Overview
overview
7Static
static
766f5fe2ff4...18.exe
windows7-x64
766f5fe2ff4...18.exe
windows10-2004-x64
7$PLUGINSDIR/IS.dll
windows7-x64
3$PLUGINSDIR/IS.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDIR/NET.dll
windows7-x64
3$PLUGINSDIR/NET.dll
windows10-2004-x64
3$PLUGINSDI...lp.dll
windows7-x64
3$PLUGINSDI...lp.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI....0.exe
windows7-x64
7$PLUGINSDI....0.exe
windows10-2004-x64
7$APPDATA/U...e3.dll
windows7-x64
5$APPDATA/U...e3.dll
windows10-2004-x64
5$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Time.dll
windows7-x64
3$PLUGINSDIR/Time.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ef.dll
windows7-x64
3$PLUGINSDI...ef.dll
windows10-2004-x64
3$PLUGINSDIR/mt.dll
windows7-x64
3$PLUGINSDIR/mt.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2024, 14:11
Behavioral task
behavioral1
Sample
66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/IS.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/IS.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/NET.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/NET.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/OCSetupHlp.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/ividi_1.8.23.0.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/ividi_1.8.23.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$APPDATA/Unitech LLC/sqlite3.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
$APPDATA/Unitech LLC/sqlite3.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/Time.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/Time.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/mt.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/mt.dll
Resource
win10v2004-20241007-en
General
-
Target
66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe
-
Size
3.1MB
-
MD5
66f5fe2ff41e6be5a0174e3e13fece7e
-
SHA1
93598b0221984cc1a203d8ac6c8b335da827f837
-
SHA256
8c436076143b5d5a49ed25419f05c071654b0f0aa1a9f8c1b2db723964e45bf8
-
SHA512
b06ad2c34074248a4307a12e6fd813891fc689f1403913bed26a04360eaf5839fd795185da5d588844cd1f1f6389a0db6aefe4ef5bf2188b2ad2f2d3fc7a581e
-
SSDEEP
98304:11k8VO82XHJjC+56Natnm6k7g4QTgDvasops1bc:72XHJj7FtP4/DvRNc
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023bc4-25.dat acprotect behavioral2/files/0x0008000000023bfd-83.dat acprotect behavioral2/files/0x000a000000023c71-4861.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ividi_1.8.23.0.exe -
Executes dropped EXE 4 IoCs
pid Process 2968 ividi_1.8.23.0.exe 5504 ividi4ie.exe 5528 ividi4ffx.exe 5748 ividisrv.exe -
Loads dropped DLL 64 IoCs
pid Process 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 880 RunDll32.exe 4636 RunDll32.exe 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\default\extensions\kpdhgpkkloealnjnmepfhanpcleldbef\1.0_0\manifest.json ividi4ie.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8B8B2E80-1444-451D-AC8E-EB9A847F3887}\ = "ividi Helper Object" ividi4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8B8B2E80-1444-451D-AC8E-EB9A847F3887}\NoExplorer = "1" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{8B8B2E80-1444-451D-AC8E-EB9A847F3887} ividi4ie.exe -
resource yara_rule behavioral2/files/0x0008000000023bc4-25.dat upx behavioral2/memory/3688-28-0x0000000073780000-0x000000007378A000-memory.dmp upx behavioral2/files/0x0008000000023bfd-83.dat upx behavioral2/memory/2968-86-0x0000000002830000-0x00000000028CE000-memory.dmp upx behavioral2/memory/2968-3423-0x0000000002F90000-0x000000000302E000-memory.dmp upx behavioral2/memory/2968-3421-0x0000000002F90000-0x000000000302E000-memory.dmp upx behavioral2/memory/2968-3430-0x0000000003000000-0x000000000309E000-memory.dmp upx behavioral2/memory/2968-3431-0x0000000003000000-0x000000000309E000-memory.dmp upx behavioral2/memory/2968-3481-0x0000000003010000-0x00000000030AE000-memory.dmp upx behavioral2/memory/2968-3472-0x0000000002FF0000-0x000000000308E000-memory.dmp upx behavioral2/memory/2968-3460-0x0000000002F90000-0x000000000302E000-memory.dmp upx behavioral2/memory/2968-3457-0x0000000002F90000-0x000000000302E000-memory.dmp upx behavioral2/files/0x000a000000023c71-4861.dat upx -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\uninstall.exe ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividiEng.dll ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\bh\ividi.dll ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividiApp.dll ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividisrv.exe ividi4ie.exe File created C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividi.crx ividi4ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividi_1.8.23.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividi4ie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividi4ffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ividisrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunDll32.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0008000000023bc7-41.dat nsis_installer_1 behavioral2/files/0x0008000000023bc7-41.dat nsis_installer_2 behavioral2/files/0x001d000000023c38-3496.dat nsis_installer_1 behavioral2/files/0x001d000000023c38-3496.dat nsis_installer_2 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPageShow = "1" ividi_1.8.23.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8} ividi4ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9300D574-3C8A-420B-903D-092FA54CBB41}\OSDFileURL = "file:///C:/Users/Admin/AppData/Local/Temp/Unitech%20LLC/ividi/1.8.23.0/ividi.xml" ividi_1.8.23.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9300D574-3C8A-420B-903D-092FA54CBB41}\FaviconURL = "http://search.ividi.org/favicon.ico" ividi_1.8.23.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9300D574-3C8A-420B-903D-092FA54CBB41}\URL = "http://search.ividi.org/?q={searchTerms}&src=tbsp&id=d36618c4000000000000da61a5e71e4e&affilt=3&r=171" ividi_1.8.23.0.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main ividi_1.8.23.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AboutURLs\Tabs = "http://search.ividi.org/?q={searchTerms}&src=tbnt&id=d36618c4000000000000da61a5e71e4e&affilt=3" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8}\AppPath = "C:\\Program Files (x86)\\Unitech LLC\\ividi\\1.8.23.0" ividi4ie.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9300D574-3C8A-420B-903D-092FA54CBB41} ividi_1.8.23.0.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9300D574-3C8A-420B-903D-092FA54CBB41}\DisplayName = "Search" ividi_1.8.23.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AboutUrls ividi4ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9300D574-3C8A-420B-903D-092FA54CBB41}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{9300D574-3C8A-420B-903D-092FA54CBB41}.ico" ividi_1.8.23.0.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing ividi_1.8.23.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8}\Policy = "3" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F964AFD9-C4F0-4367-B5B8-E14DDBD524A8}\AppName = "ividisrv.exe" ividi4ie.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9300D574-3C8A-420B-903D-092FA54CBB41}\Codepage = "65001" ividi_1.8.23.0.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://search.ividi.org/?src=tbhp&id=d36618c4000000000000da61a5e71e4e&affilt=3" ividi_1.8.23.0.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ividi.ividiappCore\ = "appCore Object" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D198823B-F44A-4EBD-B18C-961622C0113D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{186F4C6F-EE6F-46EF-A1A0-7F1BC88EF224}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data ividi_1.8.23.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane.1 ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane.1\CLSID ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C541A8F9-E098-4EAC-BDC6-D3FF5CAABFB4}\Programmable ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ividi.ividiappCore.1\ = "appCore Object" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\Data ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\i\CurVer ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\tlbrSrchUrl = "http://search.ividi.org/?src=tbsp&id=d36618c4000000000000da61a5e71e4e&affilt=3&q=" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.ividiESrvc ividisrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane.1\CLSID\ = "{C541A8F9-E098-4EAC-BDC6-D3FF5CAABFB4}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ividi.ividiHlpr.1\CLSID\ = "{8B8B2E80-1444-451D-AC8E-EB9A847F3887}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ividi.ividiHlpr\CLSID\ = "{8B8B2E80-1444-451D-AC8E-EB9A847F3887}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\instlRef ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\autoRvrt = "false" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0 ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AA587238-8C5A-4876-A59C-FF55412CB518}\1.0\FLAGS\ = "0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F92D72B2-8B85-403D-B849-0D8943695829}\ = "IescrtSrvc" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D18734A5-B131-4335-A3E0-15FF90AC90EE}\TypeLib ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CC8903CC-2769-42BE-8F7E-52B5B742D3EE}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\i\CLSID\ = "{D18734A5-B131-4335-A3E0-15FF90AC90EE}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\postUninstall ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\uninstExt = "false" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.ividiESrvc\CurVer ividisrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{905E34C2-F4EB-49BE-A36B-47692CF957A8}\1.0\0\win32 ividisrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\escort.escortIEPane\CurVer ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\0\win32\ = "C:\\Program Files (x86)\\Unitech LLC\\ividi\\1.8.23.0\\ividiApp.dll" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{186F4C6F-EE6F-46EF-A1A0-7F1BC88EF224}\TypeLib ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FDD7D35E-DEE4-43B2-BADA-1901182B367B}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C930413F-8F9D-47F8-B7F6-53F45EDC3F76}\ = "IEvntCntr" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E485B5E-A3BD-44F2-89D6-8E0FE65E4D4B} ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B1399F80-21CB-4EE9-9C64-A00018863C96}\LocalServer32\ = "\"C:\\Program Files (x86)\\Unitech LLC\\ividi\\1.8.23.0\\ividisrv.exe\"" ividisrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E967BBC-8053-4135-B6A9-A5B8DFF3C0EC}\ProxyStubClsid32 ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FAA44E54-BF05-48AE-A0D5-3D18BEF3D272}\TypeLib\ = "{AA587238-8C5A-4876-A59C-FF55412CB518}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CC8903CC-2769-42BE-8F7E-52B5B742D3EE}\ProxyStubClsid32 ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\smplGrp = "none" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{FDD7D35E-DEE4-43B2-BADA-1901182B367B}\ = "IxpEmphszr" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\vrsni = "1.8.23.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{211B330A-499B-415E-B1F1-B7132A8751D2}\ProgID\ = "ividi.ividiappCore.1" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{211B330A-499B-415E-B1F1-B7132A8751D2}\TypeLib\ = "{D7EE8177-D51E-4F89-92B6-83EA2EC40800}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CC8903CC-2769-42BE-8F7E-52B5B742D3EE} ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{186F4C6F-EE6F-46EF-A1A0-7F1BC88EF224} ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D198823B-F44A-4EBD-B18C-961622C0113D} ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C930413F-8F9D-47F8-B7F6-53F45EDC3F76} ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8E485B5E-A3BD-44F2-89D6-8E0FE65E4D4B}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D18734A5-B131-4335-A3E0-15FF90AC90EE}\AppID = "{B12E99ED-69BD-437C-86BE-C862B9E5444D}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C541A8F9-E098-4EAC-BDC6-D3FF5CAABFB4}\TypeLib ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8B8B2E80-1444-451D-AC8E-EB9A847F3887}\InprocServer32\ThreadingModel = "apartment" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8B8B2E80-1444-451D-AC8E-EB9A847F3887}\TypeLib\ = "{09C554C3-109B-483C-A06B-F14172F1A947}" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\HELPDIR ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\run4ie = "end" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B1399F80-21CB-4EE9-9C64-A00018863C96}\Programmable ividisrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9F5978E2-5D6D-4B23-96FF-A4BBD97F0133}\TypeLib\Version = "1.0" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{676CA8F5-30D8-4292-8A1C-B5CBDE8C1B3B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F92D72B2-8B85-403D-B849-0D8943695829}\TypeLib\ = "{AA587238-8C5A-4876-A59C-FF55412CB518}" ividi4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ividi.ividiHlpr\ = "CescrtHlpr Object" ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\Instl ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9F5978E2-5D6D-4B23-96FF-A4BBD97F0133}\ProxyStubClsid32 ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9F5978E2-5D6D-4B23-96FF-A4BBD97F0133}\TypeLib ividi4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID ividi_1.8.23.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{685F23D9-FCFD-475C-B56A-362645945C5A}\instl\data\trace = "0" ividi_1.8.23.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.ividiESrvc.1\ = "escrtSrvc Object" ividisrv.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 880 RunDll32.exe 880 RunDll32.exe 4636 RunDll32.exe 4636 RunDll32.exe 880 RunDll32.exe 880 RunDll32.exe 4636 RunDll32.exe 4636 RunDll32.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 880 RunDll32.exe 880 RunDll32.exe 4636 RunDll32.exe 4636 RunDll32.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 880 RunDll32.exe 880 RunDll32.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 4636 RunDll32.exe 4636 RunDll32.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 2968 ividi_1.8.23.0.exe 880 RunDll32.exe 880 RunDll32.exe 4636 RunDll32.exe 4636 RunDll32.exe 880 RunDll32.exe 880 RunDll32.exe 4636 RunDll32.exe 4636 RunDll32.exe 880 RunDll32.exe 880 RunDll32.exe 4636 RunDll32.exe 4636 RunDll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2968 ividi_1.8.23.0.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3688 wrote to memory of 880 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 85 PID 3688 wrote to memory of 880 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 85 PID 3688 wrote to memory of 880 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 85 PID 3688 wrote to memory of 4636 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 86 PID 3688 wrote to memory of 4636 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 86 PID 3688 wrote to memory of 4636 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 86 PID 3688 wrote to memory of 2968 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 95 PID 3688 wrote to memory of 2968 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 95 PID 3688 wrote to memory of 2968 3688 66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe 95 PID 2968 wrote to memory of 5504 2968 ividi_1.8.23.0.exe 98 PID 2968 wrote to memory of 5504 2968 ividi_1.8.23.0.exe 98 PID 2968 wrote to memory of 5504 2968 ividi_1.8.23.0.exe 98 PID 2968 wrote to memory of 5528 2968 ividi_1.8.23.0.exe 99 PID 2968 wrote to memory of 5528 2968 ividi_1.8.23.0.exe 99 PID 2968 wrote to memory of 5528 2968 ividi_1.8.23.0.exe 99 PID 5504 wrote to memory of 5748 5504 ividi4ie.exe 100 PID 5504 wrote to memory of 5748 5504 ividi4ie.exe 100 PID 5504 wrote to memory of 5748 5504 ividi4ie.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\66f5fe2ff41e6be5a0174e3e13fece7e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe "C:\Users\Admin\AppData\Local\Temp\nsyB547.tmp\OCSetupHlp.dll",_OCPID974OpenCandy2@16 3688,6B1F6CF202234D3DA90BEAB1CA759938,323722A5827747A0A44574BC9BAFE52C,5BBCAFBD77654AA98C62DCE6B564311F2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Windows\SysWOW64\RunDll32.exeRunDll32.exe "C:\Users\Admin\AppData\Local\Temp\nsyB547.tmp\OCSetupHlp.dll",_OCPID974OpenCandy2@16 3688,DF3FACC75E514CF7A714597FF59744B1,59BBF15747F9447883F5DC410FF145F2,5BBCAFBD77654AA98C62DCE6B564311F2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\nsyB547.tmp\ividi_1.8.23.0.exeC:\Users\Admin\AppData\Local\Temp\nsyB547.tmp\ividi_1.8.23.0.exe /uninstallAll /aflt=3 /excTlbr /mhp /mnt /mds2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ie.exe"C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ie.exe" /uninstallAll /aflt=3 /excTlbr /mhp /mnt /mds3⤵
- Executes dropped EXE
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5504 -
C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividisrv.exe"C:\Program Files (x86)\Unitech LLC\ividi\1.8.23.0\ividisrv.exe" /RegServer4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5748
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ffx.exe"C:\Users\Admin\AppData\Local\Temp\Unitech LLC\ividi\1.8.23.0\ividi4ffx.exe" /uninstallAll /aflt=3 /excTlbr /mhp /mnt /mds3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD51989cd78346c1f430484236daca1c2cc
SHA19d9eaece8fe80dd400a1af12595a5a32e931abfe
SHA2562d8ab3f2dfec1393b75e1ba8d12148ab5b5e334d1b071754e08f7087b22cdcc2
SHA51200aaf06bc2a092ce3d9b8d95e685a9fd0b61a8a5afb23910bdeb43a82bb294f54ce21a05823cdca28aa67b520dfb4091c847f4ae2ea211156441dd3e5a50205a
-
Filesize
583KB
MD58a7e5619cbb2c659b3dd2d9c4a09db98
SHA1a7eb94c32ca25dc1a9eb461d2d97d48475e010b4
SHA256eae253b5691720fadd70083ed874b53929287a3d93834a3206f78ddf8fab1201
SHA51214f126006dccead7a344e69e6f21de15bddc6ed30fc248df4043838edd6ed838eae2db0f9ea1204584064a4426d610aeb34f268e37a98f54f274029763a146c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{9300D574-3C8A-420B-903D-092FA54CBB41}.ico
Filesize1KB
MD5cc293971feb692e18edd790fcd6ff10e
SHA109a2c236508962ed8d13736033bd2479f13dbf32
SHA256a863b816dbda3deda70419bb471f11f0f0e0ca20ebec82a0c00d5c304690b3c5
SHA512e245e2bf17e143fc4cd24224bcaa68ec7a9548ae8f8c295caf0cd49e366f22985a123d7e2da995864a9d233b9510df3eddaa5dbf0f65eb81468ed74bb0b2070e
-
Filesize
590B
MD5d977ad4b5c1933194e9d40d01376275f
SHA1df335838b334c1f15d5bff2e6a5ae44ef9ea33db
SHA256e11e66bf9b97359a9ee25065cb3b8e574487fdfa7768ab71ef78e93a3531ebf5
SHA5126f162df3eaa514d1c02d4831cf4d296373b32a838ba73614bc0c8f5d13b2558d823f25470aa9526954e3a41958c89563e69b7d75d7f259ebb15b57435f81fc1b
-
Filesize
1.5MB
MD5690df0811fc73ff2219183e5d80d824b
SHA1a720126932f65de281c6f34c5512be8f787f7161
SHA25619e42855c02278efba771951c712468221e3318984e65c866590899a70e9b8cd
SHA5127e5feae85b18b479a014f050a31d276b3a7d82600b1ab62338c371b9093e23e59021973ddb2cd5783247be076b5824f96bb7f05998c5fc26e971307e1cbb49ce
-
Filesize
1KB
MD52b5a3f08b9467a6a2ea55b7043ca4832
SHA1384d54c29e171927472e2c10912e6e019b40f2c4
SHA25670af56241f7eefd3f9b12016b1340cada724fa20975b35c14fdee507b85bc5da
SHA512bb265e9b6c3fb486cdd3ddf8d52f45de17e03d865054449f635f61851a982cffa4b6c72873b077b8cd62e55058d3ed966d7560cfa732e9e5bf93ee02a025ffdf
-
Filesize
1KB
MD5fe6f1a57ac6c71034270c4bc2d07ccba
SHA1601b2215f7570a33f0c8c10bcd4c2dfd7f95ffd7
SHA2565ee1d60356393422f134b8b2960adc16bcdd9d354c07372e568981edf651212a
SHA5128225521ae9ea2d3d345ead6373e2c94232884fb55b4261edc32315ab29abee4e0020e6e14e909659fa5cdd49870088165fba7cd40811b73303b4ffdc1ca00ca5
-
Filesize
1KB
MD5408ac1c973b3d5aba970dc7bcaa25b23
SHA15193764142d1aae696c70080c94cdbdd0eca104f
SHA256303e48f406401ca3f879e0e098e7a60a9996e35f81fe9588b208efd762f0a941
SHA5125208cdafe0867451227d5beffa6abe3149cc5e8bb607f47935b95cf66fd93d1bbee70f9d36f2ef1a19a439dcbed4379e0dc2c5875ff2a7b8242adff283d92b5e
-
Filesize
1KB
MD5dfe485d2dcb84483e4a34841e7187a54
SHA14b871afb521c7bb1a798fdc165fd244f992bf38d
SHA25659d39a70a9634eefe1b73b89b75da2cae09d314c4a477750e5b5c4aa86334069
SHA512bf02d6a4bd7bd8c45c77ddf9a2774b3e83989dd7b059a6fe4ed9448c2d9ff373ab21c01fa4ac807d2f106f92a661e4044a76009d7e0a275055b590b974b39498
-
Filesize
1KB
MD55a44305e078c215e66a2c43f75188a22
SHA18b0b72d50c7e228c0f651dcb2649c61a129ba9c4
SHA2563903e15c13c11da0ce085342fee31973baa63e802c53303b51c169bd53b8c4f2
SHA512a97bc49c4328f7ac6431bc07d03640e2d4541be477272ba776b19286b7a12345ec422a1d91cb8d38cb1f07a87bbc11b488306df51435377137b1decc03b891d5
-
Filesize
1KB
MD5d3dd64c430995bd1e3ba0e3f8699cee0
SHA1f9f6e875430b4a578a38ca028ea95e6fedc539d2
SHA25610f43ac859260f244b16ed6c05c4f149378baa50f74ebb1dae75db9a14d2fbed
SHA512d52e61df8e75d1a163b079bd4027a60e7193720bad017840b12879d8c3be13f0a4703ab0a58750af41956a215b954731af213a5d64fa8850d6aec4ed8692fda4
-
Filesize
1KB
MD52a3bac88eb2fade8939ecea9ac0507b4
SHA112d8304e5524490fc5b27075a180cd57d13c81cf
SHA256dfcbb4eb1a41547f6e9691862d3f21c4a75397be3cbc3add310f05f305b3141f
SHA51200cd78f1d3ba9e70f6fb8994160fe1034fc3b601489d8c39f0560c4a75f744539dd219dd2a016f1dc7d30d1cfdf719e175fced7fc2fae330a01df49a86c18b3f
-
Filesize
1KB
MD59dbb20bd446f2f4b09d3488b99cf30fa
SHA143089287123cc8f0f7e2e9b5148f8512db968d76
SHA25643d080fb6a1b053e68b7e36b00669ecc33cc28d497596a14d614147329c2ab2a
SHA5129313ea5978d3b2f77eb57209c7f394d0ca204acb558c63a53d8a73badb81a29c959a6051489c78192d7dd434ea6ee4c7a9af8196db2b347e6d13a8ead97971dd
-
Filesize
958B
MD5ea3f1c8bec8b641d2c92655cf286a592
SHA154767e0bea11a4f2f30c11ac8ff8018e56bafbf6
SHA256ed455288818fb71148775d22deab5ecfb063c26a72a843ee223d278fcd5c6a92
SHA512a352569a0d7ddef26714bed8e2ba5cec6100fde791406bfd47dfbc622e8aeb6fecdfa713932e1e89976625de5efcd09cfaf673d2e2107c7bad965621d5e1c20c
-
Filesize
1KB
MD5ee00f632811cb64fc1f5930a81822a89
SHA157e0e1c791e40ec257d7ab011cf8aacaa302617f
SHA2564c209fa1f641d45d9ad9ff3f02cd95c8d613138fc9144f4a1ded771fba237210
SHA5123400db3a63111fe6d9505b1f5509532cd21cc0657aead06bedf4f918753083faed43a1cc739bb7139155d7dc09a550d7d8df1be97c57d5bc9863a9a5dec0bf2e
-
Filesize
1KB
MD52d1384b9e49cff17ff573518e8abc01c
SHA13f7cc9d52fb36160c0c0a272f30fb47668f2426f
SHA2562b06e677767cd7f95662c0e7c959d4a35c57f4869a68462faa855d22b0fb67c6
SHA5129a7263ad5a3436ad794ccb5b353e00eba0f042625ec181a6f9909e2838331e791c43316fb7fe32b480f1e0156c2e677792476a667f514e33bfad7e536f2adeeb
-
Filesize
1KB
MD598704b1aea386e2c56e4656a8e8d5619
SHA1458273f9ab7f587b31ec25501470a6f56c0e2b46
SHA256df04f4862f9053e0b5f4e9d07d5afa58cd1395a7f1043d4fbcc54125e10f4ba8
SHA512540e22169f1f5de59b9de65b1a0b9166b448717ec626eb3da9fe4130a0fdccfab8b35c3fbfaf962005cdab9109a4456da717ca1abe77141b47bb00f0046aa99f
-
Filesize
1KB
MD50f148633098bdf93e0bc495301d3c121
SHA1814ba55daa60a3e7578326fcefe1f61c8235f4e8
SHA256edafb254c0440b4a40a38916eb43775e62137a776e2fe530031c38e7d71db2ab
SHA512a90c58c553d88bdb80338b5558a3f929fdc3120231bd213f70c86995593e24a3376244c25fd7a643ae01196e8ca1a681f2c3d62d46a64da8e7510ced62974bf7
-
Filesize
1KB
MD5e28d93bed98d4ea95ed7be4355ce4cf2
SHA15cabdbeebba00cb81fc4f9419deebbe112488f08
SHA2562f4e1e1207c4fb0a5e581d5e7bada3b781183da81022adb1c39383f9002f9f77
SHA5124f16f869a19c0f5d45fc6e9698910d437cc2324cd8951d5c25f115ae358b5bd04c4b388d476fbbc3fe18325246aa194b64f9036491ad48bb05c9d0af8c9d7898
-
Filesize
1KB
MD514874c05e64ff08f2b1a386b94565906
SHA10f3b54790a9130d648c6dbde50c00b51c189cc8f
SHA256628fdaed409108eca1a5ad3b03835d37733d87d04fc236c48fabd2c60362ea27
SHA512ddba1781f1369b91a93bc9764c0dc39d8082671ac93326bcaf3375a50b5c24b66a24167a0a1de1ef0a97938c83a300e4934517dc302a667581b049f85000c4d5
-
Filesize
7KB
MD546ee93cfce4dd2576579f45ad8c41b88
SHA1f34a4eb6df68e521debda61e5af46aaf461bc3ce
SHA256a8fbec39470467e43e3fbc48cceeaf11d5e2fe3b98c521ac71b5522e7b46a859
SHA512a2eb8ed29a819ee821c749dd76c04c2f3a5284a0063d08c43c9eaeb6f68a7c9034b846cb3cca26608cfe28b5ddc07842ea70a6aeb9cb7c6c1b579c3d05e40a5b
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
56KB
MD5cc0bd4f5a79107633084471dbd4af796
SHA109dfcf182b1493161dec8044a5234c35ee24c43a
SHA2563b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c
SHA51267ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
208KB
MD5b2bff24dcb4606c6c8474f979bfb4858
SHA15671b867df8ce726d1075909cd40f3934d680da6
SHA25682d89574b1019c60d6bcf97318b36f8e4bb535bb68334c68253b6306d9dbe4af
SHA512e7187607c909a9416ede056c10e83d4a0b8f8bb33a8653009630d5f36f80c8be145658d1c2d9df3ede48ce1e9bdf20d192dff45ebe0c6fdc50f241e81df4c874
-
Filesize
7KB
MD54fae8b7d6c73ca9e5fc4fe8d96c14583
SHA110865e388f36174297ec4ecdafd6265b331bfdcd
SHA256069db1a83371dcd2dd28a51def6cef190edcac6bbf35b81b7ee3c52105db210f
SHA51273a5547c6d83227a08e2427f2e5eb6abf429d4b5b7e146fcd59b9fb8c9cc6eb9ff61347a3d46f83d0c7adbaff15e94e70bf40660c217f48e9a46a6e310aaf6b1
-
Filesize
5KB
MD569806691d649ef1c8703fd9e29231d44
SHA1e2193fcf5b4863605eec2a5eb17bf84c7ac00166
SHA256ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6
SHA5125e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb
-
Filesize
6KB
MD50745ff646f5af1f1cdd784c06f40fce9
SHA1bf7eba06020d7154ce4e35f696bec6e6c966287f
SHA256fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70
SHA5128d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da
-
Filesize
94KB
MD5c31b97adf54bdd6ac6d19ab85cc6bc57
SHA17e458577b1fe49885c21f38ba981f77b00bdd59b
SHA2562e5af5577044835e7d1c526b1ef11dddbf660dbf265f3c8b533cbfcfd2a8b57a
SHA5129178ba7bfd3851b9622ffa7f5981f43b4ca654e3f85113f7c91ebd2ce417c1acb718e73737838c61496a255cee1f5ad9873ea88bce78a0cfe67bd2cfb1e71790
-
Filesize
92KB
MD59adaffc2a1b579115e40407733d94dde
SHA1866bbb0dbbd217aa287fe3324ecaa828e8d7b622
SHA256b31d4e8af5d38991c692f219130fdfa92762a9a77e04e7ab05e44603af578555
SHA512214eedc4b314b48c192d3a847a64807bf41481e5cd06b1a627bad048dbac14a2c0d6b5b3c992616e18ec9f59f4107d68e57b8c4fd9da01e0695824ffc8030619
-
Filesize
848KB
MD59e4e850e12f2f4f869b2491dbbb17ceb
SHA1bd89581a89604b601c817ea680c2a224b46737f8
SHA2564d1ad8aaf803660ee9d989a8a9cb3129397a97e4d0fa4b50ba7fb700b9d4d7b6
SHA5129285472e8ed2e685dce357383842356e3011110a09f2e66b2a34ee6bf3c7457dbba834256d8b9b240c20666ec38b62d0ebd7fe4dec1fd9cbb812adc36ad724f5
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
2.2MB
MD58c271a4f3d22bab31657afef6d391392
SHA173ca356b709eea6404ad8a997d4175894706430f
SHA256afc3a56884a203c8351098f217383d7397ede85580e1ce6dd54ad59f327bed69
SHA512cd433aae16749a0581761fed60d1758f80351d9a08219a256aae95711060f91a2189fbfbf7e5dd35202d8c1da92049c03357c505159c7b724c4896dd7a1cc832
-
Filesize
9KB
MD54ccc4a742d4423f2f0ed744fd9c81f63
SHA1704f00a1acc327fd879cf75fc90d0b8f927c36bc
SHA256416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6
SHA512790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb
-
Filesize
7KB
MD578b913fcd04259634a5e901c616e6074
SHA1ad5e1c651851a1125bcad79b01ccdcfa45df4799
SHA256e3ce60666bb88c2412615ef9f432ec24e219532dee5cc1c7aebc65ed9ec94d59
SHA512cbe07179dd93011f3d9a8f83541961ff34fb83d96658ac82a433ef0aa3399b183eaec3e6a49ec1c1e478d1eada2d3ebc78ffb1ae0574984ae66a7a9cab5d59e5
-
Filesize
50B
MD5c1f678982f2e14ee43ab9e25d6d4dc1b
SHA1283c5f9db053718e4f5f9c572f18502b9ff1e6e6
SHA256f853acf4b930763ba2fb5c782bad9ee8c5d36dc3b9774998462e792eb4da747f
SHA51203ff3be160581617af8e67164e92de4f012dbc6841928a229a6e487489c71e1b04e4ec180a0bfb9b8109c3cff3f5fb2b52df9c6f721b2b8cc92dcd897f9d99e0
-
Filesize
346B
MD5f4c67df51bc663d0fe796da555808daf
SHA1401b211bb00735844e776c42808584a68644a82e
SHA2563de9f09bef858f665cb65798f1a5d9a3554b8965d318abbf0df42736294db187
SHA512a6a8636e3c6676cc181aa41f1f2490177baf38920bd9c3fff2181475ac542fd25bf16c4f409a1c93d5eb3f6e20842aee529646a655e80548bbda752cdd38c618
-
Filesize
122B
MD528ca68f733a2baa1bd1f516bcc65b541
SHA16e4dc57fb74679f8b3b9a4bebb55a1c49554d2d6
SHA256e704a4be4f9e448060814859c8af7393bd3f0d5670cb7da33ea397ba4067144b
SHA512dade5c80198532acb12d49d0d23228a59cafd3ee35c8e746e92367d1d66e5fae00b79173efc11c2d7cff32d47f5908b49108322e29d54a534627ab4cf3c4d98d
-
Filesize
96B
MD555e77d60d71bb65a8fca04818df04968
SHA10d40f3710f9d137b2bdc4c725d2953ad84e5778e
SHA2562f7e1067489437ae1d4ee047aa7f3800c44754f59a2b555a5a02a61163548ae2
SHA51289d0efee4f55e5a93caece636c36702aad71bb2c9ba6dba4147d325131ad4214d6c192df3e2ae4963278eb394dcf61e746d6d6bd61771cc9f25eee240e09bbac
-
Filesize
139B
MD5d66b2022009ac5ee79ccf1e849609241
SHA1e7ee619e4cc3c4896ad65eada651643d80ed9a1b
SHA256481a094a5199d2d45a036676d84508505559f56288b0ed8131eb9a32510551e6
SHA512c3f8396e7e3670b32c3125184c8e8ff67447f3d2fee600c37357bcb748d1c4cbc03a7c68d5202913e70a0aaa5bd95304ae90bf61e5ee7242a43d3e467812e1e9
-
Filesize
10KB
MD561f2fbf7f90e52ce617766db11941700
SHA1ab0df6fac65b0ede03f3281514495758744d56d2
SHA256b077945e07f395378d1b9c5958aaa86fcc8a631a66f27c6a9b73dc87c8d92a1f
SHA512c2d8b150ee6a7e153a84f6aeab85fc4548b8c62bfd5cccad5b92b948531ebf7ace8ac6c5dc73f72358dc5c8cb0e2a77d27ac4fde7556a52e99c7d1cdd7e4a3f7
-
Filesize
351B
MD503c34b0b9c524f804e8bebad6f4262ef
SHA1fbb285280ecb75e3586c3c39156335b3a745d771
SHA2560abd18bfa3c846321416b1d4946bff393bff29f6d1a44a56ec4613a6d492a813
SHA5121e6d8fd9b55a2c590c788dc07391b71dc335bc46a34dc26b2273ae6e34d7cac21d8173fbea8c37c904027bab423c4bdb905f1ebcb442e2f6d385b85f0510f77b
-
Filesize
261B
MD50ab1ab6be564252ebc87be385bb23743
SHA1064661f0fc8dc6b4ef86590632666c3d6f575d47
SHA2560fa43ffd44c3440ae1660cc524376682955473408dc65649d452396296e9cf4a
SHA5120a8bd008e5c50d18ded857a80be5baa070de5d1e493f06243e521600e0718508ed59c2d74ee00d154fac64ad6ba06ab0cc616e97c29df5d5258a70d6602852d5
-
Filesize
304B
MD54cb12120edfac9fc690afac246250b0d
SHA1ea3d09114164ca561e02e27cd0bf7a70aca7eadd
SHA2560c951decc8a2f3a09e715bb657b742d7b040f061b58328a2c54c0e4428c073eb
SHA51258c3e2d0648f8b13aa07501679d5ca0a25f3d3ae64a8abbb9bc0c04d861480527eaf18dab93a07994210e2deb1159f812ad5ea02f7174bab226c32d24e3b34d5
-
Filesize
339B
MD5b19931fbf0770986629cd6dd7357d713
SHA1231c2a45fc9f2b1589125ee37a8baae53e32cd47
SHA2568d318217a2be11f55e8a0610d0d2625e10939b0048d4ecfdc4a38f6b65a30839
SHA51209a21f561574c4e734c30e7885cbab1e724af3f82464a840083082a346b205d8292aaa2f63ae8ddb69247a001612fd8e2e3b8bcf85b50d86b7ac702437448ed5
-
Filesize
339B
MD54bb238d5b78721d5c0b92a058ce69f29
SHA1bc5a13c45e28770e2dc6432b7bf3c3e49c087561
SHA2566662bf5ca1f346e2891b61e0f133e96ac8bd1815542af84620331485565b5011
SHA5123c5c17843c03e362eef68dc8b28c0dc3c3fddc0f4dfe07e4ae8eecfaa864648c0d84c26d8b64e8f18446cef880ed70c06eedd30f8bb5118357b7197280a5f419
-
Filesize
339B
MD544bb00decb47b97536f710b2a89ea5b4
SHA120307700f43f731960af94ffeab17ff4b6080809
SHA25682d153158bb2cfd4cf298b143987c41ea028981f540c4c6df38bcfc718622a65
SHA512fdafc1e4948c90f7402bcc9104b21c21424f5bef1bb01e37605aa89eeb775060e7e854980b47625939d9437f0416ae369ef4e00b17a33021dfe4c9158b8b2767
-
Filesize
778B
MD5272bd30fc0ad14498009865db72e72d8
SHA1614d01219e99362e53481241222b5e08455a35ef
SHA2564b1f5cd993418399c70cddd77a624ec5f5c93b0cff309e77110fd9626ea1dd70
SHA51273fafac850b25a91576d782a4194c398449fe8239d231e162c8ee407709c8a749be6af2d741ddb2914018219aebff5a4a13dfb794cf3d761a592af49850d7db3
-
Filesize
1KB
MD50b4a84435ba1fc4f3f8495cb837ea2b5
SHA1436e832401ab762dc3c698b9a66e0a47ca588d30
SHA256060603bf05d5e99ce1b789f32372b3575e429874ce17e42db8eb3b99072140fc
SHA51258c413369e69c50a4795bc75f8a109cf79f7852ce3bde1db5d22fb9e3f17df0f933bd8549738d24cc65619c38c2cfc29ca3e21a57d9be5b814374622720ee5f6
-
Filesize
1KB
MD5ede628f24cb690070669440a3aa1623f
SHA1788ba90cb4fff0cf4dcb870d7fb71664fcc5f938
SHA2562a4bbe7ec76c69b09afe3eb48616ebcf88e7468b6bf599e1ce32e215ec12b379
SHA5127abe6498d38be047a90695ee1cbab64b98a0f9dbe9db16eb9a6d096a5c32408c7bba527d8aa0bb73f203a6473501d1e041d69a4678ed2b30b097d5e92e321d38
-
Filesize
1KB
MD54d027f7a5042513541bd99b81ded2fc3
SHA1796f04694a0ba2fea205780a5eb1274c62f8a6fe
SHA256dc78c2fd56996e0092b0a773db901bf761b9acda0c5d4319ccbbe01c9747b0a5
SHA512cc341cc9e7a7ab676eb2b1fb8ec4282e6b9e4a5acd1dc843a3c4b8877585dddb04ad8c5cba556cadff4b024dcfc446ba29e03ce2b267dd0935ebf4303b436c25
-
Filesize
1008B
MD5b522517c3080368363dd30cb20178701
SHA17f4ffc4b050dbd6cfcddc99b3c8ffa41a86462ba
SHA2562797eb9bd0f24807822aa0ad9f9a770504c61598d496875be5d3a3ed6c9fc50a
SHA512c7d06150a1b376b4a5f70d02cf551f9930c384623b023a6949cbc38a623ac783c11512f8483738ca12eb94acb5837951dac21153832b78b73f0b63e74e157689
-
Filesize
1KB
MD560ac5c279548ae26948e1d8cf72c8690
SHA10c30f1161ab5270f82e4c64dcb6c60e148894bdf
SHA2568d374dee20b7726db66e2e1f4b3e6640262f1b181591c2e8e68d77f1659a9f22
SHA5120bb7c7085243d200113ca394923b4dabe1d41b41d0be2c661847c3a2491823c8fc9e1742e4485e778ef74e672aa495c5ad246955d97e2b20369722b837f87f0e
-
Filesize
1KB
MD526e76ff3daedb5ca9bd5889cd51a75bc
SHA14fd61202014650b93639d8ee8d0bb7eb7fb22d63
SHA2566a665f574a4c8c291a0d38fb6e9606408c53a3c3500f1e5b06be0cc9efbe30ab
SHA512663fdd2b8714c9a00d70d8fd780468b334c4354b763fbed5a65ee2e97f9aeed7a84fa6c4575e8de8ca1516a774227347a5ab687d278c274c8d645d4a9d49c11b
-
Filesize
1KB
MD5536856e17f27c0e6b919c4bef0e549f2
SHA19c624db248505174d6f4501e2e78ceeede5704b7
SHA256de5b8e1c6afcc49cbd6bf8dafe89a965c62f29e4f66034f314d4bb4102839e0a
SHA512cef170286c711ee196d3e84f438ca5861d8488eafee0ecb33a4a6fc55f8cb23d4f69fdd286615764000c945bf070b51a32dfbd3cf938b59d5470cc8831555f40
-
Filesize
1KB
MD53f50b0cca0995d3a60a9dc3c3f8cf92a
SHA1398f4eec94a413fc85c47253817f02b3cb5f9abf
SHA25649ff4bc6d4df963575f3cddf52e01a39d5f32db6b500c2787eebe7b435d2f8a6
SHA5129902c4a8cb2e6aae9d718a32903b66a1f23d1ebb9b1a3ada2524a94374b17de7f7cd55ee049d471c16db0716ddd8bc0d87c9e5aced6a6053b9b720b5b237951c
-
Filesize
1KB
MD577ac06651e56a597a21820ffb2fedd35
SHA1542fe3ce8ebd0cc629460a87a9720bd975f0a2de
SHA256bf8b7ef865bf15e14d5932cad5651f888da06002d14d7b1b39e76b1de6453061
SHA512c1883edede9ae48fed929cd096657ed49b82ade2811b95782a82bfbbcf269aedf4d561c860e8951893dc26cc9719e125324d7385317bd16e8708e6dc3aa7de9b
-
Filesize
1KB
MD557d4477bc92c67b4335799777f0b175f
SHA14b83e7a6a5140ee9330a2a6acbc609ebb32f2b15
SHA2565522a015d7394e88b0977e9a46d461b24662cdb04f245f208ef02cf25f272f09
SHA5125ddae1d8ca6c34318f9ef9b0a32eadec6c74a11e50ee5f465b898af903b934fb263293343ebc74b8bab9a1ceaf71aa7cbdb7e69f10aba2aa3ff6975cedb9a2c0
-
Filesize
1KB
MD50f34268f974b1f763a1b4b7cb7b59384
SHA18e3355026a167c56d5823be6c28c8c88eb2602c6
SHA25654e99b449dc840e1d85bda23d741093de467f4ddf5c04aa760d0445561d24220
SHA512632d014bc1f5e215803b5d5735931a8e580eb01aa1274ce275efd790edf3c081d80b6c4bb1350ebbdd07a41c76d413230e5636e2a179aa98e7e7e9aed6ba3312
-
Filesize
1KB
MD50f93105e3d1e78b7fa0b4f36a7d3cf88
SHA11910b7537d43bed9be2986fec011e15214b6c12f
SHA2560b49b7bc03828bf5c15a8ed9d4584a99e7ae4b463dfe9bf36820e944f8f92365
SHA5121e2cdda4ec8fbbf23bbebfd100c34ed5da8ba59aa552f2922fb6f3a7affa861f5de28f8987e31aaf590f91f376474bde66c76fe09b02389415b32042f4f0b2a2
-
Filesize
1KB
MD5926de674d05481844414ad716b3692eb
SHA163e6a1f3305acea45b48df9ec127d982eaddd0ba
SHA256a97e499dc0856b1c6b5b619d3d83c54520c7ed069336118cfc2680418f99ed95
SHA5128097571c377839f2ffa927f17648b30c5d797dcc607c87c568b242a6e61f1385dcd84062aa08f57fc7f9a6fb9b950c5c339a078305890f462068685d94a94324
-
Filesize
1KB
MD5a600d6290504018e9ae9d22ee9bae2b3
SHA1aa75406457d8609f90de2a87ad2a08c795a49dbc
SHA2566dbc6c72e75f8b96135cb4831d6ddaa3eaa653662a7c08ff65991d7a6a8b28b9
SHA51237ec34ec36a0c0df0939312da395d511bb4b4d7c53a224171078afb67b68b58255f9fb7a42948e82d8c0bd6d868ca04b6930e6fde9719098238f35d627925dee
-
Filesize
1KB
MD59397be3d4c424b88aa0cfc14af1d2288
SHA1db1c8f1b587bf7b18a566d63896c2bf605ee8e8d
SHA25613e03393c0c2f9524ae14a9cca2fc58a5162844061e1e64cd3866cdcffa6c2f2
SHA51278225f15f8ec38dcb5ec7b7c588565bc6150d02bebf6ead4814f51481c95ff807b4845a820c7b1e648fc884e76a54120000d3212d0dfa98889c37d1b46af2fb7
-
Filesize
1KB
MD59ee16a915bd827c9c9241fc87e675378
SHA1843c75225d635c816cb8e2c585a5485b522697a2
SHA2560e59491f3ee70108c159547951993e94f8beb23e60767d8206892942427e0a11
SHA51217c108229f66aa66b57a7f58249edd206f7eea34958ca5f58e29902bbc2e2f30d2cc382ac5986f2c6a43424bf86eddaa57f5ea1d713b853cd2b7d41d78d1082a
-
Filesize
528B
MD5d18c20b1768f93556c79f89a31a56b4b
SHA1cbffb7f87f41197df38adca90757b8c77a01f6c9
SHA256438afd8cae7f5dc75fdff0849523ca79ed1360a411349b3210442a0eeaef7567
SHA5129b2eb2c31b8dc3a151a9b42f9a335c79ccd17d9d34ba96e1d7ca119ac707129af856defd151389c4fbbf986b3952a34cab8dc058df54730d69b7f2b92177b4e4
-
Filesize
618B
MD5430f8129fdf28bde913f8699c1aeb396
SHA11d68bf2fc160e62637b9d6450f9367dbab59af4e
SHA256831f8ccc8834e532f8623c1a99cff9fc55037bcb902941a186a0df560cc82038
SHA512e677bf955cb2d6aa56b8ac9f03727f12ea6286683838f3f5414b0eeb5f40e9e95695a6522a3824af518c9895938889b585ba1a2d45881c3187a8d94303140537
-
Filesize
1KB
MD593014efaf60db7d39826c2ad5848d667
SHA1ad9d34bfd12dd13df4eccb5a1dd449a9be8aacf7
SHA2562da0bdfe9ef8ed2b8c5139fc7d4abacdd28cf048728ffc51709fb3a3ce48e389
SHA512a148e9c986e473a60a14365ffbb8aad1db08de0b8704f3e2c8702fc46b8b15e72cbf0288e903f802c470354281ca8eab9ce3ed7c878b78adccb30328f58ae54c
-
Filesize
1KB
MD59451777590c3b72b0337c2a41c7cbb65
SHA15ccbe8667cb238247f7e8b44f98089a835ec5e8e
SHA256908ee8ed3167f437e96617250f01abaf2c9f0492ccb7ac9dc3503c25abbb0fb2
SHA512aa185fb8b1ad88cccae43af1b994e441c50a8172ce8763292e9becbc07f6fcfa66d4e3166913ded381474547273ccc0ac5f2285f90821f7c7d5c41f571519da7
-
Filesize
1KB
MD5ef2b245e66d2a3cc25665e7f627e2601
SHA1c2b0e3d607582e4b4354395464f07a13b95e5b60
SHA2565a7c19716c12da40bfa2f0b71075c53a072be34edfe9037c5010ab90c738fe7c
SHA51211938e3cb7fa18e192a4f05da1b377bb2bbb61299542feb8e9528e4917b6793aba38f3f4075cd7c520fcdd3c9b505adbf84131d53e2685a2000b38ec7edeb1c8
-
Filesize
1KB
MD5a257f9fec9e392a6fcb8a3d93aa8a6fa
SHA1c29e4d850a9841b8397f2dbad1c6cd0f0f688f82
SHA2568c36177a8715695ed708daa5b21f7ce1c3d8b4cddee7f87292161d81e29c2be9
SHA51216757ce210b71dd9a652adf79101c2451af108a4d99b34858cf738b9eb1a21d37cca071378463f9254445fff0e7e918a27b06cedb7c6e9b0f6f97c25c7b06352
-
Filesize
1KB
MD527761998db09262a8e636bec2edf7651
SHA174ebd0ebc559244f2961f07af809e708d4815823
SHA256d6b91935ee57a7c9f4c58bea71c509835ca64eaa1709de2234ddd0285d52d2a6
SHA51241826a4c18b01628a7ffa48e5ba84b80a0eec84143d77f307c61d20dff5a8790ca97c8b0d3c23cafdc9d200406c67e50ac2303dd5c70cbf4715da32a739ef6b2
-
Filesize
1KB
MD54f190386fd63333ba049db8344433c61
SHA1cbfa8f864e733ace8edd0b26bc8462447da68d6e
SHA2561c4f93bf41ba04693a856dd21a92fe2a2bd9105d7c9540bfe77a1c155a445354
SHA512cfd5232f602637dc657955671f924ee8108d870815284f987b7b1224e115a294bb85d9b255754781979a4cf5b1d293bc67138e9d34cabccbc515b9b969dff2b7
-
Filesize
1KB
MD5728d37a8ff83c45a0dd84783992ed978
SHA101efc21698e6b8c27234d601af25e926a6ccaddc
SHA256dc2d0ef7f03f24d78ecd2e31d7a3cea224941f9808b0060edd4a46561859a12c
SHA5127a0aff34eb145104d76c28e92c15d761699fdeda001e3e83fca56bfda61765da40361b3b78d5e7f0735dc9da351d494db79a9f1ff478dbdba3433a53bbb88af4
-
Filesize
1KB
MD5525ba7c62d9a513049a54e462da5bedf
SHA1cba53f1be9cb70d385dcb5c44a12cb01b5a939bc
SHA256514af82ae2fa2c59877ee9377f5e94789300359a8627ecf7e58bce884634c5dc
SHA5121e6b9c1318045d99b085a0981be26b44b1a238178906c39792a8f458097ce18b28f3bce284601a049210aefc19e098f382dadaf0592b25f8a05812b12adf1a8d
-
Filesize
1KB
MD5f34f88a096cff95e6f59b897ae996b33
SHA11bd63933e0e6d3bcc5ade925fd0d65827791db07
SHA256e84ec7340a0cb2d6910704b3eb3243f321ec23f69916a555761a3df5602d04b6
SHA51221bc5041e34130eef053609ed1cea0a07294d5d54d7e2586cc4838de63d6be5ae1ba41a48774707c0b9b2e85bc5934c980cc3ec36df1d10fb66969086d2e6fc3
-
Filesize
265KB
MD5db4961bbb3c1cf487904b15ea5b5884b
SHA1d1c23d22e93d3f9b268f99519d38d010ff99ea6c
SHA256970ab5826883e15bd9ae33310dcfb00968a938eebbe7e8e1ba5c8b0c12cc5d12
SHA512191e365500a824c1b31eca9f82caecdc227471d09c1343390a2879bd9642cad1a57fe812eb0ab3f20b24941da763a24a76f5a4b0791af5600d283eae7f6cae7d