Analysis
-
max time kernel
105s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe
-
Size
552KB
-
MD5
8ae64b49a952fec033b96ddaec67c758
-
SHA1
f4ed25b418ca629458983e5a2cd39cb2a4c0127f
-
SHA256
e1d262bfde931ad80626616d1795467b2e624ed209b7282eff094b2c6183aa2f
-
SHA512
aaaaf385694e96b2bff8aaa434974b0fb09f2abf93cb72cd0309188821d2d0e62bfeae14b95ca57f623d1b6d32fafa080c9ad955a2c3bfeb27085363405b5572
-
SSDEEP
12288:h1OgLdaOXgbJuMmFcouJqkXWctn+MEfOr:h1OYdaOXgJHJJqkXtMOr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\Control Panel\International\Geo\Nation JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe -
Loads dropped DLL 2 IoCs
pid Process 748 regsvr32.exe 748 regsvr32.exe -
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ifokgpmppbbjekpnbbdphkeblgbbbefb\1.5\manifest.json regsvr32.exe -
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\ = "saufe Saive" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\NoExplorer = "1" regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\APPROVEDEXTENSIONSMIGRATION\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C} regsvr32.exe Key deleted \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration regsvr32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ = "ILocalStorage" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\ = "saufe Saive" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\save.1.5\CLSID\ = "{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\save\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\ProgID\ = "safe save.1.5" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32\ = "C:\\ProgramData\\saufe Saive\\Hvi4XwdPu.tlb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR\ = "C:\\ProgramData\\saufe Saive" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\safe regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\save\CLSID\ = "{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\save.safe regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\save.1.5\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\VersionIndependentProgID\ = "safe save" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ = "IIEPluginMain" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\save.1.5\ = "saufe Saive" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\save\CurVer\ = "safe save.1.5" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\ = "IEPluginLib" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\save regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\save.1.5 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\InprocServer32\ = "C:\\ProgramData\\saufe Saive\\Hvi4XwdPu.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\save\ = "saufe Saive" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\save\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C66F0B7A-BD67-4982-AF71-C6CA6E7F016F}\TypeLib\ = "{E2343056-CC08-46AC-B898-BFC7ACF4E755}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}\ProxyStubClsid32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C}\ProgID regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E5B709DE-EE91-BB03-79D6-B3EF06B1FC1C} regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 748 4448 JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe 86 PID 4448 wrote to memory of 748 4448 JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe 86 PID 4448 wrote to memory of 748 4448 JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8ae64b49a952fec033b96ddaec67c758.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /n /s /i:"" 1d0TPDAh3.dll2⤵
- Loads dropped DLL
- Drops Chrome extension
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD541b13b132cb601ecc466654b90296353
SHA1245258ddccb48826f22d57444f49fa30be1b36fd
SHA2567fa4bb68c313e1090587a64b90e87bdcbc14ea3fb7c0e8cff94c657c969b70bf
SHA5120e8de7bbe3695848e299fe3f3506f2e982a60cf0a0dd11cde86de4af67ef3c7b46458680d7bad9cedaa266ea33cb2e77f2aa83fcf1bdd20bf31d1936f2bd69a6
-
Filesize
180KB
MD50e093772550eb9541dd715c016b5584a
SHA120338dc859a5652f5661280dc508f4e5b533e76d
SHA256028999304f35f7a6fc2cf6e360d4ea587612d63ce191fa979cc98ccca46ab149
SHA5120030b395e2fde6bc9f70f52e71d8e87d306cff8afd2acbad725c4cc92b6d7916a38c1d6d156feaec841966492d32394982ef51989e2b8673d7c00e103f744dd5
-
Filesize
2KB
MD548e9706fe9f76731f3576122fc3e9e33
SHA1387c8c4898ead8ace488a7df80fead429eaf167b
SHA2567bad79916803a14ca817e5c39f5ec2f0f240044d6dc24fb4916c8fda338060f1
SHA512e9b44a2b1b7a806066182a084ec9df81916fc6db79710256e173377e7cd64a732c006830bbe324a9a734731ecde8b8251cfa995399f6d4df5322faff99c458b6
-
C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\Preferences.C__Users_Admin_AppData_Local_Google_Chrome_User Data_Default_Preferences
Filesize11KB
MD561a4cd94d5357f334613b12de580e30d
SHA1272845b80275c631e9cfc428cc1c70bffb96e5e9
SHA2567fd44acb7bd166a59d8d437d62ce98f1fbf852527550c1af453cf1673cb29d5f
SHA5127e4cdc7d99e0d413a43ce5e3366d13ca3e3dab9ec368be5c32a286240e42845e6d8ab42ed04dee091899c42243279b4dc899da9082308cf7e5663e448996758a
-
C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\bootstrap.js
Filesize2KB
MD594c017eb47e93cbeb939277c0847af0a
SHA1bd5daa91a26c20b7106b027fa5f9882d9e87de1f
SHA256098c8b5f35404266ec44ce18c8904d65a46cf6f93e69ee12b2ab54abbdf95a25
SHA5122521f6ecac23fd80b023eacc1d52c28966cebc661fd22dcfa371c91f792388154f503c3d96f9c26399e14e05accd182902b5354938da7ec9e1bd12c2f3d753f8
-
C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\chrome.manifest
Filesize112B
MD5c2cd2da659accf9cebc7849b1b6d3926
SHA165b357c366f0f1fb74d7da47b700e794d00a7a2c
SHA256b5c08a57b44519221b3967655193308ff4a2e85b9eb79abaf4d22c175637661d
SHA512c4c2eab3b2c047a408ec21ccb540a687f3c35c1767783819e9c09d375db160502f934bf4788d63d12ea2c40032c4329fbadf793a783a6e4a9ca802160c2de995
-
C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\content\bg.js
Filesize9KB
MD54cfe86b752a6991c8b1a9c8ed92cdf29
SHA1e0efeacbfbad7f12315bc6614b4f880044a2acb0
SHA256e53f9487e425f082de2e9711fe15c000f6cbc18df3d3ea7e2d47ebc9eb09de9f
SHA512a98d1b6daac5b0696ad8a9037905c21aaa77c8a7523311950b304ac144f1c33d90b162257318eba8481f026808ab24eefb084cca81872152757769e0c3d0682a
-
C:\Users\Admin\AppData\Local\Temp\7zS86E3.tmp\[email protected]\install.rdf
Filesize601B
MD58d5e3ad927349c0ae0e3b6928b3ac105
SHA1d61b9b6964d8ae8fa4c403d6a09b2df4582a3cf3
SHA25673157a6207d487aeff58bb8c3a81dca572c70ffbcce7be848720ff52fc716954
SHA512831b348a51a248303d6dcb5764c8b68cfa253cfac98dd95bd5c9819aea59a75577110d68ac0b6103376ac71f348b7c70a4a3d2bca832a5b11e51d26f969034ed
-
Filesize
147B
MD5367d10fc734aa1d1c8be65c1d90cc29d
SHA13fbd7f9e95c35bcec0256c20afe63cd874cd3f2f
SHA2569d50b0b88510f0b94ab1b8f57afbc7b3833845bb0308a6bc08fed2ade806b00a
SHA51219cd2c65677a616722fbd597f6a721b169f0e641e2d9414ca4515ef65ccb8e779b3cea5c0cef535fa9a9198fcf6e51776197c1bb61c16c999e3a20f7cb926e14
-
Filesize
197B
MD55f9891607f65f433b0690bae7088b2c1
SHA1b4edb7579dca34dcd00bca5d2c13cbc5c8fac0de
SHA256fb01e87250ac9985ed08d97f2f99937a52998ea9faebdc88e4071d6517e1ea6b
SHA51276018b39e4b62ff9ea92709d12b0255f33e8402dfc649ed403382eebc22fb37c347c403534a7792e6b5de0ed0a5d97a09b69f0ffc39031cb0d4c7d79e9440c7c
-
Filesize
559B
MD5209b7ae0b6d8c3f9687c979d03b08089
SHA16449f8bff917115eef4e7488fae61942a869200f
SHA256e3cf0049af8b9f6cb4f0223ccb8438f4b0c75863684c944450015868a0c45704
SHA5121b38d5509283ef25de550b43ef2535dee1a13eff12ad5093f513165a47eec631bcc993242e2ce640f36c61974431ae2555bd6e2a97aba91eb689b7cd4bf25a25
-
Filesize
504B
MD5ca71531077282b00569dede16f36fc7d
SHA11c782cba630980c2d247331b86bd9d9662c1ef21
SHA256e19315d36bdccc7ea298f9f8a1a25280508ce83c97107e9ed4dc8f810ff3f055
SHA51240321822025a6d9cf417a122a1f98bba759f74b90c7375d3a8429a8834e512e480f1a52dbb73bb94be9dd7dc6531f928dd0089067c20415fbebb90fbc4c81d27
-
Filesize
1KB
MD519d9684712c2c32dad0cb0de705fe399
SHA1b103b059868a90c40e446480e018cc9669a241e5
SHA256f896780383ea967bbaf40a8207599fe4ca990281422e142893a13b3580e97fd9
SHA512c80994fc2328d1ec3035d436ff0a86cb775a728b92959a618f466ee7477d4bd4d70d92865ed43684458d3068244bf71dc04aed9f63ac4d15764e11e38aead928
-
Filesize
5KB
MD50ca03e606cc327f3bec79e3f6a360d76
SHA1da75c61fa81270f3b0095f55825107bb9694fa1b
SHA2563707a8bd30cddc9c605cae4a32875cab4a646268218c0737e2c92f8ace88d2d2
SHA512c35890558fb18b9791ce5a9024159e617caad8b0981e8e0417fa2fbd223c5010a4a600a7b2f01472d2d294ec8ea67d30e484ed99db08930b7160463c4e8ed533
-
Filesize
7KB
MD5b0272d3546b36901aa1c0424980ab290
SHA154acc7f7110909664bdc4982dc467d59f9b7e9fb
SHA25632e0c52155963ebd02447a4f7077b2359fac4eb49fdb4f01c3a6abd5d4537be4
SHA512e375683d46a0a816f76482381c1a80d0b92e4f367b6a7109e9b93d07039bd16493459baea342471183bd752659cc32fdbf643ab933a2ae952e6f8c37eced3de5