 2484 2540 ividi_1.8.23.0.exe 35 PID 2540 wrote to memory of 2484 2540 ividi_1.8.23.0.exe 35 PID 2540 wrote to memory of 2484 2540 ividi_1.8.23.0.exe 35 PID 2540 wrote to memory of 2484 2540 ividi_1.8.23.0.exe 35 PID 2540 wrote to memory of 2484 2540 ividi_1.8.23.0.exe 35 PID 2540 wrote to memory of 2484 2540 ividi_1.8.23.0.exe 35 PID 2540 wrote to memory of 2956 2540 ividi_1.8.23.0.exe 36 PID 2540 wrote to memory of 2956 2540 ividi_1.8.23.0.exe 36 PID 2540 wrote to memory of 2956 2540 ividi_1.8.23.0.exe 36 PID 2540 wrote to memory of 2956 2540 ividi_1.8.23.0.exe 36 PID 2540 wrote to memory of 2956 2540 ividi_1.8.23.0.exe 36 PID 2540 wrote to memory of 2956 2540 ividi_1.8.23.0.exe 36 PID 2540 wrote to memory of 2956 2540 ividi_1.8.23.0.exe 36 PID 2484 wrote to memory of 2684 2484 ividi4ie.exe 37 PID 2484 wrote to memory of 2684 2484 ividi4ie.exe 37 PID 2484 wrote to memory of 2684 2484 ividi4ie.exe 37 PID 2484 wrote to memory of 2684 2484 ividi4ie.exe 37 PID 2484 wrote to memory of 2684 2484 ividi4ie.exe 37 PID 2484 wrote to memory of 2684 2484 ividi4ie.exe 37 PID 2484 wrote to memory of 2684 2484 ividi4ie.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe "C:\Users\Admin\AppData\Local\Temp\nseE0CF.tmp\OCSetupHlp.dll",_OCPID974OpenCandy2@16 868,CF58CD2452A740ADA26AF903D6F0F624,E8817F5F755E4ECC9C128BAD4872516C,0D4C99A5826A4D5898A46E16BB0FD4E62⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe "C:\Users\Admin\AppData\Local\Temp\nseE0CF.tmp\OCSetupHlp.dll",_OCPID974OpenCandy2@16 868,E0F530973D664C38A00A7293660F69FA,F94B0BAC6587449E8FFC3891AA5E1329,0D4C99A5826A4D5898A46E16BB0FD4E62⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\nseE0CF.tmp\ividi_1.8.23.0.exeC:\Users\Admin\AppData\Local\Temp\nseE0CF.tmp\ividi_1.8.23.0.exe /uninstallAll /aflt=3 /excTlbr /mhp /mnt /mds2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ie.exe"C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ie.exe" /uninstallAll /aflt=3 /excTlbr /mhp /mnt /mds3⤵
- Executes dropped EXE
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividisrv.exe"C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividisrv.exe" /RegServer4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ffx.exe"C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ffx.exe" /uninstallAll /aflt=3 /excTlbr /mhp /mnt /mds3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD5351707305245428eae73bc1add4e1e43
SHA1a7c2eaa393ff9a96bf040a9f942b5a26807253f7
SHA256c61eb0ab6df8f89573a9caa6876743f1fb7dde313f322df5ee8bb0e2fe07b00a
SHA51200d766f16eeec9e6171dce6966a0729c43e0e14ab5f405672e1eddc764485aae12fb2d47ee842743df6d70728f703c65def81ba8cbb3cbcf3244ee1d63e4db63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{56BD67AB-67CE-4FA1-8503-334F31E85DE6}.ico
Filesize1KB
MD5cc293971feb692e18edd790fcd6ff10e
SHA109a2c236508962ed8d13736033bd2479f13dbf32
SHA256a863b816dbda3deda70419bb471f11f0f0e0ca20ebec82a0c00d5c304690b3c5
SHA512e245e2bf17e143fc4cd24224bcaa68ec7a9548ae8f8c295caf0cd49e366f22985a123d7e2da995864a9d233b9510df3eddaa5dbf0f65eb81468ed74bb0b2070e
-
Filesize
590B
MD59bf9eac5bf80607c7dce40b49a7aef45
SHA1f15607a35e387fddb86f03696c9f172badadee4b
SHA256a9705c8c84f7f60ac9da0573532b679ebaca459213c79163ef7f02d2a97c90ef
SHA5127504cad6ce30c64cb18cecc8f5414d157689374df44bdce0efa8d4c5830c0760b0239f691fdf6f5b77b2feca104e07475155cd7243ba7b57a2795c32263d66d1
-
Filesize
1KB
MD517f3c44732eb03e3788b7419c4677339
SHA1374fccf13c655a7d3afdff3408f17a5335313615
SHA256eac1828eadb72980cfcc3e6e05997f8ce5798b35ffbc2f748202e87c985da63c
SHA512b2cfd719633d3088a36657cf0f7da343020d5d9d620ef3f6afefd8ecc144244bb0b1ec0de8dc7724b427616a02ddee77e11ff1e22d98db6eebbea6140a420988
-
Filesize
1KB
MD5538893b29a2f88b2c3873b546caec599
SHA1d2a569011a51ebdcc7dbc86da9592f694e50fe0b
SHA25659c5dae2f5e89bbbfc2c50680fd0a8c841652c5a8983a00085f995e86c189372
SHA5127dfdd6120a58f52f7c0472a23d2244a70281807d533db4a59f828b780e266922fb81059eb208d8c661c03324befcf8168a80af0232ebe826cd1eba6d29123144
-
Filesize
1KB
MD5868bfd60ad1a38a95422169d5410ddf3
SHA13656de25d2632e4cf4df47d8fec516d7a7b2b818
SHA256c3f7b68811ecb146e65d1a725796a179a4d8b532f83ae23e14745f746c527207
SHA512f6ea3d3fce225d16d4319aaab0ff2aa08e7accb7ce183675f33408fb6fe6c7c6f6a3e49df2f66e1b606084d0cafbc623fe153f3b757552243ea75dc673551412
-
Filesize
1KB
MD5b01927abeb9a6e72d978e8b783a91eb1
SHA17f1ffcedd2b6fcb6caa9e8ca6e9882682f661e70
SHA256d2b6584e8d307facdca42321dfb7ef7c73c35e4b3b67a4b3901d3a0dc30f64d5
SHA512f594e8b3d88155bfcd1292b07ec328fc83a5c25ca8a7aac90f7abbd0b6c7a0668350a8423af7c75297b8daaf270a28752791b88068954ea41bf2563ff6ef91d6
-
Filesize
1KB
MD53256f72deea26deec3c63781578b9052
SHA188b3b3c208aa86ba372051c6af0b44515d868d0f
SHA256be07b39485362bcf544ab967b1f6d07ca7bfef6b65b901f00a0dc59e7d2efb20
SHA512c7bf283715fb9b4aa96f3e607c33b9bd79f7dbe5b8ad424217be13f3fac11bac892a1ddc3d7ef8676e6ab081c0cfe9e6ff66dc1ae0b7e7bfa4b45958953b888d
-
Filesize
1KB
MD57c2152200d15bdbc43f99b299f38ee08
SHA1b095c12e994e4df49182f52479d187987c492f60
SHA25625733f23a135183727135103600d11a638fc2b24d2250081ac6e903942dc6731
SHA512cb233ce0f025873c9001dc762556545f9203c6286281dfc3fc4cb5fc78203a33ef1577c76a6fbc852b7e8af5dbcdc6b2eb184036ccfe6ae51b02dc28a6049b7c
-
Filesize
958B
MD5c47a19c451f807be94b3f8332649cde5
SHA12242613ef6bc7e81bed0608d514d4a6e827f3f81
SHA256579140a0b3edd9d3b472604f5219e38b527bcf99fb67dce34346d504717d3f9e
SHA512b2558b51db6656b3e56eb6f5f7312b149dedf2cab446d31d0373dcf989683bffa2f2dfac8045990d550c61d8c77e80d1a9620a34f883fdaecfd8534eb13c30de
-
Filesize
1KB
MD5c0ebdec7a2f29b84b68d3d29680b8e54
SHA1924c365229245fc619b274ffc3d9778868f80830
SHA2564af97634888c8f15fe57e8daa377984e87c824caf1bcbc5274649368a903f8fb
SHA51215e904f5e2a16ff7b5093a05d52c94c4c01233585c5c46ba5e209e4461745cde9a9d82d9d77eda6412aeb4eb2173b2b16439859c045fcd709c66366e2bb04c12
-
Filesize
339B
MD564ceb0aa15fa087a0791b4d5cac562da
SHA10db2e4daa1426867478530618e3a8722b9ee4e47
SHA256ba6b3dd1db022492d908812ce1d412b2268cced0fcd65191ba45b178fea38f2f
SHA512c9372d8f75d2f41ca6c57e36212d7dc038ab8f7e26d52cc9730bfb492d23a8dc678c5bccd6ca2ab0fc8afee83dacd0835e14e5824aa835c612da9aeb7b087afa
-
Filesize
124B
MD572d5eefc82e08cfd02536d8902306322
SHA1d00d7b7dc9d0399ff56bc857369d0ac08387b0f5
SHA256c67396838537609b8b25d3fe216636febe9464156c4dfd707792dd12b8f5f5ef
SHA512f2ec2fb015374ab763d24fab12f6fd7aacaba61313a625394a065c3f98532c656a7f10f8a075fe470f36de8519b9ca22ee1c452c5b70d249728d3cd97acc0ebf
-
Filesize
169B
MD591cfc52b891c0fc676a0701173406c45
SHA1ae18075de1f598528d8b38714566563c0bea6322
SHA256a1c2b1d9441eb3fb28d8d78d7407a66321aa902732c6a62cacce6d552f6f6c61
SHA51226510c811d864ee138e843ac3b5800af1abc7a8d8bf5acbf7aa1752a5f68b249cbb5397d433729ee1fe20920a481023f87aaff5add50b11083d74ff13f10243a
-
Filesize
214B
MD53c9c68284c4b483c5030363e5786622e
SHA150a499a831ae2cc1e51845bee899bf9effb8027f
SHA25602c6d63991cd97f0daebbda722b536d1879da78e163b2162528ae2ca0800b3b8
SHA512faf3c7413246efc2eee3c56f672b5aa351983e56a98aed786d69560df2abe7f5ce4cfad4add7b5dab026d69b03fecc79728da3a6089ca0048e36367732e54e27
-
Filesize
1KB
MD5eafae0664b9b17365fe6af0ab388ceaf
SHA10d931b4b41367539ad347962c538839278246e44
SHA256dd799b42f15c95e21ce33892119cb98a8e2b7626f8ebb45cabdcf574ad23656e
SHA512b7d52032a8ceaae7aca4f9f14056a7e6c801539abee381190eb198797a1584c0afc0971a3422945ac7fcc5cdb569cb119b7004b53a153e3803228117ae28bdee
-
Filesize
1KB
MD589a88b6a6ed6e0673faba6bbea0b2f92
SHA18d0b8555b6f340d7ac169336c4d2053f8a7ba29d
SHA25620219f34b80747f161c86441f23790b018b1d380b506acac8c8cc044dfcddbda
SHA5129c634e60fef1dfcfe69934987345bb9e559b54db340913c0fcb9fcc0efca490eeaf31cca51c0eb5b5569c0c6af795288a6d37c99c150413e68afdafeffe85bb7
-
Filesize
1KB
MD5dc0ca0c7758a9d0f38a1400d5523dd95
SHA1b0169ecbfbb0a7ebcdeb3a0a11a940673f5951c3
SHA256ef445c7042a7b71f852cb790ac466454b428d8df7ded832d76e3a89f21d6be83
SHA51255e7a5db113c8a8c8a66f208256a48c71c329b6fcdf0b3ecf4995e2379587b0f5122af0d4b658aa33c8f3e465d8efc33df1058872801305be8e0de6e2e9f8e16
-
Filesize
1KB
MD59a5ef5d49e5aaa6202902e167dc2b7a7
SHA19e4dd6d7d6c9612683b0cf132162bc3ff2a2d051
SHA256cfcd80288ab186c415366e70a8129482f441a18545537f58f9d741d5301c7419
SHA512fe45525bea220ead2b8210c8c0bc00398ddae9c52e4eff1f83d08571c5201c9d66aeb9dd73f389ace147e48c5eff1340f666566f2eff78370b5eb4988ee0c600
-
Filesize
1KB
MD5d920b5ccefd38505b8d64b439e80f6c5
SHA1c5e5ef667a117346639f792c7044d594aeffd2b6
SHA256a3f17ca57bcfa202ae0517964414f65e2041ce8ce219f45f39c066bb4cab7279
SHA5124eef657727b8b7ffda30c634510c498d711d7e99c308e9222b6ddf9c490be97e0ce90f078761caa60344212fa1a4a09ae538710a510db39fecb36a42a307ed07
-
Filesize
1KB
MD57e35fec4807358a3d330d7dbc4b85dd8
SHA138be81834bb9275e57d5eebf6c0a08035da471a5
SHA2567cc587c76c33443ae26a60d513509a188a38188c188dfb95e0925ad4cdcdf5aa
SHA51273c32e6291bc3530069f5729982e0c7407cf81257e2741fc8acd4d7cbb508a1fb1168bd299d7199d65568fb75b3d26f8cccea53cffc8209c2820e67939a8f72c
-
Filesize
887B
MD52abab6361271d4bf1bfab1bc9400cd2e
SHA12b4a010f57cb18192214721df02ba0738505f295
SHA256d3eb7aa2c3111bd56ad43f911c9d166caeae782644676badd21783c349781706
SHA512d126b4ac96488411ae061e14db659a0cbd40b7ec0102afb1a057d8b248a06d14b8d1b9933a2778d6d586168e7fc5a5f8b772ccd235fe0e2413ad2fa673fe1902
-
Filesize
1KB
MD5d5fd702524bf7135167765b0817c2d22
SHA1e07baa1f91cbc1a13cdccf0a8be3ee75e47cf4c9
SHA2564893a0848173a72a4a9b498da062ee6fd0ac03a98bd532c173e2418a1e22bf1e
SHA512eddc1c71c4d1dc3bc6c14bb2faf5142d2bfe9ee5aa9229e0191ed30646dbefd518b7d1031b9cba1ccbfbfa28dfad8f09ce35b664504809ebfee16b9bac9a1be7
-
Filesize
1KB
MD564c7d08c71eade5ebe2f58b608307b70
SHA101fc42e32270cad29f01a92e9a1b9540053fce32
SHA2567c1b78ee4d85ab4cbcb2852003569aea318aaa790808c9d8dec0bc161a0adf5a
SHA512c853446df9483b058401a543ba9f3b38383ddd42987f18ed2fb42d0957eedcaf0f0eec1226f026d1e851d6b896f9ddd56d53ca2937524df28becbe2a577e6428
-
Filesize
1KB
MD58f39e881de4af18765a7926c0052b07e
SHA1475faf2a1e315fcc2bcfe26dc0dc2ccb1f4bdb34
SHA256d33b49cb9f6fa42376d05e1b59ad3e6df8e9cd1c8fb7ebfdb2c62e898a7b74e0
SHA512e1054e2b5d3089d148b22c27b6042d6baa1136b8902fc359fd4fe1f80150671cfa860fcc78820bde2c848a3da8b2cd50007265630d54dc50fa9c7a7064a7126c
-
Filesize
1KB
MD5bdf8ff5010e7c7bdb86a4ec889e9d765
SHA1c300cd01ad88cb0adeca713296f55ddc6718d39f
SHA25689f4c9ff68e70a3797038246c90e7d9f03bf968b9695cf924f38b1b3db36ed68
SHA512721514c95144f31c9daf14a0fc2864c1280ce14f1f9d1ed8105f410fc869b62989ee0da0426cb56c93f1134896f7c76055c56a8ef5583aaaa310cea2e3697006
-
Filesize
1KB
MD5dbeb9e5902f2ec685c1196a48271efd0
SHA14d77751d9ab73a3964e2d395a2295ef1bf46aee7
SHA25631d111d7a683bd310b44f96c9b3c03d517fabeec2c77cf5656f2408393bc5794
SHA512606e417197f6a55ba33c76a4a446ca4712367396dabc6acb4d8da54036327cf376ebb6871a0b7b0cdc8ce220fb4ae55d96a08af3783c00fd16c869be730f1125
-
Filesize
1KB
MD5d3eebf74f066559780691e028d1892f2
SHA17f31f18fc918ddcb0405c5568bf965dca60f6bc5
SHA2562d893c77aaf12516782ef39ceae696769afbb7c046842a38e0796b0e7d2c30b9
SHA51243e48ac93f2ca72b4c87e860935063c12b42b04589bcc6859e287a781fa3d321e014626bdb122deaf5a39d02b5f01b12a2c53c58b57b2d9c8ff8bf09b235e0c1
-
Filesize
1KB
MD5226e25cdfc1ba8964405821c6d49c50f
SHA1477d985fbc152156d90d52e2aa1954128591d488
SHA256debdaeb9a2d09bfc046e17acd0cdcf8ea0ac526010558ff36f53fe62438e662d
SHA512500393207d4649995b8fc7a513d9b7e9630379b4b93efcb06183d74fc136c762983a4a9aca36e389116a2660e400de3cc1643cc97c5323ce00014263f7acb6dd
-
Filesize
1KB
MD53ff172f358ea0f32edb03961108c126f
SHA1a296b4eb25e5c7cd2d8f20dae552e6aeb8766011
SHA2562b3ed12982072473ef01c1639de1320941920c4bd239bc488ee54cb4bf8ecc67
SHA512f73bc102d26c30329f4a8c454cae67e750584741cc8790388f2fc7be9bb43e63b060c939efcc23aee12c67814f61101f0551d04118ef5dbb742ebc994056bf58
-
Filesize
1KB
MD5eaa24497e4c4800162b25962420c8ee5
SHA134f876bd26621490d9a6a1b4ae9d5deb0c7c0738
SHA256cfbce9901bbf62ac11136b95d3930fcd4b2379bbdc421288b12702789bc1cc0b
SHA5127689dfe226dbed3c77e99ac61542e420295e4cef0469bb5dba03c97378108c0a9dd9531e4034fa24f4d1282c19bd73fe158b3b8130436e8b0159a230679f0b57
-
Filesize
1KB
MD569d7f80a71ff56090a5859a951368f0d
SHA1c30956dcfad72d0811c67dfca9a3f81a540f6be1
SHA256458cb63b60a97d7f133bc64c858b598514d2f4f3621306dc27748ce62e7ddfd6
SHA5123438e4ddeaeaf7e84fe92083b5067b4e1edce1b9593cff4e3155e3145482b7254f33e11af5c0161307591254e30d8749d42e660b5b55d9133a681f0145deb18d
-
Filesize
6KB
MD5f5cf0f8a638fcd8228e9493d27cbed25
SHA147dde7ed80b20c75b0c0c37fa8256cca159c133d
SHA25626d9f343033ac39da30e28d96120f157266803aa66bacf4b8f0f309677a35fdc
SHA51212d987931f0358d55f18350b81df7c3d00f84e973193f046d0a3f721226d594d2e88ed3d1116b213e773d599268686cb2a3d18d5c096fe571abed26b19b74c48
-
Filesize
351B
MD5bd24e09c137b6314ae432c30894d046c
SHA1448daab002e50694acf37d07241433e6eb6f038d
SHA25601a5efa9f0b5524b6c5d7df21e80e9849a6a199e98e2a668ac95202570fca505
SHA51225c0be80c8638fdec692d30bc9823a983d0a40dc1ed375107acc9cb4e35a57e9ea41b1932bec53d70aaf82c50e40204eeae218e3ac40e8a885fb1e6339b321a0
-
Filesize
389B
MD51e46e894e3edbae113af5b18894ae502
SHA1f4d160113aad241764f67b4ea3db3995aaec4a1e
SHA2569cf2b61be912114c9da26dec65a1e6970164d8e21ae981cd2c65ed8907e41781
SHA512f45facc4aab2889b316e01e0a62d6c122497bcb4f9607b14a342c76f2ad5053dae43952e032e5dd307cca72f87a9eef1b203640a88a9d005c2b0740d5a7fbb76
-
Filesize
654B
MD5ee80745b5710c8b4a3d28371f998d11d
SHA1401d2182543b9a11cda6fd0de2ac44c7ffa6b5c7
SHA256dbda07310a8c124cb9c98b3b47e486f41f1080da556f14b1998260b3aae967f1
SHA51281a3b70367bc323ea6a6ba4e988caa2e82c595c622cb4297d34dee63ff6ee7f57baa0c332700cdb1e857fd6b2c23960fafd8e53de0bb39efa31de9b6f9eaf3a9
-
Filesize
528B
MD5b798e65983049f7d8888e0d4626fa47c
SHA19ae7efe5201cb364e51c8487c99bb7d4f16e398b
SHA256353f3731fe1d9432353f307d22834247f07e9f1ead5a0f9ca7f568bd1b660b7d
SHA51274671979714d5a7d1bd14a8712cbf330e510e25b0ce0563299675c017f111f0042f2bde3c6366f4505349d4af046d3c3b305e420709e93949ecbc67966bddffe
-
Filesize
511B
MD595f8b3b648c016474acdd5b01fb4ec35
SHA1931bb414aff8506cec7fd856a118e3284e9dfa99
SHA256a0a0b9dd4ca19d04dac378f98750494826750e325a9c902e446b9fe29cb0d771
SHA5123685be51c2da29c62f01ba1b2af9bb86e673fe5094fbe18b3963f232a6d0c5824e10a584cc8b894952804a8c2284e9e3d6acfdf7db330d52d07ea415a8f95e9d
-
Filesize
778B
MD5fd8498d9480fc5d64129cb5b453b49f3
SHA1efc836399518434f20d1edbbc31e62533d90298c
SHA256ea363aa00cca4c38c2f9fb4e334a2d014a92051e708a16dd5168e9cad88f12a7
SHA51264cf256e5536ecfae6e3fb76af3b5f08e8caaaf06b7fe450af9d7a84d88a5b9ed9a4bad6740d0bceb0ac174cd391b3667316e94b40c89b54f23f6869262a6333
-
Filesize
618B
MD531dcce6abe2c5f73ed103f6b02ace9cc
SHA1d53f8e9c1d8eb3d855054b8a3c1d6a5f4521474e
SHA256f0d6000b064d3c991289d1f5579c0d7a4ccc0aac5894205009ce914d66041bb8
SHA512d53887d8d64a50738d978e8bc2ae2e2da4b5b4c9e97b7dc13361c214134f42ab66cf0b5e5980db1c0041bfa8dc7da5a3e8b81d9c0c7af17ca0676d0305e7fec3
-
Filesize
261B
MD53ee63ddbd8551a9194284ec5c71669dd
SHA1f96b13036ce97f44ef32cf7cedc5534bd9b701a3
SHA25629b7090ef25a239755de0634bdc3ea1031917d2d42b5bb7cb34598b4e892e85e
SHA5121aa46047f29dd002c144aca059bc84c1caddbd6012f2b6fa9821f454186fe9a85a6868c9f3974e5b090eec5391be8cc1530f858385fd3674b44d112698b98ab6
-
Filesize
304B
MD5963c905c55ae7d48cd4fc962ee788e0c
SHA19d6b5bfdf370b247247ca6ed5a8dda5fb1704edf
SHA2563ca23f19d06a3ec3ed32079e7d3fc1dacdc27fab3e2a5030ba8fb8042ddf117b
SHA512085ad3081b561c63c490b41a5ea65068e3ee7fe83efdc82aec952c89b418d22c5f1766530378c2d4c91a9dcb64189995fd761ec260933b31bf3543e5ff9c3d72
-
Filesize
554B
MD5f1d5d5d767a8131da1fc7cf716ff2a15
SHA1aacb16b7e1e242ddd2e7e2047e01579322d545e2
SHA25613c28f22baef964c4351578b5dda9744d6e5e7dbbc69f5443ae092611ddd31b6
SHA512cb041bc87828773ab7ed5cbd17809a12c2eb768e324dc7d1ad27779abf5cde03c045b4f7540da19662672ab57ac2be8fbddacc8888a07255aba380c7c72b3796
-
Filesize
227B
MD5279dd3a12b962532be82049c5cb1248e
SHA16f80001ef64e9529a820a977eb559254fb8cb532
SHA256e07dcb5a645d3895e3c60b1ed799fe186ea19c984456bee42c554b023c5b66c6
SHA512079fde4ebf86a18b7e6c5a4fc6035af27ecbd82e4b151fbfd500b1b729020f99b55233d73bdce69dcd06cc4f3d138abd2b6a2e523afc87200c17b87f72e31320
-
Filesize
404B
MD57e65ff3b656003d505bda743404d383b
SHA1ca67674c37e841a4b6571b255f692961da551fcd
SHA256048501b32e7eab72ba98af634a5c931728c62a94668eb9d6023a9a983b616b02
SHA512fe68f533d1c67f950b81b7deba62287a99d86d2597df2e0a2cdeae46adb245a84176223332305643d2c0ad122c4a1559ebd0e6ebcf3a28833f0275c614e1d074
-
Filesize
300B
MD5d3079578282b28ba03ffdd2b6b4e0e1f
SHA16fe41d64a9132030121a9fe5cf2850b813767857
SHA25631a17eeaf1af357533c4bafed56ffdf89b7a9c3b71b7081c3e3fbc01033b7b8b
SHA5126287fa74ba3add7407ea65c5406e13ef151f778eb0ba1acd76cd32e17da92be5d6ba98c616132730d558026a94241d24036643e2eae35b164e78140869254f50
-
Filesize
601B
MD56a2154e374a248d98139462d92900311
SHA15b5cbc7e21ff2093647d04966de35a429c4d42c9
SHA256d7f8c096c2faa3a85bedc0b8185fd59020c00c1190405e89c22f7e9f1fbd0363
SHA51217eb6f65f55776cd3cd777b1fc03e6e5b8ac4b0095422f486adf40d06ec46655bf94d83bbaa5ef4f56ebac922f6ee30f2e76b86256f21e1d18ef30d52534c486
-
Filesize
573B
MD561edc0f0090cfb13f57678c01f69a68f
SHA1313b0c0a3c422edbd60d89edc073857eb378fc47
SHA256656c7106cb66d66d328756009a59f607a4f8245518720859173b133115466ce6
SHA512da9df1d6afa09cbcc376e3023ce6218b6ae9f746381aeaf52e4624e4d6e1bd4d10996781893674eeec542539c8eed3ddc39231eda62768104c5e4eb77896254d
-
Filesize
346B
MD5f4c67df51bc663d0fe796da555808daf
SHA1401b211bb00735844e776c42808584a68644a82e
SHA2563de9f09bef858f665cb65798f1a5d9a3554b8965d318abbf0df42736294db187
SHA512a6a8636e3c6676cc181aa41f1f2490177baf38920bd9c3fff2181475ac542fd25bf16c4f409a1c93d5eb3f6e20842aee529646a655e80548bbda752cdd38c618
-
Filesize
122B
MD5d71e5784d260825ad2c63652cac3673d
SHA1b2dec1bab7ab03572298648fb7626a204981f0ed
SHA2565233e39f303c2425a9e568800b30d27bb45732cbf84d0ee6c264627536dc9863
SHA5127598f78f1fb640e8de50d7548188e0caa20996e1a3da31d981aea60401b293f52b223d94bbfd4b20566db87a6015a07c3876dab7033130851680e2df0d7f4a1d
-
Filesize
178B
MD53685803a8bf288149948257444f4b71a
SHA1fa5d5c9b6379def0329a32d102773d841d75318d
SHA2564ca882f253e353273a1004b3993ad80200a83eab9f20daa6d4ee666baa438c3a
SHA5120e921cff49fd599efc954a8245b67ff0614fac1c5e5152521b88b48e9146cfb31410c925fde89cc2d38954b6ee7cd605dd017e1b478c8a1fe301e1b171cf1999
-
Filesize
50B
MD5c1f678982f2e14ee43ab9e25d6d4dc1b
SHA1283c5f9db053718e4f5f9c572f18502b9ff1e6e6
SHA256f853acf4b930763ba2fb5c782bad9ee8c5d36dc3b9774998462e792eb4da747f
SHA51203ff3be160581617af8e67164e92de4f012dbc6841928a229a6e487489c71e1b04e4ec180a0bfb9b8109c3cff3f5fb2b52df9c6f721b2b8cc92dcd897f9d99e0
-
Filesize
7KB
MD546ee93cfce4dd2576579f45ad8c41b88
SHA1f34a4eb6df68e521debda61e5af46aaf461bc3ce
SHA256a8fbec39470467e43e3fbc48cceeaf11d5e2fe3b98c521ac71b5522e7b46a859
SHA512a2eb8ed29a819ee821c749dd76c04c2f3a5284a0063d08c43c9eaeb6f68a7c9034b846cb3cca26608cfe28b5ddc07842ea70a6aeb9cb7c6c1b579c3d05e40a5b
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
56KB
MD5cc0bd4f5a79107633084471dbd4af796
SHA109dfcf182b1493161dec8044a5234c35ee24c43a
SHA2563b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c
SHA51267ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3
-
Filesize
6KB
MD50745ff646f5af1f1cdd784c06f40fce9
SHA1bf7eba06020d7154ce4e35f696bec6e6c966287f
SHA256fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70
SHA5128d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da
-
Filesize
1KB
MD534315b127d06e06630f73ff2d8887d9a
SHA115e5a87308331e901e60ccf63b1fae9bf226afce
SHA256c5a043916c352cd162d9654dc7fa1ed0b489f511a81856c2223f6cb91bf4a314
SHA5121bb50671d86cc3175036145d4c0c72bf9dad71cee0d8722cbf890f55e7f13e4ea068b3f698192a2299dd2486b9f4d52a194070fa071648e85ccd4a00bf205c43
-
Filesize
1KB
MD592050744879c6f43913b90ad163c941f
SHA1d7f636761d9dace0ccc3a2f831ea1905e5c837f3
SHA256ac6bd4657b59a8bbfa97d8e277d75c264a2809db7ac9619a5961042a804b8173
SHA51268672f99b524bdd77685e55d9e1bb61a9add5df296ee357d412eae9171c24578d2cc283e46b17eb79e0f2985e3d70c5ee58a2c2b807783c0b73636541f80f7f3
-
Filesize
868B
MD51a1baae0f82cfcda6a478df722f3c152
SHA1c8636e08263cf7a01a138ee48e388e5ba0826d3d
SHA256ee678595f007c7aa62d92a679a4476070a89a3498da0c1b3fba934c156b672ab
SHA512727e2b5b64f7e3c2be38648dc3fae4e5dbb0391ffd73afbe5ed94705ae8604bdafdf47ff1e32aeb04359117308f76fa0816e611cb3e61fa6b8bc578710313413
-
Filesize
1KB
MD5f346d81f702e9bda05c9305498949376
SHA1e743ad5c1321d9bd098efa8179bca2bebc64ccc7
SHA256d3d2b40db1f8d66259cb88291592e0bdc8cadde76684c72a9918b70bb1434470
SHA512f405b57a29a99a2a46c0ac9b35cfc0eb5e2a7d96805288614e1bb170f25f8894bfb4d8980609fafcb8a4f5cbf50c8e0d904a5bf553674627ae831ddeca1e5d94
-
Filesize
1KB
MD52e6c24cf2610180b0d6e06b06f2c423f
SHA19a642fb0b338c2e98fd24c906257a9cba60b9830
SHA2566edd69c180042c0e4eda6647eeb7eff5d65700f95f1a0bb8d186a4475e7f55aa
SHA51297592586330fef2cb8b0bf450389d0a84f92db50091c5825470ce17b4b944884a53a1b26256de835baab077a909eeb3e830853deab72d648862077cdcff0ba60
-
Filesize
139B
MD5d66b2022009ac5ee79ccf1e849609241
SHA1e7ee619e4cc3c4896ad65eada651643d80ed9a1b
SHA256481a094a5199d2d45a036676d84508505559f56288b0ed8131eb9a32510551e6
SHA512c3f8396e7e3670b32c3125184c8e8ff67447f3d2fee600c37357bcb748d1c4cbc03a7c68d5202913e70a0aaa5bd95304ae90bf61e5ee7242a43d3e467812e1e9
-
Filesize
1KB
MD5bf15204d27ef2b8a83f6ce829b057a11
SHA1bd1e874589b118172fc60ef4adfa67413d6b3f6e
SHA256179a6374242baddeae43418717d06518ae80203ddd05e5eb90dca5984f336b23
SHA5124c7e05e4fee9e481c6684aa457bf2d9aad529882007ac75a966a7c4798dca608e61e194633c76d41ee8335293e890192566e716197ecd7328f1fd54bf8ca51f1
-
Filesize
94KB
MD5c31b97adf54bdd6ac6d19ab85cc6bc57
SHA17e458577b1fe49885c21f38ba981f77b00bdd59b
SHA2562e5af5577044835e7d1c526b1ef11dddbf660dbf265f3c8b533cbfcfd2a8b57a
SHA5129178ba7bfd3851b9622ffa7f5981f43b4ca654e3f85113f7c91ebd2ce417c1acb718e73737838c61496a255cee1f5ad9873ea88bce78a0cfe67bd2cfb1e71790
-
Filesize
92KB
MD59adaffc2a1b579115e40407733d94dde
SHA1866bbb0dbbd217aa287fe3324ecaa828e8d7b622
SHA256b31d4e8af5d38991c692f219130fdfa92762a9a77e04e7ab05e44603af578555
SHA512214eedc4b314b48c192d3a847a64807bf41481e5cd06b1a627bad048dbac14a2c0d6b5b3c992616e18ec9f59f4107d68e57b8c4fd9da01e0695824ffc8030619
-
Filesize
848KB
MD59e4e850e12f2f4f869b2491dbbb17ceb
SHA1bd89581a89604b601c817ea680c2a224b46737f8
SHA2564d1ad8aaf803660ee9d989a8a9cb3129397a97e4d0fa4b50ba7fb700b9d4d7b6
SHA5129285472e8ed2e685dce357383842356e3011110a09f2e66b2a34ee6bf3c7457dbba834256d8b9b240c20666ec38b62d0ebd7fe4dec1fd9cbb812adc36ad724f5
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
2.2MB
MD58c271a4f3d22bab31657afef6d391392
SHA173ca356b709eea6404ad8a997d4175894706430f
SHA256afc3a56884a203c8351098f217383d7397ede85580e1ce6dd54ad59f327bed69
SHA512cd433aae16749a0581761fed60d1758f80351d9a08219a256aae95711060f91a2189fbfbf7e5dd35202d8c1da92049c03357c505159c7b724c4896dd7a1cc832
-
Filesize
9KB
MD54ccc4a742d4423f2f0ed744fd9c81f63
SHA1704f00a1acc327fd879cf75fc90d0b8f927c36bc
SHA256416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6
SHA512790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb
-
Filesize
7KB
MD578b913fcd04259634a5e901c616e6074
SHA1ad5e1c651851a1125bcad79b01ccdcfa45df4799
SHA256e3ce60666bb88c2412615ef9f432ec24e219532dee5cc1c7aebc65ed9ec94d59
SHA512cbe07179dd93011f3d9a8f83541961ff34fb83d96658ac82a433ef0aa3399b183eaec3e6a49ec1c1e478d1eada2d3ebc78ffb1ae0574984ae66a7a9cab5d59e5
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
208KB
MD5b2bff24dcb4606c6c8474f979bfb4858
SHA15671b867df8ce726d1075909cd40f3934d680da6
SHA25682d89574b1019c60d6bcf97318b36f8e4bb535bb68334c68253b6306d9dbe4af
SHA512e7187607c909a9416ede056c10e83d4a0b8f8bb33a8653009630d5f36f80c8be145658d1c2d9df3ede48ce1e9bdf20d192dff45ebe0c6fdc50f241e81df4c874
-
Filesize
7KB
MD54fae8b7d6c73ca9e5fc4fe8d96c14583
SHA110865e388f36174297ec4ecdafd6265b331bfdcd
SHA256069db1a83371dcd2dd28a51def6cef190edcac6bbf35b81b7ee3c52105db210f
SHA51273a5547c6d83227a08e2427f2e5eb6abf429d4b5b7e146fcd59b9fb8c9cc6eb9ff61347a3d46f83d0c7adbaff15e94e70bf40660c217f48e9a46a6e310aaf6b1
-
Filesize
5KB
MD569806691d649ef1c8703fd9e29231d44
SHA1e2193fcf5b4863605eec2a5eb17bf84c7ac00166
SHA256ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6
SHA5125e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb
-
Filesize
265KB
MD5db4961bbb3c1cf487904b15ea5b5884b
SHA1d1c23d22e93d3f9b268f99519d38d010ff99ea6c
SHA256970ab5826883e15bd9ae33310dcfb00968a938eebbe7e8e1ba5c8b0c12cc5d12
SHA512191e365500a824c1b31eca9f82caecdc227471d09c1343390a2879bd9642cad1a57fe812eb0ab3f20b24941da763a24a76f5a4b0791af5600d283eae7f6cae7d