Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-04-2024 19:29
Behavioral task
behavioral1
Sample
c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe
-
Size
84KB
-
MD5
c0c65cac5312c91afcf3584eed526e11
-
SHA1
111ba012b20aa42e4372c8cf1adce900c5865cdb
-
SHA256
66c51a47aada5d1164dc1039e0d03e5f493ab7fbb53cf9ddcc861124109b6d7d
-
SHA512
3b15633011e4ae36ce5b8f4ef62158361e39c808e656d61d8bc76f53ee793dcf093477804030cca99790dc997b2974095deb76b9851613e3a03e5e14202a9353
-
SSDEEP
384:GTe/Or4vMy/xTe/Or4vMy/xTe/Or4vMy/bY:ae2qle2qle2qE
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls exc.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt exc.exe File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys exc.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll exc.exe File created C:\WINDOWS\SysWOW64\wintrust.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 exc.exe -
resource yara_rule behavioral1/memory/2188-1-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x000b000000012257-7.dat upx behavioral1/memory/2340-10-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0001000000003e7f-21.dat upx behavioral1/files/0x000500000000559d-45.dat upx behavioral1/files/0x0001000000003e98-41.dat upx behavioral1/files/0x00010000000054f7-39.dat upx behavioral1/files/0x000100000000e6f4-35.dat upx behavioral1/files/0x0001000000003e93-33.dat upx behavioral1/files/0x0001000000003e90-31.dat upx behavioral1/files/0x000100000000e664-29.dat upx behavioral1/files/0x0001000000003e8c-27.dat upx behavioral1/files/0x0001000000003e8a-25.dat upx behavioral1/files/0x0001000000003e88-23.dat upx behavioral1/files/0x0001000000006220-63.dat upx behavioral1/files/0x0001000000006237-67.dat upx behavioral1/files/0x000100000000928e-70.dat upx behavioral1/files/0x00020000000057fe-80.dat upx behavioral1/files/0x0002000000005800-87.dat upx behavioral1/files/0x000200000000580e-100.dat upx behavioral1/files/0x0002000000005808-98.dat upx behavioral1/files/0x0002000000005807-96.dat upx behavioral1/files/0x0002000000005805-94.dat upx behavioral1/files/0x0002000000005804-92.dat upx behavioral1/files/0x0002000000005801-90.dat upx behavioral1/files/0x000200000000580f-102.dat upx behavioral1/files/0x00040000000056e9-107.dat upx behavioral1/files/0x0004000000005706-110.dat upx behavioral1/files/0x0004000000005707-114.dat upx behavioral1/files/0x0003000000005750-122.dat upx behavioral1/files/0x0004000000005709-118.dat upx behavioral1/files/0x0003000000005756-126.dat upx behavioral1/files/0x0003000000005757-130.dat upx behavioral1/files/0x000300000000575d-134.dat upx behavioral1/files/0x000300000000575e-138.dat upx behavioral1/files/0x000300000000576b-146.dat upx behavioral1/files/0x000300000000576a-142.dat upx behavioral1/files/0x00040000000059a2-154.dat upx behavioral1/files/0x00040000000059a8-158.dat upx behavioral1/files/0x0002000000005a1a-162.dat upx behavioral1/files/0x0002000000005a1b-166.dat upx behavioral1/files/0x0002000000005a21-170.dat upx behavioral1/files/0x0002000000005a22-174.dat upx behavioral1/files/0x0002000000005a28-178.dat upx behavioral1/files/0x0002000000005a29-182.dat upx behavioral1/files/0x0002000000005a2f-190.dat upx behavioral1/files/0x0002000000005a36-194.dat upx behavioral1/files/0x0002000000005a37-198.dat upx behavioral1/files/0x0003000000008ad6-210.dat upx behavioral1/files/0x0003000000008ad8-214.dat upx behavioral1/files/0x0002000000008adb-226.dat upx behavioral1/files/0x0002000000008add-234.dat upx behavioral1/files/0x0002000000008ade-238.dat upx behavioral1/files/0x0002000000008ae0-246.dat upx behavioral1/files/0x0002000000008adf-242.dat upx behavioral1/files/0x0002000000005815-250.dat upx behavioral1/files/0x0003000000005772-258.dat upx behavioral1/files/0x0002000000005816-254.dat upx behavioral1/files/0x0002000000008adc-230.dat upx behavioral1/files/0x0003000000008ada-222.dat upx behavioral1/files/0x0003000000008ad9-218.dat upx behavioral1/files/0x0003000000008ab3-206.dat upx behavioral1/files/0x000300000000851b-202.dat upx behavioral1/files/0x0002000000005a2e-186.dat upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\sqlcese30.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\mycomput.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\secur32.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\QSVRMGMT.DLL c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\tsbyuv.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\NlsLexicons002a.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\print.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msexch40.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\pngfilt.dll exc.exe File created C:\WINDOWS\SysWOW64\dbnmpntw.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\modemui.dll exc.exe File created C:\WINDOWS\SysWOW64\sysprint.sep c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\CPFilters.dll exc.exe File created C:\WINDOWS\SysWOW64\eapp3hst.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\PkgMgr.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\dbgeng.dll exc.exe File created C:\WINDOWS\SysWOW64\iasnap.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\wavemsp.dll exc.exe File created C:\WINDOWS\SysWOW64\xwizard.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\hhctrl.ocx exc.exe File created C:\WINDOWS\SysWOW64\NlsData0027.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\fde.dll exc.exe File created C:\WINDOWS\SysWOW64\msident.dll exc.exe File created C:\WINDOWS\SysWOW64\RunLegacyCPLElevated.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\cabinet.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\dnscmmc.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\mstscax.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\regsvr32.exe exc.exe File created C:\WINDOWS\SysWOW64\remotesp.tsp exc.exe File created C:\WINDOWS\SysWOW64\TSpkg.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\wermgr.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\WsmTxt.xsl exc.exe File created C:\WINDOWS\SysWOW64\bthudtask.exe exc.exe File created C:\WINDOWS\SysWOW64\Mpeg2Data.ax c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\KBDINUK2.DLL exc.exe File created C:\WINDOWS\SysWOW64\KBDIULAT.DLL exc.exe File created C:\WINDOWS\SysWOW64\osuninst.dll exc.exe File created C:\WINDOWS\SysWOW64\AuthFWGP.dll exc.exe File created C:\WINDOWS\SysWOW64\DxpTaskSync.dll exc.exe File created C:\WINDOWS\SysWOW64\kernel32.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\NapiNSP.dll exc.exe File created C:\WINDOWS\SysWOW64\rdpd3d.dll exc.exe File created C:\WINDOWS\SysWOW64\certcli.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\hidphone.tsp c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\pid.dll exc.exe File created C:\WINDOWS\SysWOW64\rrinstaller.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\sas.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\KBDFA.DLL c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\negoexts.dll exc.exe File created C:\WINDOWS\SysWOW64\kbdgeoer.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\C_857.NLS c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\infocardcpl.cpl c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\notepad.exe exc.exe File created C:\WINDOWS\SysWOW64\apds.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\KBDMLT48.DLL exc.exe File opened for modification C:\WINDOWS\SysWOW64\msvcp120_clr0400.dll exc.exe File created C:\WINDOWS\SysWOW64\NlsData0045.dll exc.exe File created C:\WINDOWS\SysWOW64\INETRES.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msimsg.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msdxm.tlb c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\hbaapi.dll exc.exe File created C:\WINDOWS\SysWOW64\NlsLexicons000c.dll exc.exe File created C:\WINDOWS\SysWOW64\SMBHelperClass.dll exc.exe File created C:\WINDOWS\SysWOW64\activeds.dll exc.exe -
Drops file in Windows directory 52 IoCs
description ioc Process File created C:\WINDOWS\fveupdate.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\twain.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\twain_32.dll c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\hh.exe exc.exe File opened for modification C:\WINDOWS\setuperr.log exc.exe File opened for modification C:\WINDOWS\DtcInstall.log c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\splwow64.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\fveupdate.exe exc.exe File opened for modification C:\WINDOWS\PFRO.log exc.exe File opened for modification C:\WINDOWS\Ultimate.xml c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\twunk_16.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\twunk_16.exe exc.exe File created C:\WINDOWS\winhlp32.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\HelpPane.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\Starter.xml exc.exe File created C:\WINDOWS\splwow64.exe exc.exe File opened for modification C:\WINDOWS\system.ini exc.exe File opened for modification C:\WINDOWS\TSSysprep.log exc.exe File opened for modification C:\WINDOWS\win.ini exc.exe File opened for modification C:\WINDOWS\Starter.xml c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\bfsvc.exe exc.exe File opened for modification C:\WINDOWS\DtcInstall.log exc.exe File created C:\WINDOWS\twunk_32.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\msdfmap.ini c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\explorer.exe exc.exe File opened for modification C:\WINDOWS\setupact.log exc.exe File created C:\WINDOWS\twain.dll exc.exe File created C:\WINDOWS\winhlp32.exe exc.exe File created C:\WINDOWS\WMSysPr9.prx c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\hh.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\mib.bin c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\PFRO.log c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\setupact.log c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\win.ini c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\msdfmap.ini exc.exe File opened for modification C:\WINDOWS\WindowsUpdate.log exc.exe File created C:\WINDOWS\bfsvc.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\twain_32.dll exc.exe File opened for modification C:\WINDOWS\Ultimate.xml exc.exe File created C:\WINDOWS\WMSysPr9.prx exc.exe File created C:\WINDOWS\HelpPane.exe exc.exe File created C:\WINDOWS\write.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\write.exe exc.exe File created C:\WINDOWS\explorer.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\setuperr.log c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\system.ini c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\mib.bin exc.exe File opened for modification C:\WINDOWS\WindowsUpdate.log c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\notepad.exe c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File opened for modification C:\WINDOWS\TSSysprep.log c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe File created C:\WINDOWS\notepad.exe exc.exe File created C:\WINDOWS\twunk_32.exe exc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "255" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "233" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "255" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C3E319C1-F2B9-11EE-A34E-5E73522EB9B5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "8" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "255" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "233" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "233" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "418420884" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "251" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0ac629cc686da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "251" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000008067c0718053bb84c6df3cee1b27fb4ef09822994d4bd9b9a873c007fde4ca9e000000000e8000000002000020000000b0d150efd6c214fb3764b35f5fd2e403fe68df69e195267eeb3b77e78b02d836200000006667365a1fbb760ac7c12a5e32d0c0f0e5fc7da7029cf5199a2bf1b1274bb3e9400000003eebbd59bdde5ac815877422d80613722133473be26fef48265d9930e41161715097fcfb0cfa315e7454a87b433c26ebbb512476481afcecb90668b7e70c86f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "233" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "255" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "100" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1060 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 1060 IEXPLORE.EXE Token: 33 1492 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 1492 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2496 iexplore.exe 1496 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1496 iexplore.exe 1496 iexplore.exe 2496 iexplore.exe 2496 iexplore.exe 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 1492 IEXPLORE.EXE 1492 IEXPLORE.EXE 1060 IEXPLORE.EXE 1060 IEXPLORE.EXE 2224 IEXPLORE.EXE 2224 IEXPLORE.EXE 1840 IEXPLORE.EXE 1840 IEXPLORE.EXE 1840 IEXPLORE.EXE 1840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2340 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2340 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2340 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2340 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 28 PID 2188 wrote to memory of 2496 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 31 PID 2188 wrote to memory of 2496 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 31 PID 2188 wrote to memory of 2496 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 31 PID 2188 wrote to memory of 2496 2188 c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe 31 PID 2340 wrote to memory of 1496 2340 exc.exe 32 PID 2340 wrote to memory of 1496 2340 exc.exe 32 PID 2340 wrote to memory of 1496 2340 exc.exe 32 PID 2340 wrote to memory of 1496 2340 exc.exe 32 PID 1496 wrote to memory of 1492 1496 iexplore.exe 34 PID 1496 wrote to memory of 1492 1496 iexplore.exe 34 PID 1496 wrote to memory of 1492 1496 iexplore.exe 34 PID 1496 wrote to memory of 1492 1496 iexplore.exe 34 PID 2496 wrote to memory of 1060 2496 iexplore.exe 35 PID 2496 wrote to memory of 1060 2496 iexplore.exe 35 PID 2496 wrote to memory of 1060 2496 iexplore.exe 35 PID 2496 wrote to memory of 1060 2496 iexplore.exe 35 PID 2496 wrote to memory of 2224 2496 iexplore.exe 37 PID 2496 wrote to memory of 2224 2496 iexplore.exe 37 PID 2496 wrote to memory of 2224 2496 iexplore.exe 37 PID 2496 wrote to memory of 2224 2496 iexplore.exe 37 PID 2496 wrote to memory of 1840 2496 iexplore.exe 38 PID 2496 wrote to memory of 1840 2496 iexplore.exe 38 PID 2496 wrote to memory of 1840 2496 iexplore.exe 38 PID 2496 wrote to memory of 1840 2496 iexplore.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c0c65cac5312c91afcf3584eed526e11_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\exc.exe"C:\exc.exe"2⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:603159 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:1389582 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD557a88c8d541d9d3388b3d4b597339a1f
SHA1567aaf6c11ece58e66a1739d22a0c4a16a0ac7f3
SHA256a2b5612660f54f50a183ab45bd8865224c702ba8ab122287a60a7e66350a6a57
SHA512144f3f08ce2c22cb365f990c21ca0043be0738ca8509859a524f6661d15e1429d3f6ea2b3b10691a8daa4ef73e780200e54e05cb055c64a7485cf9286b39d0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554391e3b6c453ef076179373799f6d4b
SHA17d07ddf8261cdd42c9e569d81882c5e2c8ffbff4
SHA256ad399566d196bd6658e103a563fa1bde3a6cb544cd010642b7a6d5a0d443da96
SHA51279dac8ea41c72130e3f8073b8bbfc39edba150d2aeccaf7d41f4fdfc927706fa848c8350090e8ce61c6145ac98183d9f4fb9333bf0231e672c00455b17409919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556eb06491ea74971c39dabdc14f8c102
SHA179a0000d02fc957dcbdf29dae5f4ed5915209cce
SHA2560d502df6eba358400f18f7631c28035ffb412a64fb4eb66a61038c82bbc713e1
SHA512e2e38cbeee2f591bb5aa7e97806a02b7f75890159a1c50f69eb9309288d48f6a6f730d476127f9236a62c4094a9dfccb743f050c03b6c71abbb04418108b202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fe4633b7a7acdddd098689914b02eaf
SHA1c6db4dddfd03304fefd2270f20611b6f19b9a3be
SHA25641dad4f4c0ef13f757d39276648888389a570f48664a20e9e97fd8bf93a6ffc2
SHA5125d98bea442babd39b522a621500b1c9a6251d81a27e4d49b87de11f3ea2a5097d1911d69458a6429017aa73fe33d247caadbb9dbe1749a31237bb871359e8e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cfd76d725d98cd36aafa0c9af3be7a3
SHA151385e0786de6c0210be7549bc89ac6649cdb09f
SHA2560110652498f898dea2bbdd07ad00a1e4d5bfa489d05b59c0f4546086fb300895
SHA512d734d406214f9f151a4bcbbb2d1a1a1fbabaff16e6194b2545f0ef361435f202b14283e697cbef967fca0f45cb3c30c8134ff7ef65f2896815e0f4894747f674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59bd0be7c33ade1e7eae09e9b74dbf168
SHA1b668300aa85c951f7ffee117830cfbf03329b689
SHA25671492498e48c8b9877486265ace7b4db521431c95914e52b67328888b719fdeb
SHA51220c73647a49648b46c5a25bb98e72b36b18b9187a33baaf51999458da99cb4159f396432832fde8bbf0f7cc68466c2e4a1c9d734f9354f763ee155b9a697e15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5658b8550fc1971e47cb141e8ea95b20d
SHA1582f064b6cbe18936d43a283f9835095a3058fc2
SHA2563640211644da83ed90ecdb70917ac04c07797afd97f60df70ccb014677e0a191
SHA51203dc1aa1a497164484b6ee179e8eb79c5a4b0a2f8bc1dc42d70f3109490a7f6c0737415a4e77b09e6d0766d404f515936efbee9a117c4208a8b154500dfd1f1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543f68d0d6dcc32cbfed3e36ed583ec8c
SHA1483cac4793cdbe3bd8952b5cfcc06e262d725e08
SHA256c7c195e3e9d5ef92ea9b2284610a13ef97aabdcf27fdc799eaa487aac9e7ec0c
SHA5122a22d3ac3c429aa376ccb4726227b4ff8f1000ad8c95fbdf2893c09839567506dc61fbca5f9560e6ec3901ef2df169a89f1466271b64d9a9871981eccb4ac3d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ac834221744d22475ed36d3144a80f3
SHA10f22841e4bdc116ec78711c61638759cb63e7cc6
SHA256fc979921dbdcf2fc9a771fb59a3ef5abcf094249a8814098b82334a0a8c7006c
SHA5124a4c68c4b2a0c56476a04d624d2c34b249b77d8513d0824a1db9f1157763927dc754a495e8aed3e401532f89f784643ceb5344d9f008d99cb2995d73eba8794c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5704ffd63d80206e4ca8d8a84be258424
SHA1f425dfdc4d1f5d346673b215deda134411fb64c9
SHA25697068e9d6d1fd33757189bd46dd2e3ab9cd963112576ef4e31f48aaab15b7a9c
SHA512aab42deb778de900eda34fded14221533a0fef0573da031c4ef239c8df305dbc80fc00f9a345be427ee75ebb41e04b24f9587fdb6e0f076ed51c1a474d24d13d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c09cb5f5224dd3f546315e7efc7076f8
SHA182626b8558d77247ccc9604f7c3fb50f4718b1d9
SHA256085d6d51705b8d676e9f6971baaa223edb9e4b9ecb9befe52f50d1061326ba4e
SHA5128126e40f3960baed0e1fda7a34539cfc2f098e388a77d6e532bb8689e3b40724badd448bf8a9704556d5ae3952e461d640ea81ccc66ba00c700bb4fef87467d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8348586b76607af838b8759656963d3
SHA12f16e4a12635021801607837af6624cca3e12e89
SHA25634ddd529ac35a308a4cf20937b5ad765185e4a362fd97dd5a6394b03e1cfaa5a
SHA5127cfc78ce077a2367b1534122b23e45af289389845fb5100275b20e221775eef3e9bdb539a75a86007a674bc2798630ec9d0de009eec03cf1d883084c5d204903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b947ba8cc5a8f7e6f7d504ade2ec520
SHA163d934e81210425372d3c59a288b6ea7529a5ea1
SHA256660cda0bc8f85fa3d3c4c319cf5fe244acbe213a936e7a05f7a909d96ab5274c
SHA512adfdd07fb020da8aa2db538b72be0181fdd0b021fc310c815eeb0a37bfc96a7ebcd3375e146165e5b8533c83c150cffc4dd39bf8311767f42a4f72fcecb2fc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5135bbf3c2dc468b828c692fbdcf567a0
SHA180faae000a6eb3e2059ffccee84e35fa8d55d233
SHA2561d9c886ddc509457cc1d321b4d9811ed8bb6264366fe152878ac890829568dcd
SHA512e4ceb77de2b4eac5b77adf99e33352e06e48742dd0635a731a9aefc9492a4a484ab2e62747226628289186a360a9357064dbb851c831e8b01bab151b8e5b7601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522009d3b4e186896591bba6e4583c643
SHA1cd1d22b981c7bb69957b21e3b9ac3432d0707a7b
SHA2569c77f04847b1415b2c7a702e8a0698d87d449a9ef0880fbbe7b56ef790340aeb
SHA512353ebf9ff88d95081266476fc57a6aadd527c6169c1b08faaffe00415255e61815f3fdd03e0e41c3b664de1234e16ee8ee90a2edc859833104c4820328126a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d1651ff0bf7a4e74b36e3a544d6cab
SHA113f5e6d6cbc05910c360f3ae645b558c73107387
SHA256a31413c7678057bc198b5d63be90bf03c7b5ea96d6af5d4559824a04b0400bd6
SHA5124eecb584eebbd31812d6f2c5d4b94ceefcda6edbcf415cb32e1d2793753415c2084c5cf452d359012f9536fb0d190ef751ce967806106e683a57affc48efb8ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53aefe4b4057cc515ad4159c9e353f04c
SHA13b7fa47ba6c9cd5aa74a6a0f7507cd094d688694
SHA256dd8315797d025909f02e57df4d714237888316f6c312c860abbd657785706b5c
SHA51273cc883aee8a94fb5243321bcfc16e3dd32a23c91752f201df24eeaadb43823859597ae1710a0ad1367dc3ca09fc9b1732d69b497f357b45e96dcb1d3cc123fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540e378c460656206c08b59ea262930d1
SHA1b256ad05099b874c1f5c73c4a8789bbd67faa93e
SHA2563bd85d07e61a9f6f0fd88b787adbd943e89291a1f65cc25c4628af4c28914f28
SHA512d7a48015a66a5229956d6d6e3f8a2b04bdc7c28240384bdcded7a7ad9d22c0ca561c178dab5d60da24e4238793ad2c9f25a6d83cb1d4969efec040fff8722af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e58bb7bca1583a12ef9f8ed98d1494cf
SHA15c0a7b6930d547bc1482d1b318fbb540aad21929
SHA2563c8d4d3f9ab0445dc30e75c2b7976b5ce6421bef60a846fe2ce9cb4008881ffc
SHA512db73dd22d9ff29ade9d1a14a46a34b80b06ea2f414e8f5c35402300c4f36922068a7a8bf445caf549a2c4201c6b32f7f50e0d40169b73092e96d10755a56273b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fdb700a28b6f7b9abd43e11e8797986
SHA1e49cfae0ed96b2e337ac8d24c6cce9afa0b7e081
SHA2567b3e9ba602c6121fc580a7235c0be64c7a59b685cf57e3f4239ca6477ec6e966
SHA5121f2411e6c1b754b7f07532f2d63a584a233b9de45c6d4c89db92c6b1b1df5ab41eb6a66d30d792a845d169aee82560b1226a8609a43aa6b59bc9ba9ee58d2bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c9820c92a7de788d37f32fecb3aee6ff
SHA18c8c76b3ddb61afc159932d52077c262cd531c3d
SHA256709c6a49be7ba8529ef92247526586aac86f2717374a68d16821ffc9fa24f568
SHA5124a6dbb1fa9c04bd8c27eafebfaa99e9e92a6e1b31a8ed3c940b0bf089a4b345e8f99327fac185885c8421989e1934a62db5ec68070db136e7b0543924ca27666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5773544e661eb2dc6dd6f05b54a0953b4
SHA13a5a46d659aa59992f4e728295c252b298bd0f77
SHA256f7800ff5979f409af12a39e4b86cba761ad444365f2fde7a93b0ece8594268ce
SHA5129968b2893cc5827f83fea2742befdb068fc1efd11997b65bf2f322b1f645d837f9ade2b24b479c0dd9787291b6ba73adf6920985c44cb5eacaef1bc66cc2f186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD583e0cf947e4f86c7ae3ab8ca07d12dd5
SHA12126d80c62eb6e2f5406fd8ff2c83afac97d637d
SHA256aee063e0b39768300709d36e1d0e4cd0fb530d9544e605299c232d6057518217
SHA512b1340857b6483f70b5a1f98854c25095c7e750d278e1413c926644fd2101482992b13a694a29383fe71c78eac7c9c6face5acdc840107092cbbfdbeea739777c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1ef68e78272cb51a018554eeb396aad
SHA1dbf7724e2a19385891660d6da0d31443ee05cea2
SHA2568e53c012f205a72809786af5de91efbec9bd8beae09e6cd9decbee6182ec660c
SHA51240434a53b1e643c96a05dbf805d7ed41e1506bcbff1b892d9df1394649a2d5380712ea039c4621d5036df44e613734402b84a325684ea4be9586e2c19fbb61a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce82d37f4e3b22393118f881060ee958
SHA1b82dc32ac77bc3c18e14c008f2b292c6a5f5ba5c
SHA256b5f0b52778a04cdadafbbd908023abb59c61f8ce44203ad85b8b8e3d57a878fe
SHA51259654c367ef996b9cacabedb2b685a61f71b7a3cb7f62c3ee70569588f47017e6d247e201ca1a42c36fd7d3b19374c4f1954a7976a7e77a06576618bb39e557b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD532fbddbb9a1303c74db1d1714fcc5112
SHA13fa5d2c6f41a7f8a254985b36477796012fa3b14
SHA25650380981e7ab39cc2dd9aba052db5f63dc6c5be93263c5a30d27d0a5e7869184
SHA51260bc17fbd1a0854c7a99126f14a8a8a722d4b8008f5d589bc483d75b9acfc6a7bf958e04667a551ec59fcc27765c6fb726eac6cba9cf1fec389e2cc650a395ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d83c37656180b415299ba30634f27c77
SHA1f3895fc82dfd310e5fd5250631f549b6dc254641
SHA2566a37ed74914d412fbd901cdcadf098d19da1d48c10e0f2b934ec9c4655d8e9ba
SHA512bfee884f10964f08d8dff4230bde5d46426939fb5dac042ef5e8a58a528899d795c48d62327844589ef24085055d922e33335cfca406c537da8c8824c21830e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e5b988a807a87754f5852254a77b994
SHA1806398d8dde87e07273b93032a8a28c97aef9ca8
SHA2561c1ff9223a6d9dc942f1736660508e6dc5570a308780eb75cd30ce3683151126
SHA512fd2dda452fbb424b51c7a3a5ad8ec6257c89c0dcc2cc3555f85edb1e40983bb76ca95d45ef57526ee77e9c59471558d1c7d099ffa157b8f6bd904eb831cfb3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5899df183ea1831c2df51c78292efd90b
SHA134f4f68102f227d9cb7db5ad5f6ab3609cdc4145
SHA2567ff7f78cf87ebf4d0c57cb528b3a30122cc0c3bd85e300fb795e18bbdd7adcd7
SHA512a1cb20635110b3a265fd4fd13c067d4b4818c1c360b7add03956ff9e472e26f2ff946f66be230bb96faaa4896b517a58880800582574a58b47b32cdca3a254b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Filesize252B
MD5712e4487640723bee75daeed2a8deb6a
SHA143163968fc7c3a4d7d7a61a78d5415a945582f93
SHA2561f8a044b0d4a3f8c40c08b014ef3f849ad8f77b8bd050495402302653508f486
SHA512938a590858739a0b950cf9abf3e8356a0c13f823dcd9576f9d846ec835138f3364f6e5f15287d0d510d41d86ad51361233d5ede491e56515071dd314708f887f
-
Filesize
224B
MD5736bc1ac22ee68c63d94bd963c7b8396
SHA1300bffbb20c0d561949571503e2b3ff3866bdde1
SHA2568d28589d54c8cef904c1eea0e25ff82815e2432a2891dcf3f4db1c04314a6331
SHA512a428fd4931d0b382dc71c171acf00ac007e2d66004f863fb7c87043d5c253d67141503835e7ed3aa5f240fb48e58e0f32821285b8139076b2bab23801e7ef6b3
-
Filesize
437B
MD547cbd5aba531be41c63deaba34e87695
SHA188955a2f30e70a0900ab6ab480ec0c9fa3e25187
SHA25661e406f2308ee9bfb648148761bfa7b30c66c779e8f22a7a1c71668c92daff4f
SHA51259b7202ecbc4e151349b874230194e2339c0fb113c8edff985c157b686a0f65097766f727d399f0c107b78cade53b5736c70e5e967d0c44a1b22e7600cf0d625
-
Filesize
437B
MD5c9401621162161967f3ab65abece3271
SHA1b0dc5698855e911819e2a613803612aab6f51ec1
SHA256f77160cf71eefa3bb8ad2e1ee9be7b60d3845e597d1179bc7e5c7e154e98d9bc
SHA512570fb578ae80775841e2735619c7bd99ecf1c253c321a6deec4a36816bf313a3f38751ed7327439ffa0b84012efee6061fac749b845add0014273f06abf007b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\OtAutoBlock[1].js
Filesize5KB
MD5d20dd37c0551ffb1ddbf07bb14eb8673
SHA1ef2d7f3f351d4f066b9b114e45ddd1fff86e9da9
SHA2562dac11b6349b6fbbefe783a2cea3f35e8a9f2bd7e88a786874c0928700a9ac70
SHA5125504c2067982eb19c8e4aa929171d3b4d2dd88eb059fa4716b83f81e72fa67e445868a6c4715276c4289c931ba9366cec4f839cfdd4990c4caba76f16628b6f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\components-all.min[2].css
Filesize197KB
MD502d116bce543e6bb4fd3834eb5e3ea3f
SHA184923d89ba1f7743cc10a3f80afdcfd845de5295
SHA2563f858e488c447a1120d57c6b4ec77b74d35a142ad89ee7570a53b63cf7d4d89c
SHA5122e222c3ffd723f3df119cb1cf525207481d10059a723b7d2a3ebb126f49964565c06d4f8591b9617f6a166b2cc84fd160d1a93630426b72695c163447d66ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\jquery.min[1].js
Filesize87KB
MD512b69d0ae6c6f0c42942ae6da2896e84
SHA1d2cc8d43ce1c854b1172e42b1209502ad563db83
SHA2566150a35c0f486c46cadf0e230e2aa159c7c23ecfbb5611b64ee3f25fcbff341f
SHA512a55f55d56899ab440ef0cae17b28d5cc8f5b9766d1e9bc1a8ac6b89376924b476c1ab0c325497eb5d44af41f4ebf8eea236d87a36902244b8a3eca54994b8711
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\one-trust.min[1].css
Filesize51KB
MD539ad837e1a331dcf6654116073a3ee0d
SHA105e7811d2bd3ccdfd5bc1ebdf063c86cbd1a4e0a
SHA2567a905ec7808e96434796bb7c6876f39c05f4ba72b2c54cb27e9e87a7fbe7127a
SHA51232555fc33526c8e0aee77575cf25694ae81358cfe2105720adbf96f8f9283ef1d113a1781709d2123e61518baf3cd0a8eca4dcb43a193b2b13dc119b13f470db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\ouibounce_min[1].js
Filesize1KB
MD50067986dd93b7869e9dd229ff44251ac
SHA13e89404238b959ac1d3c113b21cde64ac95ad267
SHA256b74c3b8c5f786bcc4aa29f55ca0b178a0e2b5fcc6da3057a121bececc1b572ea
SHA512dd84f6d85c350145b8237c30ee644e53195e5ff5a11d8d6e87a65b58be5b472a8335cf1413c5107f8a2d4e272ab69cd711e49ad82b77699ffc8298d572ccfd2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\9F3DH-WHDX9-7CG66-F4G3J-99FEC[2].js
Filesize140KB
MD5b1290dfc24cf0fa7fc8086f1b9dd99a3
SHA19e3ff4c4b46853c46fb8f6bfa46939b92b1bcbb4
SHA256b38b56cc66465707f7a28c32aaa60859276bf30d268eb6d3a90a02bfb6d74ba2
SHA512f3fad1e09005557fa72fc402fd3024c15350a5c30a3532989253cd4e9d1523719b7c7c6a5ee673a2b86b61519c7e3e73febfad60527f9774f59ea60feb7288b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\all.min[1].js
Filesize178KB
MD5973473fbac1c0e0cd82cf83bccb7247c
SHA1f4cae9ffba8d2ad240555ef9716aaf33f391fa22
SHA256b1a2c56a4fae2771514476846f64219f23ba473ae10cd0accd1203c9ccec6e22
SHA5127b1660a2c6185be9e6bd7bf186b54ec53e278f5cd7c0f6d94ee42d75cc3aa3031fa610a362f2dd2f640b79a2dc9fa03737f6bff64d1ef8c96d010de5c511250b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\avira_targeting[1].js
Filesize13KB
MD53ce6674fa9a054e053700e5da7dc7f55
SHA148cbb4f34a190e35c5fb5435806de0d84f9014b0
SHA25620c2afd6d70dcbc78e9995631dd355ae1bb8499e6f6f8ffbfd916f5287ee862e
SHA5125a8049f78819c58cc38db5175eec815895a2d4b403dec2238d09832de962799b793ba5a4a02eedc661dfb7cae5fab3ea9baaedc09a6d8973340334f02a13fc6d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\avira-global-website.min[2].css
Filesize624KB
MD51b90822ba21625b02f9e17b3124d01dd
SHA19aa240d86b39e2ebc6263bccf2325674b1f488f5
SHA256093ba3cb28fd20ce50083ccaa5bff704098fbaf3c3dc8fdfa128c8f23ab37807
SHA512ebd4a5cf91fdcbb3a35cc0ad2ac99e4917d3bb9b290ac64df6999eb5e3827aa22a450b6d095bf3f10e649bd1cc83fcf00dbdda66e79181c5b39b18570184138e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\gtm[1].js
Filesize443KB
MD5aeb4ac4e445b3ba0a01c46fa0b8e35a9
SHA197354754c5628fb3e89d81f2ee769f39571e7e7d
SHA256b9d05502c9079a125bffe27156c4c0587c7781832418ac24aa430cba62764519
SHA512887f13626541427badf5d2c8fc1289e2d43bfb067ab10987b2791c0cee7d2fff110a94b40589002a15448e1fa9dca5e30251988fe05a5a78d226ba289326756f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\gtm[2].js
Filesize273KB
MD5e2f0f2f4b56ed4b1bfdb86025aab2334
SHA180559fc443644a4135a11b6244b53236f00f152b
SHA256e1869e4d2e181a5aecd6aeb8ad0756fbdd488250a7f076953770ae456f2f087e
SHA512b63b2a42db789dd0555ba011d1251cbe7a0fcf11f6d58670c1cb66f7cb76be3f7b22425d33132387ba313354e3a04a7830d2da2f133324558ebb0ed5f3f84450
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\otBannerSdk[2].js
Filesize421KB
MD565d6272013fd813bcb3bb059c3611dad
SHA1f3d451ec0b826d15f1d7dd7b6f3f56f9d5fddc4b
SHA256ee39d0cbc9e9cd88b7dac8ebca680b89e8879081f855152f21772c7834474437
SHA512b800d2bb9d3100ef9baa8f095e5f574ee665414664ced3f9e334725ac155a419dbbde7f242b21e8868038dbd9e9f1eb4ae9dec39b3c39f98a234cf9c22cab400
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\analytics[2].js
Filesize51KB
MD5575b5480531da4d14e7453e2016fe0bc
SHA1e5c5f3134fe29e60b591c87ea85951f0aea36ee1
SHA256de36e50194320a7d3ef1ace9bd34a875a8bd458b253c061979dd628e9bf49afd
SHA512174e48f4fb2a7e7a0be1e16564f9ed2d0bbcc8b4af18cb89ad49cf42b1c3894c8f8e29ce673bc5d9bc8552f88d1d47294ee0e216402566a3f446f04aca24857a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\favicon-32x32[1].png
Filesize1KB
MD513e4a579c3cfa586f665ecd794e0462c
SHA1b629b7170f76734c495630191e665b6a88024268
SHA256a961b4999fbb3ea58527df10b36cfd5c6ac7cf9fd12a0ecede32a8f7f48fec30
SHA512813d424cb854ecda3bd1cb73e87af2e1072364e5e6345e2a7ff0c93cdac34628146786f1f5fbfa869b95d72ff0071414af13c4453545e76b3f627c1343cbdc8a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\mhubc[1].js
Filesize273KB
MD5c436ccc5fc28846756cd94d090a8b888
SHA17756397394305a448e1adfec410c44495a86d81c
SHA2569c9633f1908dd656be409e0bb6cc653cfef76c499a4d82cc18695a2b25c3294f
SHA512e9639151fcd726f678bf95e8a127f6b5175277737399037c4b9c2c0f0520e53c5ae80959bda43784d6cff0be46a99764556b32cf60b9e07d7693bdb4be3e42ff
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\otSDKStub[1].js
Filesize20KB
MD5371fe1fde25dc853add509f5d9fe57ac
SHA1b6219c34246fa4a3f1f35c64bbd708dc04c463ca
SHA25692e4588c227a58321a728574129e52ec244df30b90fc9a64a30ee65410104c41
SHA512e48b8fb6fdf40b1d4dd4bc82dc5f516161844a3daa31dbe1826c84bf3c5ef3687a746189a765e8753f603918d5c683df56fea3166ef004a4c2eb4da8185180a0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
57KB
MD51c6c3290d2a74d5a694065e3fb36470f
SHA199754498695f8ce8c97b7ac5f5404855145f5d42
SHA256a7b1d252f4683c0ebf603096fe4cf00ef30bd2f046b1597abc0cbb4262d57f35
SHA512b865ce3bea100ea22d50b97be8b5b483d10181537f27ef530f81dc39158a2151848c5c23f2c8667a729aa0d9a1429b036b12b9355c98c71b38a4f64445e82100
-
Filesize
60KB
MD5b112da00b23863d0aa49cac9a3b2e4ca
SHA1456f3c63b42ad91d17acd534b66b7bfbeaa453f8
SHA25698ab09edbbc6e08297fd601732f7254bfe7ca87bc44dc877632f803f5db2eebe
SHA51211e5faad2e1071e9e0d3854b2e96f22a8d2fecd0de689d43d8a2e9ceda93cab5da99f626af67634e9c768eb073b17eb9066c20a7bcd13622b1151be3985330a6
-
Filesize
102KB
MD5d13f91abc2289b9a461d8f992d8fe9a5
SHA1137a658dfa89d70955da938671acdc0d85766a99
SHA25643bf26c7502d8b1c8eb94833ce098fefb085fb84fbf5729ec763a02076028acc
SHA51277109cc2e3e7af3b3ef874383cf8b05e45d876ebc89893a15c84fe1a6f3bf4ea2a2cdc04127b49328d4a6ac285414df3791aac8ecfc46c30d847f0786b43b31a
-
Filesize
11.4MB
MD51ea764b9e8a4bef0836a3e983b824346
SHA19a41482f36ec40178ad86f45c9312d776e49df1c
SHA256882408cacba50daf1af1bd73b5605a9cd1a5ced90554879e2dc4f798d08171f5
SHA512c00e737b86d9dec1a2879541db68a2334a96283a20324c6ef05aaa2a2596d833a314c7a8f1503167f8267a59555b56bd10be1b5599f6b6c602ea1c7139008b60
-
Filesize
141KB
MD5bb03e619ac0c30b35b992a264386f5db
SHA1b010b221cad484f36e0938a8f884713ccaa90b75
SHA256b0fd01bce84a292add9e73656b0c26b02ca80c2c608e0f310bb4c30eba4cfe67
SHA5127a563f7aa7c7c7e398553c2030af7b19a6e62cbc8b45e347c01a8916e11d5954de3f2e80f66d73fc959575220aed2718dd60d9927e730e5a9bad0151d00c2c2f
-
Filesize
55KB
MD5562ba67d8d1207af9d0cbc840cff8379
SHA17c10158011354d2cf7b15da03e4d37976d91dc5e
SHA256271f294839fba92f0e09b680c7bfec3c12def5b623f883adc2f6210fb714b80f
SHA512a3858d8f57c46eb0462be898691013d37bd2f7a401ef7478a96c1743682a103357b7db8e4778a63fe8c5e0dc5b9baa2669ccc57ce7698bb2f7cf2fadde648413
-
Filesize
90KB
MD543f89174df48471cd7650e75b9277555
SHA118054ae3c46096446c4a9db56584c5fcb76c4282
SHA256c546d7d6c1583e780adc5039f3557bb4c256133b7e7f67cb00d46b37f42818bd
SHA51206de1f3355a76ce7680c9c5c6411ad6cc2d4e6b0bbb88b61780ce69380d045b1cfad9dfa72532a61bc8ba0a10c606bc5b094d9a4eef301a11b17b27a6c35cf6e
-
Filesize
109KB
MD511f6ea39a332ce370f1a1d1c6d384566
SHA168f5b17091850c8b5df3e068e34cea10fcb902a5
SHA2560debe7242023d414a8e08d197a990e5ac2aedcc9f33e25c86a14ba637356b74e
SHA512265b79d3b174b232dfb9d329a61e69d3ae310743d600ecd1d31ab17c7eff69a77104848ae8c3f05ab19c0d23c9af73c19a5228c409a8df6ad91cfd41fd7d3f2b
-
Filesize
117KB
MD5e9913f6cfe571619ff480e9cc06e75d1
SHA1f4f8d430deb0a9438cef49683b367f32c5da3681
SHA256f608371cee101e8bc2c6a53507b5564c04e1b526841f80f259c828b14b83e2ca
SHA5124b49e48d54727049a202b6343993715f8b3128d7ccf58c38c374fd1d39759887d25d19e9399c361f3468e24f110b75e11bcde10e38ba2c33743dadab9a820699
-
Filesize
118KB
MD5590ae9328373eb927385fe3662b30b49
SHA166d44a92efcf3706cc7763ad7b4af16816ec0e07
SHA25620fea607021ebc3a5ded2858a6556b0e993c94cea9a1dc0cfa0b34a4a82c94f8
SHA5126cb9d81be6137a537171b67c65e86271faf1c490b5e935a0e896213ad652d90a76588ea17399587dc309cc0a0bf9782075aa51a5d6a3084edf7721046e453b7a
-
Filesize
116KB
MD5e8496ce1bd5ada5e5fb08d9152a69e29
SHA16d3c56916c84259605ca110444647f93fb7dec5c
SHA256fbb11e0655011297392db8aed477cd77c8c060ddfb8ac4d079fde1b5347e31e5
SHA5123d30de8d769d993c6cc1250814586db405a6282705348e57e053bf0117415492f17d4702c8908ca89306cb72a94b96138e3e62cc0f839f8e0e9ad52f6e016ea2
-
Filesize
98KB
MD573f96b388b96cd7af8853ed0f5e15c6c
SHA161ee878bd7f04de92fdfe1f2e542cf9bab168882
SHA256eb8442f8e3de772f5737245de969adb88307c39968329e8ead08e55da9e1ee84
SHA5125bfb472276ef4b172df63f2b741bf3e29d367e9c4f951febe8309b38850c334ed4f82aa610a31b7cf5d23ea9a5946cc94fe4c035b9a163830cbac42fc7631eaf
-
Filesize
97KB
MD5fe50fdb02308c67d3df12c3e4b21d46e
SHA17e3618094c0ea46999b17dbafbb5f5efd39f1541
SHA25653f6182430c17db2f4651948d3541a70572f0f4961e2aa4f8f0494e5a6fd2bad
SHA5125a557dc057acea79f0d82dd9f30a7b0e2272064dd9fd684a5bac76ec939a3153ad4a79ce95bcf07f4e3ae5aa893c842a32aa6026bdd068347b5042f423a6f05f
-
Filesize
114KB
MD56c550b4d22d00d628b45942f47479b60
SHA17764238375d0d5e52812947364208a416d845d7b
SHA2564eb0e2d9dbb92269a022511505c0ba3280e2bf0286fa3495920657b1a0fa9b5f
SHA5122caa5b701a841e4fa6e7a545f295354557a953a10a844a860f4f0776cdd8bde553b971bd98460ed50e0984ad3050796caa6ae5f10b0a7605279ab9adf33a2ff6
-
Filesize
4.2MB
MD51eba975bae434b3855492ca82162ea14
SHA112c99d5dcb035c366e493f0c07f34f42787e6737
SHA25660c6f11e1a3af8629aacc000e5d4b9a71dcf9324c1542e8e7813d7692d90ebb9
SHA51265e9a483aaaa3715517352a1372773f49c79e105b5a92fd11cf22dc01f5dd1c1089edc15db0a772080bfecc217a8ac8b87aa7268d69c18cf832d77633b28d5f2
-
Filesize
4.2MB
MD5b1c97d09307249c7ff713a119ceb4e5e
SHA1a265d1f1d7399a967c8c05f28a7942f713b47cde
SHA256f952bdbb46784c2ec32f360d5380bf55bb2f61e514ba86d6d1727a7cf04ff4d3
SHA512e8d2d4641c596103c383ef4e25b37e7a473ebaa7984c898dd4f3a41755d96ed9fbfd9c6d03528c98c7c9dd4869c09a2141590f0c28f30a9cb5dc09e328b02dd8
-
Filesize
100KB
MD52ee81b03d327afd0f98db74a6b8b4120
SHA17c79362215cd99c6dd571146556dc0bc1b8cf1bc
SHA2560497472af4128969a6f1acaab6d5e9d4508f53d85764777ce744c285f03804c8
SHA5122fa425eadd48b1b601dec2a0b2e9f26949889f32b45e10a963bcc029b452c51edde02a90bc55b32498b7c556a8faec9ec2e5c694ee5e733a18ab1f6b56d3aa1d
-
Filesize
72KB
MD5d89c350e472ab1a56a03109d0b377e0a
SHA11a5d0e234f402b5bbc111f6989edae07a7a90ba6
SHA256aa8c84d88a0056419e6a0454dd4e197dd7b1fa16a4f3230a2ea6c05bd88ca5f6
SHA512f23ab3cbf4cdb11ea7bd9cf07bdabba2127cffaee402ec2e0207edf53783c0c2e9dc351faef468ccb0d9bb1848e7e5b70bbcd266f4bc931bc8893ac29f83a7c5
-
Filesize
100KB
MD5590b9eabf9ad6ffb70999a28a5329d84
SHA172fb5baa38b141f4860ed7bad24f5edd20578211
SHA2560e2de1f4170984fbf8a50eecdab151795b7186db9e21a63c14612b3ff8126b57
SHA5121086a04ba656520ad19a40665740d0eebafc357f9233b545b0bc8b41a162c7d37fd1e00442c154ac3485dfe06d5fa3d04e62500bb210119e0885a4125e45a407
-
Filesize
91KB
MD52211af736905e42f93fb3a2408a9f85f
SHA18023551b60cd01d7dbac13a88209f50fee0a4e01
SHA2565f57b353e3b33bcdf84b0ee5327d1f0bbbfa20425f78608da91b5d40b8265c15
SHA5123d5adeaf1845dcbb04586d375ca22d2ac1312eefa807c5d5c96c2d341f081640fc1746b3b0d102ebbad3ed2bdc7b3bfa39a1b587ba433f122db638f2a1ddc886
-
Filesize
99KB
MD590657d38862ec97c7bccf508f9310703
SHA179405d37bb30cbb855cf6f9662724e31955df703
SHA2566b2b2409e3843e3f774c098ecb00558b3f6f90068db93c9af877b41dcf23ec24
SHA512b458de7c30ee1c0e942f4669ce81dfcb818fe09d4cc69362e05a705613ca2bd0f41ad0dfb4e107901c38ea4c25266699466aed95725331ea6fefa173daf5d096
-
Filesize
100KB
MD5a12e0c2aaa676e2f20541638eaeba8d7
SHA19a0a196035cd59902aef2072e9e8ee325545d76b
SHA25627da26b015fa2585410a6e66e7be008b8317cc20bf27933cf0aab15f472405c2
SHA51288dd7976db20f043077df8941c688c9f7783b043e88cf73be1d15b06bfda5610eaea06dbe34b599d6d5756de1a9c41a60d770e0ab055cca3705503334a9d8121
-
Filesize
98KB
MD5c892a13c8792cda1a0b7d1f491f1efb7
SHA1e6ecdd54c2c5b9a1d1a34919dabe026cec83af7b
SHA256bcb9f581fc4ad357016575ca41ce041d07f6d0b56800933744904347e57c8085
SHA512ed774acc5d06f33d0f2912ecddab6b6029837f6e83facde0b60f76989604f6e9665949879bf77e1d4c1f78ffc16a6a9662108376fabd82cf732f2dae7e156734
-
Filesize
80KB
MD5293467770429a0517b6cf6f875bbe808
SHA13a580dbd618dd64f7ec163a6342ede46a01e565f
SHA256f09e27ecd0a72ca4804863a4f23c8078cb7770373ce0fa5d22056976028259bc
SHA5129b67302baabbaa8c2e4308f9c8b9b747802ef6284687c6651e5d82bbe2b37c4dc175b1a80dea859e2074067a80c16969914e8dd4f81a8baee009b3607ed43944
-
Filesize
79KB
MD5f609d640073be0216125fd61d295b020
SHA1fc8c13f1ec22fc0654e801dc7ee6812281bd3dc7
SHA256bf1b5dfa1fc91e16f6e5924b7543c14d6f2ea4ce50ee77b2bce1d4cb2c10f525
SHA51252bbb2d80772ef7d0cf37d14d8d7391989b0fa3fbb84985b9d00f346ff10d65f58d9747f4052acffbdd724e26f48fef0a5e393c9873158990a13df8c739db1bb
-
Filesize
96KB
MD52e18cb97c5c57cc0f396af32ef6060fe
SHA12cfe7dfbd717825b212cb88411b4c4e18b7b2dbb
SHA2566f418d865d1cccf84dcd825c6149018b1bdf5146c06376c3af43ca162d217d5d
SHA51232ca7c8b79e5c5e105208783106558d6632420d9cd9e8434829736bb4cd81f4f68a7c5f56fc14486375ec61cc88a8b01fd6d5f58b15fa1f32848c01fad177140
-
Filesize
4.3MB
MD5254bf4db929271725c68ba1b13d7046e
SHA19012eb919497e8abe674fc1cdef30e973320f5fd
SHA2563f7dcf26741556029185daf9f227960e9bbf216745c63dc3e5de519ab5ace0de
SHA512c5e8b511e8329f2f351c51fdb43a3237f0410b4ca87a45aa918a46d32f7011c26ab1a2e76265b898c105f8501f5dd3db7d08ddf917b5e246e63997f6253d4b8d
-
Filesize
4.2MB
MD5e977c7030db46a719fcd6d12e795fb54
SHA112f00b391bd741944348c9d63c457a3e1dffa16f
SHA2562e3305c3021bee2e606b4c50ff57f924d47017b54be7494f112de9636b4b5967
SHA5121ee273477063e834190d6013a59fdd009d60c7fd0794ded24805752358da89dac3b7cc903b716b5509bc360ce746ce18fd1fe294707a771fe73c5df0595428d8
-
Filesize
72KB
MD59d54fdd95e5a4eeff2c2563bb662f0d4
SHA140073d91acbc392a004ff0b096279a398936c6cd
SHA2561a72aaa5372dd6e99f06b011d452e496c0685dbc02a9d28b811fe96cb3e84136
SHA512b53eb306ae77066cf80de7678f18e903dcd42afa4c885ec670faf966a3b1e81a17ad044a261cdae979a98373b11da9920cb9bd91e7d828d2800a85d84295c9c5
-
Filesize
72KB
MD55dae94c306a3627709271ad6d6279ed0
SHA1840efb6051f85bf2077390bef65206c1d4967984
SHA256037c38e519581d64fd445e6169bea515452ee732c8f1cd26d708e81bde18f3b6
SHA512a8ffb06ca36d2de17134652f61b6774647abca32821f94b8b976d833b083e96426649ee02e56d44f073a2bbde504d7a65de82fe4bf7801980d6b59bcb6307b06
-
Filesize
100KB
MD5d96f1d38f63c1c254ba95895d47840f8
SHA1ab9e0767c922496009273148277158909ff471f7
SHA2561b4296b5ed912a216ef6a07e32b7c154502b069da743546e719a861e90422702
SHA512dc0d7a3ca36fcb71163d05f9beff6453b3b0e980abec933693096b0458e35127386e4d85780283f6cc7a24cfe35ba23d21ef9f5b31f50f21f141d635d397689c
-
Filesize
91KB
MD5b6419436314dba311d516e671d02e595
SHA110bc9d6cc28a6dd0e3898da843239ba7c5bace8b
SHA256294de426165950e965004269cec811321cac1ee9e969eff02957310c151be571
SHA5122cf5bd9f9be56ec1c041ef2d529239a6689093c3417144ed3f25cf72254261b7df69f8a7d7256bb69fea46934a9245acf5813bca5267272d34d1606f2b1e8128
-
Filesize
99KB
MD5c9e2ef41ff4c2c4b22729f1a613d8897
SHA1269204a77620f0ac68ec4a2983f2c7edba19a54b
SHA2562e6f4f80dc4f6dc104f765f9f72cb49c847903c6c5e6162c36ab40846883d19e
SHA512b84a73121d7f24faff20de883c899e860f360a62699ea1e4db738fa21854233297f4cea2bb05bbd5901660adedf047093592458ebba99e20138d0a6dce2d7bb2
-
Filesize
100KB
MD5e5150baab16d13dd565d66719232faf6
SHA1ac28651db35483e324df1dd71f6d42b43df15dcf
SHA25666e06107151a23d0e0bdabdb1a398dd873618a2e0df578513d571f9691263ccb
SHA512c076322e24aa9d3bc604404324e8eec7e2ae2333b95b9f8c2bfa050566ebe33968ffd444c98565ec1f8a8134266ce7da7ce9f5efdf366d7f690e2584b91335d8
-
Filesize
98KB
MD5f046d39cd44411ba65c0ba3038950525
SHA11bae0489f3f840ba4d9532087335146a23822754
SHA2568e4097be5782720ecb907d722bb4edf0082189fe64122889b6ec79681717699b
SHA512b1a8a4f01061eec8d4148108a3d9d8d81c66a7c704f4641410cc2784c2a961e895e6330297c8e9c5d20febc0411ae70e303dcbbf805932a320dc99e4aa597c66
-
Filesize
80KB
MD5d3c2c4d853527858d30acfaf9517d143
SHA16ba87c464ee8ede88320d0851943a68463ac26dc
SHA256172cdcd4bcc94f49a1dc97007b056790affe5d040fbe0db8563606011f808a95
SHA512da713c86d83c7d634da68516309e6d50a291ac6b8a20af18ab4006cfb5653dd91dd2995b4069c694409aec784d150b29fad7e83727f9f2ea9d50625a674fd8ad
-
Filesize
79KB
MD5cd970512de6850e1b5486a0d699cd087
SHA1f61aa5d896f70c184e18e4846f47a0ab75180081
SHA256267c532d452fa19da34aaf5156bacf7dc099f46d9bce66314b6bde3d51d60ac8
SHA512d00fbaafe3ebb0db8eba860fd3b217766a750d5f405f37be5afedea3d0ba24508bffdc6e6215f5f551fd3b3ab815211263f546e4c29ba72bc143d92b43027db6
-
Filesize
96KB
MD543bb0a257c2b5e91c43ef75452a32fdb
SHA153d998079b90c0e0d568fb6c74c2f9e6fe05597d
SHA256af524cff951d9cb0dfdcda9c8a3b33aac7275fece74b90f619b5a26e268d69dd
SHA512e0419a27472da438c702472750c07072bbdc737f8e042f33fa196c0af2a56e56ea43d2ba8ce54af11e6e61302d2eb491fb970f1acab70b5983e9601fd7859c21
-
Filesize
4.3MB
MD5aeb853ebd742c21b35959d97df1a3eb8
SHA180516248814b0f8223c3cc09b85b9f3fdef6748d
SHA256f80d066570807ebda4a9e8ebcbbdb1477fb7285282dcd5f707eb349388c340b7
SHA5129674dfbc0c60bf572fce013f9d94ca2f83a5b7f34d278405710d4b3cd77c84e66a26033aa2fb66738aaa2f962fe41e46fe4c7994eb0287d84c6f9ddbb9166695
-
Filesize
4.6MB
MD5c3d2e98a8313d65b9ec8c224231a7695
SHA1a441cbd9ce1061764ec5a84263eb270af57cf0f6
SHA256869e601ef349a917bc155e61876f5ab797416b19159961a2c698dfd4cc726024
SHA5126c44b03d4ccb76dd4bbb95c0f94eb99e8eb0ed0a3b76931e4de8aea6fb03ce3b86201bf7628a9db43c9228c0d5ace2cb89a9acbec62308cf4b947079fe0818a4
-
Filesize
66KB
MD50fc07fa69c2879ee320cd81ce700a2dd
SHA165e4e9627e651aa2b0e81d95622c0dd2f8b60526
SHA256a643f9b6f16295c4c5863e2dd28f4bbea5cc07a2cf8935283bba4c9bf07e76a0
SHA512ef823f56a6b88d161f3d67e15d233e6ec5c649bd64e20aef48c4599d344a889e558c7a1100d7c4ff66bd946efa954d1aac523a5c1a9fa1b6eaaaccde4bcfafd3
-
Filesize
66KB
MD55b671945b5bff76828b6f9f7ae7bd8e9
SHA1eb8fc54dc7f8531ec8c5dd891b7c5d62c78dec86
SHA2563db43b3e7e956ad710ab3c97ca93cccba46920518110f385f00aec4af22ccd02
SHA5120e56e0d99d74e1520646aeebd100b200bee0a6efb1ff625935392781ccd6efdce27d9a6356d2d92dfc3fcf53aea7a65b8ac0c3a3e5f815ee7847603f4e00dbc2
-
Filesize
94KB
MD5e00ad489708818968e406e54a4337a76
SHA1c2abf2a42ffc074a6016280b2f5680f86f954ef9
SHA25664dbfc18786c77c0efa1f3074c31ab21cdd3062f4d1891a165fb517d4e4591c0
SHA5121cecbf338f49757b37ceb58f7967a2e7f5d434784fd90e04eda58fd68e496d25cfb64dc7819589d8271f9563ef4e1f24e51aa6d99b380be7a1e5a64327277551
-
Filesize
85KB
MD5fc43b24fe324130d5962837a6579331c
SHA18c47941e2e16be6a74b0194f6e3ab4bff9684327
SHA256d0a99f13e5531fb5c30ea9166f622e73e0dae26b126e070b06682eabd0d25f35
SHA512b795d962fe33e7fab0ae1fd01b9b95c7cc549e9036d6968338da98658d0e4fad8cc5df42d9fc0f19b488d9620acef36f4217534ab55832679e01be68a94c0224
-
Filesize
93KB
MD563f28c2dce1215c9c8983920f968ad7d
SHA189d0de1d1ad83178b5dbd87e18c5052263322c7d
SHA256450201998dc47ab2ba62fc46518c18dae0f514da2c3daac4de4f0a5a50243be6
SHA512a928fd5ad6dff3dee9d25f085b218f7839fa18c5592d84b1ac3c47904da91622d6f18240bb72cc7bbc330ae1d45e8cb6a6db7572d30f06d51a8d48e31a18f5e2
-
Filesize
94KB
MD5403c7c9483eef9f402a5c189586fe6a9
SHA1af102a84708bea3a322db83677a28781e9543db7
SHA256d7a67cb45214c026bf7641ccc10907ada2c9418890bb986642d9c670beb5602d
SHA512a8421f853fb3c94ab1fba38bf209583f65482dd4876387ecd6e2aafbe305f16408fd63c58a2d8d7b9a78fa5588096795719543e107a99d69c4b4c0daff8b948e
-
Filesize
92KB
MD57c4cec3da15fd8c89f764added738daa
SHA102c954631a5120a22e73c9c6d76a5c312a5c2ef4
SHA2569a261d0ed39744e354e899e7b3052d791152b7225176bbee517019c9acc81970
SHA51299726697fd352d80a2f7b00b3fd71be21825a3397ab81a402ff96baa154dc063b7d689d22562021c0bfae0288fdd47e197c3d73ab1fae4a77d8270f29ae45f62
-
Filesize
74KB
MD55ec277c6985f231d4ec5dcddd8d213d6
SHA133c9f18ddd303859949fd1fac04ea8853b768a66
SHA256787bffa819417fecc23bb4a0159016b1858058fe7a90cf9e7f293f76855e1947
SHA51249c786bf6213671ea43c82248a178979e24b5a54ca11455b1638912494a980332e21d3d6c4d1f91de996fc37d72ffc371c7c8bb0a2db598e232b8a362b3d1274
-
Filesize
73KB
MD54a152957dcfe4576ff00e5c118a6c383
SHA16ae9b75db61a0c71fbf593c4ae78721933f3b5d8
SHA256fcd245e53522178d0d712efc93ac2024cd729165448d9e062881a93ca4e60dcb
SHA5129e03b2bcba468bd3fb2ac6e9c9cc974c170a13184f7fe5cfc4bccc6aaea05e86de24b97ce379bea7e4e6411b3857ec70c7a8f8ce54b4f27a1a58696b65ce7e6b
-
Filesize
90KB
MD566bce545ed47843c4d1b7ec2004f90eb
SHA14b74b2fc2c3a095a93097dc7d35446c2414f9d3c
SHA256bd9b5d4e935119a56bdb6a6dc27f2efd4ba2eb4f8f0c61be369ce852ac480808
SHA512fad7205f6383aa08dd1ac1190c26dafe53aaee0beca379da0da7c614fe28c6edba42606b70131655c84ae8781610f4161734928f9b430769717321d2fde06502
-
Filesize
4.7MB
MD5570d472a742a8c9743f95d08d806ebb6
SHA1ac8ab67a1013108a26c1cc3424701f82c247439e
SHA2569b8fc9a80381a700371032e1af6d59703c0c8a76b16a9dad106fc995adb5900e
SHA5124d04ab391d386964f0dc934bc28de86c58dff83d68b48563514e9e42f2677f5d410c14efc271c6602e6091daa5a63b544ffc0623e22e649b03db9d210e33c307
-
Filesize
107KB
MD55272c7cbe9e0c8badd7bdc9781f257c6
SHA1ba2bf69c546c1c524c9d95a79bd8b1f934ee1394
SHA256dc03492b1a4d5e9e3395cad56bb6aa4f7f16ba51e8f55585b311a8782bd71429
SHA5128845d8cfa22fcaf1166b07e6a1cb34206ac13fa6a849de0ea8c46d787e3643a1fd2878a961f8f9d408f2cff0befbc7420376d2b7b9e6c2d193e58acc761c77ab
-
Filesize
107KB
MD5ad733923d67052288246a74f41d39093
SHA1eade70b08cd243a14f0f234af04485c5b8ceeac0
SHA256d4dfe752731a31cf22ac60842aa34f07af2f155ae8dab6ec945be65eb2ff5c34
SHA512fbcab1fce2567880b084e4a96cea1d27af394684b790b73692e0a913bf785093c13f5063d2352cb8652d197ac465abf188e4b0696a7db3035e2d981381161ce4
-
Filesize
108KB
MD5929e019e460fb97cf0c40a3ab919545d
SHA123fa8243a3aa2a2e76365f2c06ee44af1fd6c9d8
SHA25627dbce6b4d0b825637c4edbb9c6e4501a93c74618c7f287e820b529b24675df2
SHA512078bbbe86b0514b880adce83f8ce25d16bc0a7709d4d3cc4ba5f06ae4d93a27b1398ce243819020b7ae22ae93a9460ec9637b1d4c401dd1acfd75bb467ba0dda
-
Filesize
56KB
MD5faba6a393000f3d75ce8dbb4208f4bcf
SHA1a607ca33a5ebff5ccbb35b7d72e824a591b37f58
SHA256ceb7c059afcc59e230923b7872f2611dffcef549c63de722751e1be527cacf4b
SHA5122dc4159e8b92cfe91b317b4bc559f68d10321e6eecb3b924eea7d8daa2f444c213295eb74a186f6e8ebe233c51b3705ff5927d9d66b65b9314d59605eabaee36
-
Filesize
105KB
MD546e21c18f143624d7f14d6ac7b2c7a21
SHA1cae3bb3151c6f01f30b4e7fd2d69302fa323e701
SHA256970d3ef536e40b9b49099ebf973b3a1499420d6bf57dd1de2091eb848a042c4e
SHA512f22c777dd16654a1a53cc068988e296fd0d5eb1ff5e695e18e372a58f04a6ed8a6a3e431a7d3b2972d3ae0b848cf9d742e9e93fa65d0a02624c27fa4f62e8442
-
Filesize
43KB
MD52f4936f24d7f7c9cecf9330ea2ea7bf8
SHA19072ee2330088bc837aefe42968e828388fa293f
SHA256e53d260b999bf103c95397a42c7634cefca47cef9e65fad549d3e8db762749c2
SHA512817d79592d930c0c42b3405c4cc8941a81851831311623cecaa15ad7e0ae6850fae1a3ac90c6b1704f3c1db50a3e6be82b507e931ce4181d80cce0c685275170
-
Filesize
56KB
MD571fe15a09bbbaf99af4414bba21b2377
SHA163ab26bf1034c8eb4d618378a24945ed7c9149d5
SHA256bbadfa1aceea11556816761576b199db760a8bd564d45ea491a0110090c1fafb
SHA512e08b97fa0375563be3b630d3b3da7810fc6c47ef1651ce14afeab0c6c4c9b3fac8c0e20280e565eba13bc06921bfaf03a4512a97e560ded716e1b1d4585bcdac
-
Filesize
76KB
MD5b01d0922407800c1db84ca5900a31a03
SHA1c7a8d12724abba1bdba6b74476df7ea823581229
SHA256de6edade04c1e549a77365c1a2a6cd1e8e3bb4fbb6986f5e0fabb4f0cb275625
SHA51216db660253de4fd141684010b06393e33cad1b9921c4d6f25abf9ef96bccd0582a67dd1811a24239a72b266ed4a6454e1a316ff1a7321e59f47f0bbf573c90a6
-
Filesize
55KB
MD55d60f154c22f37e1eb3b020d6c96094b
SHA117ce6e5c91b2948510d990858bddbd14c6f31d0d
SHA25689ba6f337ed56704c7e64ededf21c299d1e986088ae2400fe462049b43364db1
SHA51291ab258cbad63b4d166935af77e559208b8c775cad512546b6aee37c39e04e556b79aafa079386011926ddeff129e3d0586bc8937c0f10c5a6e885eb1f19da3a
-
Filesize
55KB
MD57aca8638e010f361554330bed9e78ab3
SHA163800ed245a9b7449c3f6c5fd857fb2aff053ed8
SHA256cd5bdcaf8cb2f0c999219f09965b79e843854dba759953af624b703202a09bf0
SHA51299f459a10dbe7a2bb7adc7d063f25f5830b57b7e9a573ffd4cae086cba9d307c8e4d2da10f53c31cb340fd7f4802eda6445c6f751f9a3e0ac1e1f0941fe6003c
-
Filesize
55KB
MD5ee71a2d37882603cf5a91d93d73adb1b
SHA18659f25747bd0d01690710b543f0d79150399b1e
SHA2569a34188478c56db6073860bebeb167e7e06c057ea73819fb3bcb0ff4071d2a67
SHA512ff4356c9a5bc57b90e18545eaaa72594d88c0e0fca153cf55dba7e209455cfe34e66ee46f4750659d3654f9f8ac93354fd2aec82d7f84fedf2be0488a4b42c35
-
Filesize
56KB
MD53d81f174fb95d6d7fd483034fbe3d881
SHA178b8420d10c96ae3a702ef6ddb88ceee7aabe646
SHA2565d6bf876d0f04ab2c68151890dff1b7bb78c742827cc57f01aed75b5a4b82b1d
SHA5127221cfe013400df4c4dd4f3a4326fa41517085f02ccdaeb95d8875dbca94b4423f64029e943439f4ebf57ccb01370c4d7984565cbe0c3d94115abd647efcf06a