Analysis
-
max time kernel
107s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 08:42
Static task
static1
Behavioral task
behavioral1
Sample
e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe
-
Size
293KB
-
MD5
e05acea94e72eacc59d3180543957e5c
-
SHA1
633393001e83b72785fce0aebbe1f3290b26c27a
-
SHA256
9303d30aa5e5468492f198074da31f39485f03d09c0e958199c2eb78ec4d9a47
-
SHA512
e870dc844740e660da6329ee2b598003621fe7bec9227f49c88b697536a0e1ff4b35de125190672fcdbe9f7fdc3afa48b325149376283e2a45887841ff66f118
-
SSDEEP
6144:Ll0eMClIYaiZk9H3/r7q4egW1iKR4sR1mvNcJ92NgmDz5br1vIHzG:h/DlIYYrpSnR4sbmvNxgm5brVIHzG
Malware Config
Extracted
C:\$Recycle.Bin\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Detects Zeppelin payload 11 IoCs
resource yara_rule behavioral2/memory/3388-4-0x0000000001E80000-0x0000000001EBE000-memory.dmp family_zeppelin behavioral2/files/0x000c00000002314f-9.dat family_zeppelin behavioral2/memory/4172-48-0x0000000000A30000-0x0000000000B71000-memory.dmp family_zeppelin behavioral2/memory/3536-58-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin behavioral2/memory/4512-79-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin behavioral2/memory/3536-3853-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin behavioral2/memory/4332-10158-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin behavioral2/memory/4332-14826-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin behavioral2/memory/4332-23276-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin behavioral2/memory/4332-26588-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin behavioral2/memory/3536-26609-0x00000000007A0000-0x00000000008E1000-memory.dmp family_zeppelin -
Zeppelin Ransomware
Ransomware-as-a-service (RaaS) written in Delphi and first seen in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (6056) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation pay.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe -
Executes dropped EXE 4 IoCs
pid Process 4172 pay.exe 3536 svchost.exe 4332 svchost.exe 4512 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\svchost.exe\" -start" pay.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\I: svchost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 iplogger.org 33 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 geoiptool.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\Confirmation2x.png svchost.exe File created C:\Program Files\dotnet\host\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN107.XML svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8en.dub svchost.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.scale-200.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\resources.0cb63346.pri svchost.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\fi-fi\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Redact_R_RHP.aapp svchost.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[email protected] svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\[email protected] svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\AppxSignature.p7x svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\EnsoUI\id_arrow.png svchost.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\iadata\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\WideTile.scale-200.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\sendforsignature.svg svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\[email protected] svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\nb-no\ui-strings.js svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\[email protected] svchost.exe File created C:\Program Files\VideoLAN\VLC\plugins\d3d9\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\Classic\Pyramid.Medium.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookMedTile.scale-125.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-40_altform-unplated.png svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ppd.xrm-ms svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[email protected] svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\[email protected] svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\vlc.mo svchost.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\Fonts\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-ul-oob.xrm-ms svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\TimeAppService.winmd svchost.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarLargeTile.scale-125.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\apple-touch-icon-114x114-precomposed.png.@payransom500.854-21B-6B8 svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\it-it\ui-strings.js svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\nl-nl\[email protected] svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\en-il\[email protected] svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Slipstream.xml svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[email protected] svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[email protected] svchost.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\FetchingMail.scale-125.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\organize.svg svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\[email protected] svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\playstore.png svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[email protected] svchost.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Yahoo-Dark.scale-400.png svchost.exe File created C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\[email protected] svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\[email protected] svchost.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\da-dk\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Violet II.xml svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\QUAD\THMBNAIL.PNG svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\MedTile.scale-100.png svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsStoreLogo.scale-125.png svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\[email protected] svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\[email protected] svchost.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\[email protected] svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\hu-HU\View3d\3DViewerProductDescription-universal.xml svchost.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\resources\strings\LocalizedStrings_da.json svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nb-no\ui-strings.js svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\Microsoft.WindowsDesktop.App.runtimeconfig.json svchost.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_2019.904.1644.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File created C:\Program Files (x86)\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4172 pay.exe Token: SeDebugPrivilege 4172 pay.exe Token: SeIncreaseQuotaPrivilege 2992 WMIC.exe Token: SeSecurityPrivilege 2992 WMIC.exe Token: SeTakeOwnershipPrivilege 2992 WMIC.exe Token: SeLoadDriverPrivilege 2992 WMIC.exe Token: SeSystemProfilePrivilege 2992 WMIC.exe Token: SeSystemtimePrivilege 2992 WMIC.exe Token: SeProfSingleProcessPrivilege 2992 WMIC.exe Token: SeIncBasePriorityPrivilege 2992 WMIC.exe Token: SeCreatePagefilePrivilege 2992 WMIC.exe Token: SeBackupPrivilege 2992 WMIC.exe Token: SeRestorePrivilege 2992 WMIC.exe Token: SeShutdownPrivilege 2992 WMIC.exe Token: SeDebugPrivilege 2992 WMIC.exe Token: SeSystemEnvironmentPrivilege 2992 WMIC.exe Token: SeRemoteShutdownPrivilege 2992 WMIC.exe Token: SeUndockPrivilege 2992 WMIC.exe Token: SeManageVolumePrivilege 2992 WMIC.exe Token: 33 2992 WMIC.exe Token: 34 2992 WMIC.exe Token: 35 2992 WMIC.exe Token: 36 2992 WMIC.exe Token: SeIncreaseQuotaPrivilege 4356 WMIC.exe Token: SeSecurityPrivilege 4356 WMIC.exe Token: SeTakeOwnershipPrivilege 4356 WMIC.exe Token: SeLoadDriverPrivilege 4356 WMIC.exe Token: SeSystemProfilePrivilege 4356 WMIC.exe Token: SeSystemtimePrivilege 4356 WMIC.exe Token: SeProfSingleProcessPrivilege 4356 WMIC.exe Token: SeIncBasePriorityPrivilege 4356 WMIC.exe Token: SeCreatePagefilePrivilege 4356 WMIC.exe Token: SeBackupPrivilege 4356 WMIC.exe Token: SeRestorePrivilege 4356 WMIC.exe Token: SeShutdownPrivilege 4356 WMIC.exe Token: SeDebugPrivilege 4356 WMIC.exe Token: SeSystemEnvironmentPrivilege 4356 WMIC.exe Token: SeRemoteShutdownPrivilege 4356 WMIC.exe Token: SeUndockPrivilege 4356 WMIC.exe Token: SeManageVolumePrivilege 4356 WMIC.exe Token: 33 4356 WMIC.exe Token: 34 4356 WMIC.exe Token: 35 4356 WMIC.exe Token: 36 4356 WMIC.exe Token: SeIncreaseQuotaPrivilege 2992 WMIC.exe Token: SeSecurityPrivilege 2992 WMIC.exe Token: SeTakeOwnershipPrivilege 2992 WMIC.exe Token: SeLoadDriverPrivilege 2992 WMIC.exe Token: SeSystemProfilePrivilege 2992 WMIC.exe Token: SeSystemtimePrivilege 2992 WMIC.exe Token: SeProfSingleProcessPrivilege 2992 WMIC.exe Token: SeIncBasePriorityPrivilege 2992 WMIC.exe Token: SeCreatePagefilePrivilege 2992 WMIC.exe Token: SeBackupPrivilege 2992 WMIC.exe Token: SeRestorePrivilege 2992 WMIC.exe Token: SeShutdownPrivilege 2992 WMIC.exe Token: SeDebugPrivilege 2992 WMIC.exe Token: SeSystemEnvironmentPrivilege 2992 WMIC.exe Token: SeRemoteShutdownPrivilege 2992 WMIC.exe Token: SeUndockPrivilege 2992 WMIC.exe Token: SeManageVolumePrivilege 2992 WMIC.exe Token: 33 2992 WMIC.exe Token: 34 2992 WMIC.exe Token: 35 2992 WMIC.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4172 3388 e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe 85 PID 3388 wrote to memory of 4172 3388 e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe 85 PID 3388 wrote to memory of 4172 3388 e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe 85 PID 4172 wrote to memory of 3536 4172 pay.exe 86 PID 4172 wrote to memory of 3536 4172 pay.exe 86 PID 4172 wrote to memory of 3536 4172 pay.exe 86 PID 4172 wrote to memory of 2728 4172 pay.exe 87 PID 4172 wrote to memory of 2728 4172 pay.exe 87 PID 4172 wrote to memory of 2728 4172 pay.exe 87 PID 4172 wrote to memory of 2728 4172 pay.exe 87 PID 4172 wrote to memory of 2728 4172 pay.exe 87 PID 4172 wrote to memory of 2728 4172 pay.exe 87 PID 3536 wrote to memory of 4952 3536 svchost.exe 95 PID 3536 wrote to memory of 4952 3536 svchost.exe 95 PID 3536 wrote to memory of 4952 3536 svchost.exe 95 PID 3536 wrote to memory of 3068 3536 svchost.exe 96 PID 3536 wrote to memory of 3068 3536 svchost.exe 96 PID 3536 wrote to memory of 3068 3536 svchost.exe 96 PID 3536 wrote to memory of 4540 3536 svchost.exe 97 PID 3536 wrote to memory of 4540 3536 svchost.exe 97 PID 3536 wrote to memory of 4540 3536 svchost.exe 97 PID 3536 wrote to memory of 776 3536 svchost.exe 98 PID 3536 wrote to memory of 776 3536 svchost.exe 98 PID 3536 wrote to memory of 776 3536 svchost.exe 98 PID 3536 wrote to memory of 1900 3536 svchost.exe 99 PID 3536 wrote to memory of 1900 3536 svchost.exe 99 PID 3536 wrote to memory of 1900 3536 svchost.exe 99 PID 3536 wrote to memory of 4212 3536 svchost.exe 100 PID 3536 wrote to memory of 4212 3536 svchost.exe 100 PID 3536 wrote to memory of 4212 3536 svchost.exe 100 PID 3536 wrote to memory of 4332 3536 svchost.exe 102 PID 3536 wrote to memory of 4332 3536 svchost.exe 102 PID 3536 wrote to memory of 4332 3536 svchost.exe 102 PID 3536 wrote to memory of 4512 3536 svchost.exe 103 PID 3536 wrote to memory of 4512 3536 svchost.exe 103 PID 3536 wrote to memory of 4512 3536 svchost.exe 103 PID 4212 wrote to memory of 2992 4212 cmd.exe 109 PID 4212 wrote to memory of 2992 4212 cmd.exe 109 PID 4212 wrote to memory of 2992 4212 cmd.exe 109 PID 4952 wrote to memory of 4356 4952 cmd.exe 110 PID 4952 wrote to memory of 4356 4952 cmd.exe 110 PID 4952 wrote to memory of 4356 4952 cmd.exe 110 PID 3536 wrote to memory of 2088 3536 svchost.exe 115 PID 3536 wrote to memory of 2088 3536 svchost.exe 115 PID 3536 wrote to memory of 2088 3536 svchost.exe 115 PID 3536 wrote to memory of 2088 3536 svchost.exe 115 PID 3536 wrote to memory of 2088 3536 svchost.exe 115 PID 3536 wrote to memory of 2088 3536 svchost.exe 115 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e05acea94e72eacc59d3180543957e5c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\ProgramData\pay.exe"C:\ProgramData\pay.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete4⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no4⤵PID:3068
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵PID:4540
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet4⤵PID:776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet4⤵PID:1900
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat4⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 04⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
PID:4332
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 14⤵
- Executes dropped EXE
PID:4512
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵PID:2088
-
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵PID:2728
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995B
MD506cf367a546c048954bcc68388580e8d
SHA1b5ab6460358544fd37b6548fb67ae655f3adedc8
SHA2565efa1e1d543807778dc1636ae3195c4d73d27831ffd28874656e54460dc884d7
SHA5127aae05f887be81d05e741d67d593e345ef98a01ffee7bbec4f36f100e8f0a13f0b3586db7af6956a40c9f0d1bd25588b7aea25034ace6234e10c988b86cbe29d
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\aic_file_icons_retina_thumb.png
Filesize64KB
MD5df3c8075404773ad17aec17fa09a678c
SHA16b916b109299c2bba06dccf935568f5eca700e28
SHA256d50f5694cf8d76e81fd08a48849744f144aff2ba1134a032a24e0ea985c52f76
SHA512ad1c82c606790e6c5cc45036f77cf8cf90cef705558db788c69b230a6dba9d10312ef431747e6222a5df40056b6ff873c95c01941d06a7d8ffb6c02d21f80d1e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\aic_file_icons_retina_thumb_highContrast_wob.png
Filesize52KB
MD5e06b040c1d472d6f2afce6c4ae27da1c
SHA1b2c735015d0be35b61154c2bf31ac562ad557fe1
SHA256d86184f314c1ac9b8eb7a8afd977da49dcabafe5aa400461f8262710b079d73c
SHA51228e8837919bc79094f0caf7692156ee6f9b378f7bf9ab3a99729475dfb6673fb7436354d4e96b1596a2c1702b700db860d24ce2031c734df1c03fada14f16834
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\aic_file_icons.png
Filesize52KB
MD58aa54a1d3b734217fe9d4efdea03ca3f
SHA1f16724b3588f575f8268f26056f8364057b77e89
SHA2561baff1de54125eeaf16feb42cb1dc561b642837febd966d711a7bf6d5d730922
SHA51232cf821eda741558ee700224088720c790d895832cb285f3c9ac25e0228ccb047c0826fc8df27da9453cc8c3ccb866ad692e43d14c528598c8e5b8caac4852da
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\en-il\ui-strings.js
Filesize29KB
MD52435c97e2a167e8aae1d70354770a372
SHA1f71aa5775a4497104d6c7ad1fb9764b00881436d
SHA2560c5b5f2210a8c42c7f6ccdc71cad3c423d910712acde61c4747a3877957870f9
SHA512a0bfd0747acadaa8546d843ec0e329398fa80ddf061c0c641250aa12f73308155e463e3c61dbd289d16db09ea1a093157546960ff119052ef69a3257efc9f04b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\fr-ma\ui-strings.js
Filesize34KB
MD5c98623c41eec58597aa44562f1f29583
SHA1e125947c83fe0a44b98fc2fda0919400f189ce91
SHA2566aa835769e52e0fc0db258a0643029a9bb83346300e688aeeea9cb1889ca8836
SHA512900b723baecb5865eca71f2ecfb5389d3a96987e6e2b23921ef63bc5a961970363a9f128b4a14839dce8614242dc1473060894ef504d81a13b06e37879ca6a7b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-il\ui-strings.js
Filesize9KB
MD59a6fa0ea830121694fdcc849df909d1f
SHA1d1aab6e014fe9220c36e45b123854fcb3861a1d4
SHA256015be66d5c7c7dc52ddd11e5cbc4c3dbcaf86e6413d62c56c9f94ff2120d22b6
SHA512218266a3ff16f0b0dc3e89dbb8d258f064b8d9c7afdd171a2c8237190ec88afa75fdfa8fde9fd09fc72dad3891894cbde611aa6d0106e3c0d229fe0e890ad8e8
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-ma\ui-strings.js
Filesize10KB
MD5fcbb1cdee569a7bda62f0d8a771e4e4f
SHA1d6aca6158439a03660e56529e4f9debda32f6859
SHA256693c2eec1861d5bdac494e492064e163120d4c7a4a7f856169abc3211260e8e1
SHA512553a476db6b5b980daf68a9cf932e5fc2b6bd26aec0080c225d61b134567e0d4edea7c1a77326261c4b0398aad5396f6a69e3a430382d84117651468d495eee0
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-il\ui-strings.js
Filesize5KB
MD5575c17579deff36b660fd9aad1ae6125
SHA19d64271bed3a7d63add59b9df87d39b9472d1548
SHA256ba0ebe699770863f0dcd779318e6050c1ab81ae8a9cf2cbdbf01cc94db546691
SHA512f02af6a9fa16672c14f651182f9fbb6651414b857021c19ea8264219b81972412125e4a23a2ea74cff96fe99c929e5f5792680af3db62c838eda4cbc3b1cf1d5
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fr-ma\ui-strings.js
Filesize6KB
MD5a4c3cd5a35be5c8310f2868b87eef56d
SHA1f93cc25ec9606fcb36bf35fe5e757f01414ece3b
SHA2569d9cd61cce1c4a547aef6e6c38c72caa12fd71a437fec6aea33ff5029fe0d161
SHA51248855c9f43587aed8de6257e00256d0230e370c4956c82c7bc876f87b14f1972bfb4f5d19f52b29718bcd7de4b49e5ce7eef0312ec62a1bd33d7f9b5a69a761e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\new_icons_retina.png
Filesize18KB
MD5977455e4be31080e7c43232e74d6ed6d
SHA1bdae9facda98ba082f5a53f6612e1d184abb1a59
SHA25660ff412eeedf1cd2d3bfb8a3662a2097365fea7017acedcd5121a78954f06ab9
SHA512f486342b7f3df2fed1f7b269bec1b8095dd06f8e92416c0ed025306b8df1b94d563d4bc1d1986ff2ff7867994925c9b9ae95a06591aee60e9189355d40b84e2d
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\exportpdf-rna-selector.js
Filesize176KB
MD567d4c2328a3cd3c028aae49ec52cd93b
SHA1ca4b711c5eb023283b62d86524497eab0b71f505
SHA2568870deb55725a5953493f00067601b6fbac09a51c0c617c9e3cd1eecc055d720
SHA512da78661e6b966aa8d6b5350e1e771fdc0db214ccb387dcaaf41c2ff44918199d16beb7e888d7449e3c6bc76d8cfdbacd844f3a5edac50c0db4b8cabbe398ca85
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\exportpdf-rna-tool-view.js
Filesize387KB
MD5f560add0b23197cf43ec01c481f5817d
SHA1dd901a9dcf090e49518037564acd86c3966826dd
SHA256aa7b7a7c78f7b211a5e11f2d167e617d21aedc8c6da67a6fc54f40165487e70b
SHA512f5adc71ec3c9f95a459e2059338fb4bf69b0e16fcf0782141623fc1d81a88f8a1f078fd84918525f62987a9f994f6f389781920c483fb51524789582198e465f
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-il\ui-strings.js
Filesize10KB
MD58f6f638fa438b55ab56de8379802b28b
SHA1158597d2a3595abe00aa24bd9a4395e258943884
SHA256733ce4232e5a017481ca2f4f413c9a11cedb22b5989e00e89e7779c7a7258476
SHA512982bbbb9c01e5430cc1d447785856a219e7802027c5593c9116fde9e456fd4d65b43255d5aaf26ba5c32170e2f0d0ce73d03ae61a88921d64a2a028c5420fd24
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-ma\ui-strings.js
Filesize12KB
MD5f1481f07d4457fadfaa1234ddda5f66c
SHA10059841b80393e1dd45054d157d0e75779e98163
SHA256a893b8ff128e0fe810ee2783bf2421abe5adfed5d6f6cf6790728b6d30676038
SHA5124d736e800fbb8e0bd66f84e88c7ce602ab277db1c1ba79352f843e38546639a41140d984e06744055302ab617426c3625721d14ea1f003daeaea9031702ddac6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\icons_retina.png
Filesize16KB
MD5e74b71204f6aaee2c078e2fed74e33eb
SHA1d5e96d72f1a5a1a5649ffa07364490d2d6ed9fb4
SHA256dab15f28d26e46b9e5e492de6455c382bc008a1130e5112162f1c4f73a494133
SHA512a1ad7d1217403f3526c8faedc9f152e098764d54c98448ecbf5897e0606cd1d86ad443ed44bbb212fa62e29c790010aa8e10e4aa8e1e19249598b3157e0b171c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\new_icons.png
Filesize9KB
MD505b5704b83a921199abf1c1f4edc99c0
SHA1db92ed6c5bfb7571790eddd6cd0ef3c8fd25f761
SHA2565977642f0a25a43ed70e730f82f0ff4b1a17a4c62c6959844c6c6e4c49158e72
SHA512901c076716de497bf44e7241328adc38872373962846ea5e1117e82dd8661ea1371b14cf2561f91fed43f4562042f70ffcb499c8e5fa7a1ca3f2e2aaca51f86e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\new_icons_retina.png
Filesize18KB
MD5cf6a3025f4a59066f614d5a800ba0204
SHA132212a671b490ecfe241055a70b002d11df843d6
SHA2561c217d28c36dd4780e841bf5459922251e612ee8b3b77ae240562381583ca60d
SHA51240b4b79ca7db4841f439f80f300527dfa1863d96bba12ac8442605cd8c0a33a1661d2a0c2aaba00fbf8cfe490a63fa3f30b6c24add585235c448b40d4ce5a7ce
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\icons_ie8.gif
Filesize9KB
MD50cdf717ca3e0f0e81163508a396222a6
SHA1d07d1a4a4acd45f71ca454c258d8e044e5c781e0
SHA2566c06455a2552db90fb35aef4d7fd05bae991d607a3ff3409b9a9265c215f8069
SHA51258ea2b9963a782c9fb28a44e9bb7cca586f508df5a8e05398d3ed7321a13908f4a80e7f88a4a2630cb50c5ed957efb2eacef9234cfd4d94c19e446385d83d5ad
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\en-il\ui-strings.js
Filesize6KB
MD571a44ae6441ae7d078d4f8a2b0313d67
SHA1084e07a2b28ab228598d1902733ae7981108ad68
SHA256dcd3c38f3a809656b643f2a0095be0dda2deb688a4bfd3fb2a683f5844bd353f
SHA5129990f8d23d0fe1227a6ff77705d03bdd7ca4b0e7fb2c48acf057705fa61ecb3b3d1f44fb7e451716e3dca268f8e247322981032878d3d1ad0ccf3ca63419a0ae
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\fr-ma\ui-strings.js
Filesize7KB
MD5a9261465fbeb2c27d8133baff5bd1482
SHA13fc68d21ab7278b64937ad15af3a32eeda770d6c
SHA2566128eeeb9fc3b03747b422f334880d601796f072aeadea6095b2afab8fa1d335
SHA512136658b6067fb211b6df99efa0f63d92cd65f411c4c98bdc3abd5026997773cae2e88b217fa4ccb1d190111df00b0ee9e86937a716470c00097ec984e87176f4
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\AppStore_icon.svg
Filesize15KB
MD5231e491096c09436d2e119ab2c80c9c4
SHA18cde95ad4d9aa606e0a2334cb2989a8d188b468e
SHA2563a0e87aab87a5e07b58c83e24f2fb97114a369ff5075b262933895d9aebeb80c
SHA5125281760c8670b7dd048aab15ccc7b5f51a2c1ffddb0be57ec777f53ad5c9392f1b2d3e3258819554ffd31e217961d8401f744892b32f9d9a7203a1a7e24118f6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\en-us\PlayStore_icon.svg
Filesize7KB
MD5839bd6e23ff496d6605b0bfe2d47ec74
SHA10a4c9f1f43357f3017fd23155a0d995037d83bb3
SHA256d002ef5fd1bb7390962b7661323dc1864715cfac284e0241c9aab76ff2277949
SHA512e21c3367940ade98fcb508fcfc2874e565421c01afe75e2eb6076dc35da67824770c6dd9a4064f6ac98e2486e46cfbbf1cc493f3153a97b38bdcc6bb4570319a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileAcrobatCard_Light.pdf
Filesize381KB
MD5029ad5c7c2166658b771cfbb4f027b87
SHA1fe5528ca925d4a4cb326dfb063203ec8b476901e
SHA25629a90f3d5eadae7dd5ea2de72c428c3d296e2e45b10b663030265c27affa269b
SHA51239be1ef1459d688d3ee3ccc267f4fa2cc84ed0b735eac0a2b6fbe3506b83e89b03870210aac8fddc38c373a6d5d7aab03deaf29807081f5d8dda8118b2e34feb
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileScanCard_Light.pdf
Filesize56KB
MD5367abbba5c45428239a94c66fc5428a7
SHA148ace3b44c259149ca04c55c8b7c2ad91c67d111
SHA25684a288f2ec751f2418f6130248a17ecbd4ff864fd104c095315533bee8bf9104
SHA512429b405b51429ae0e45828c166a512ff7f3b4f334b27630c9fa7d7fa728fea79e6f5892fa7cf387e659f7919ed66f61fa0c6c9fc8a4c00ef604ec3fe2b9543e2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\en-il\ui-strings.js
Filesize14KB
MD5bdeffcdf00f64e7297ec2c89b6b06e6c
SHA1afcf303b1f976d336aedc260200f23234cf737e2
SHA2567f9a229b8cbc47cd8510f80ab9be1dcb215c7ac9657cf6f673f820afe24090a1
SHA512bab6c4b4445fd448a780be4e858e64c8d45d6ea935f13017ec1927b96066d7d34f61c9ce81e533a3ff17ee025ce4705f10326d40bd411e686149ef642a33bde4
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-ma\ui-strings.js
Filesize17KB
MD537edb7afb23bb6186bf31933f814756e
SHA14da1dce9f25f963c64451e9af0b71e3d198c59e5
SHA256821f8412c772c8f1dff96917010c38a672b0d7359f81cdf6390dd5a0ebd1cf33
SHA512e27b1d23f6a7cb769fcdb1d89dbcd7ddbc87c079e3756666ee5ee7a9e57ee68fae6d7e9f6c466e5714c0ad8646317a2e4a5ed950f8a6ac9caecb9b0e137e8823
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\en-il\ui-strings.js
Filesize15KB
MD594b4a06afaff831ecb79166763bd3307
SHA19c3211db1737a396887c929f4282489340453063
SHA256f34565bdc4a4dbc45566bc337b930733348e069e9eb093954f18e9d9a741f37c
SHA51241aa07529a8421f6def858dd7a3e1ef6a0d1a9ac05f79b384c2fa1b5b4930f98b5e045e03543d1cab8c0ae4de7a30167e96a99d6d984aee1f30b74e7fb02c2e6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\fr-ma\ui-strings.js
Filesize18KB
MD512ecb7a04f1159a6ce225f41f0c5e867
SHA11ab6b67d37efb88f3700ea6a9808b6d8bf3fad14
SHA2562816299fe1d3173d554aba9ac671a1cb895f42ee8ced6dc726586a6991e104e0
SHA512f321c815b40b053abccf2ef73c6c9fe06b5859fd92d4a6c9dcb039b2b9ee9dda63b00cb51b7085d7b8414632ddcb0ffc75f88c638424270f141f11d77d82daa5
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\dark\progress.gif
Filesize20KB
MD5ed42b42b03e0ca0f08dfab4c5b281fa7
SHA1608d510b126dc4908083220acc9d732054c46b73
SHA25666f11010dcb38bae92a3cf5784f331f742e5a650cfc50724cb04bd11d68e805c
SHA5129ffc4dcd51ed590599258cd1a2f1cf9ce58872a69f101d1c3fdcaa448292ad6100b01b18367b71650575641b5eaab9ca6e856247d520f315d01f289883bb3124
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\fr-ma\ui-strings.js
Filesize11KB
MD51b699d2eea650d8d37a8244c14f13f82
SHA14d9ca138e3e1f7413a8bd63a9fd4461aa8ff2442
SHA25612dcf0d97a3ee3afab3b2698a3d3a013c3ea92e01ef7c63270a36c74ac0e8e7e
SHA512f88f712472f050382a8c1225542d7b836b8577562c86268d07cd90297e763dfd29b54321d7f20d1b6bc158c1084c5a58a94591e1a8a0982328399b0ed880e867
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\fr-ma\ui-strings.js
Filesize17KB
MD5e5b76c725da5d6f04b7b9cb045cdfc86
SHA1d39d47d59d9450d5a680e8747e1d2aad0487c00c
SHA256a18036c422b1fd94ac884bfe10d1369dd36f3f63fc928231420766a1c080ec70
SHA512cae4b9d119bb4ee46fa360956b5872c515a9392cd004af1039ec4bcaa0c9a151277b23dd1aa362923c4c1eb82e27857a184eebdc945fd5fedc71c39d348e77df
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-il\ui-strings.js
Filesize15KB
MD5b05ea5c2b1990e90ece50b1047c60c08
SHA15897ad2230acdaeba73aee9c3827f003126984d2
SHA2566427e43bfb6ad2022708cbca33aae5dd5640140e839a3572076b069f16e4a6db
SHA512d6ab5e0297b6b68b82f5d4c17774df3bb0f03984e6a53e460c8c551334805154c469d278755bcfb2e2230386ef85c54654524e738f3aac8b26191753c9855f56
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-ma\ui-strings.js
Filesize18KB
MD500c900a9738c1d00865d4eba6dc7ff66
SHA1223077a11077d6f2f79db234ea3206c3851adaeb
SHA25616084d273e017cd5b88ff224e629ba663ad4007d96400879591ea8985456dd6d
SHA512bacd4e502d2a16f0e352c6db79ffd48fa7ff21e912ad9d7f82c463a536bdecce066190d416dcb13434e398dcefbea99ac6a28f146fdf7bf32bc2120882ecf744
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\en-il\ui-strings.js
Filesize19KB
MD577ffab38108b6b6701410944870a0508
SHA11e750bcbd16bbf39d58a781a9a6e527b82020232
SHA256cc561ab158f2ca4c9e9e44371032d650a0b075f613be85faac2c4fd1aa337813
SHA51239a9c9084f8bffc81d3e8a0483676d171155451f69cb683ae4cfda6dc3f2ff56005a47e928f1d2a431e5a60f05f5de5e7373ef4c749aaec75522d97d308751c2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-ma\ui-strings.js
Filesize23KB
MD508a82c97f09551990c9b38f231f016b5
SHA166c01a32113ccf3d34e78ee98797e90a834791c2
SHA256e0919269e53a2d666d4ae44cb022dbc75e262e99729dc3b671d15ecce28487a2
SHA512a7ad79716a0f6b513dcb4f9176cc9b0a14c3626009d4e8c9f66191f5f503bc9db8578ac158b638c6e3c5f48208b2dfaf8d0ed62501eb12ea067c73211c3b82b8
-
Filesize
292KB
MD5b1e78e7b278d8006dbdcec96e0165896
SHA15ddc99974bf901416c2a533f0a6ebebbbf8cac4a
SHA256119e85bb51746d96f9d05ec5eb9c58149ea0cdb859b17b7dc45941b74f5c287c
SHA5123d31852e020751a68512a03d1b924fdba64d0334682058bebf84bd14f4fbd207a73d7ca254a46354d196a463334581ce9c4a26587544c46b7a2d509ca3ec4275
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\osmdp64.msi
Filesize2.4MB
MD557c20ddc69bb6690796d1b3119f359ff
SHA188ea62be09b04b4e66bea59cacdc9aefc2fa8367
SHA25687cba417259618636c5949ffaabee0f4cddcb6edfa6e6ea726f4947b5b17feab
SHA512c04886c5ddd3a62846f35446b50615f222c38d14fbe791249ef23c524eb9afa4bbdd9e551df62999013353152abd87c1eb4f367a612b7f0c132d1f6d939fae5e
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\osmclienticon.exe
Filesize62KB
MD58d115fb216976c92bed90c3f5f647ca7
SHA1b33e80a821ee29183d3dc11279efd498dc9d5689
SHA25625f60b8da16702d78206b0e2b5961537b69ba60ef1d4e2d0e6d822bc453341d4
SHA51267add0729cbf85ce509d2086344e1fb078d565ebcff6a940ddced42e80ac0f7770f3198fae11102c11355419ebb8298a6299a1df51a014ccc077770e42d52101
-
C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-1000-0000000FF1CE}\misc.exe
Filesize1015KB
MD57cbf95ad8c304cc27d369cedbed01b60
SHA1aa0e2d6ad167bf41d1f8429b071d9ab3ec536db7
SHA2561532ea274ff4c22bcd08a7ca66b4c58bc83f827622b37249f6a78ac8a6d11c12
SHA512f2dba0708ce94ec44682acb0ff28203c93dcd1e809e5d33b87b945285413d19ec04c007f216c6c737104780444528e33453409cc2b2507325097df37f1fba28c
-
Filesize
604KB
MD5c28cc19a8bbca328278057ffd8eaae64
SHA16c4b590cc9fb9cfc98033f8664d9b6390cf09503
SHA2565781441d68d42e434268f0c5ee0a7b48dc7db3d57b36db397235e2a34b1aca6d
SHA512ea1a7e87f06c7435f3e7fd56f5f9b8580ac4ed2cc527fc542eb61ea1bc5d515db5e1862ece7ca9e5a6d34ae762317426f277376c6e8bb82d0e4515d9d188b758
-
Filesize
610KB
MD56cd833d2909c091ccc240fefcd71ff58
SHA17843a65aa5d08d60a2c8ad02a63af7684c1c1cdc
SHA256a9771e1967b85b33e57f79a32fb07a9a7c3b91947aa2d085262a28edfcc0efa9
SHA512c6e6a8143617f55ec016b294d5facdc6f9cee71d8c406e0be02c14c9446e3bd73dc77482487440f154e36c8ef486bf0813ea35278af4801d7ccd578339be2d26
-
Filesize
571KB
MD5f25bb8d1050e9cbea7d56b8945e7fac0
SHA1c38ed4d35ef7278bc9434be664b3c43fe676e254
SHA2560de69a96bd0b139830139f4ea373a951e38e91dfdc4a5fce1b7ccbc03b905144
SHA51289a49ff4919f9fe511f5e72b42aa577db437ea4a8f267b8466d27507015feb5beb2cbbfcfd47d8b79627bb71abbea8bd4022adbb2e6de2a9b9b4f670f6d0b67b
-
Filesize
599KB
MD5ac245317d945a354f7f7de24c50eac89
SHA1a92dbf7861afcd96f2f169af1ae8823988530d52
SHA25625cc3d7190927eb80695011708b4ab154716ca78a26671edbc45f121216e5765
SHA512997717b0d7a08bc591fedadf57a6969a1ccd7341ef7974592a8e45dc5d54df1d9837aa5ff981089fd21f3ed1d0a1203337374d9a87fc5915c794dec6cce302b3
-
Filesize
621KB
MD57b4e4d00b83d23a9abf99f6a0d5afd1d
SHA1605d75dd36c517b92878f8fbc55de50b8375d4f7
SHA25682cb15ff4589d2367785e3ce408fa82bb8e9027dea4a7ab2b58556caf7168a15
SHA5122a5fd05074989d4359b5d0adf0c0499c443c8eea1f13c3fb3dccfbe82402bf3085ed9c244427bd29be3b2f653bddc70a89bac21afd553e201ef38887fddedd8a
-
Filesize
771KB
MD51f75b697c834fdca6733cc812716d049
SHA1ad3a73966b715ebffe65fd26d374bc9d6ec3d0df
SHA256181312d3fcd145ecc5ce0bf2a825a40a0ddf4b1e4a160c6a0118edab6640c721
SHA51285ef720fb3b5e07b899538b544ae145c99e95adef6342ca00d6194a05752caa6b014ec20b73a89dbe7a1a8183f5ce9e421c39ce968c32566e91f129f21feb4b6
-
Filesize
214KB
MD59c13ab7b79aec8dc02869999773cd4b2
SHA14b4d865132329e0dd1d129e85fc4fa9ad0c1d206
SHA256774ef04333c3fb2a6a4407654e28c2900c62bd202ad6e5909336eb9bc180d279
SHA5123854d8b8fc71f6ff48232839c5a2463ad2f94c6560fc57765a36da8121fdae5975a0334c1424a5fff7a3c7c3a4129f31cd8f14df6425d9f7ccdcf0a0e15724cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize2KB
MD50fc3c2e38aee24decf732ef505b5f315
SHA1af6cc8fad87b2bce10ef0638882d015f163b94a0
SHA2564c7fe81819d3da0a333b81604dce38c4a0e005d30e63965b8b4a2b65b3929327
SHA512a74e3914a816296a94032c77b531eb25682e11c5c51334fcf1ed307e3649613cd7c8ed5b994a2b88b9f8d8a127a20d911e721fde59ea6a71237bba7dd6c06bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_3F2A9DB42365395CA97CFD2FA38D17E4
Filesize472B
MD52873d49fa8c71b3ed40282713043e485
SHA1b64888f51d73effea786532a91bb07f5392325db
SHA2565c611fb2d9be15713d19153924b914b5838e5b1bd07becb09717fd2f5304fbbe
SHA5127ca48931d3a8b3a5827de30f184be09af5ed4d9199cdad4405326a540ef4bd562b00534a027214c88cb7edba82e604afa9ee2b9dd4758bae4d028332bedb2738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD50edd390a9ee9f40e466c803a9b62ea8a
SHA1614a61309859badbae8df3fd3cfda54762e2cae8
SHA256c3fd50b460eda0bdb628a07078dc6902f9b5446216e12b900015e46f7306563b
SHA512277b4bd3bb8823936d18fb9efb12261e579d1ba454a56285ff8160739656f7c8af3fb42ae9e8986290d8de055e0bc65c81fc5296afe36a8bb716858d6fd8b51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
Filesize484B
MD5eaa5714b4e7d3cf36354515f39571f89
SHA1e78f53b811d782a75529943fd48bafbecca6253a
SHA25612547d47ab01e1cfea14f318340245020002d4aa3e249d02aee800ad4100ba52
SHA5125879e3e2db12957ebf31127b7110c3fbc75b706c8eb851d01929c50ebbe9b0dac310892f7ec4e28aad269d6a6c355f054d49d4eedb33ce0eee5c20d418b88de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_3F2A9DB42365395CA97CFD2FA38D17E4
Filesize488B
MD501536f0f2df8ff958035700c7ef99c44
SHA1cd339090275c9eefc87412bc1318649b0e85c5a2
SHA2560aa47d63c13fdcd70855934c08aa050fba45d2b27657720547f16d9974574826
SHA5128607b89e7de2e44f40afc4b12b40b5cb674033b8702cc1e1add0bc96269082dadf9d56d8120613777106387d604aa18751bcb92386566aa5f3876939dd0c4d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD580c70489a48881c77e26bb77fc817312
SHA1ad8d877d7302fe20915cc065c7be5e2dedf11554
SHA256492f63d2fb103512471d927d895416e900a9222f614f062b0820a1fbafef150a
SHA512b4f1c5ae5576a3c483542176659982e065b2c3c30d7b484ac264345dfd5d2c6c7b3f9d2474edc84250f4c2096065de2124e8a90dd4d90384d1644a868f677594
-
Filesize
18KB
MD546e7f28a55cdab07533424725a04b9e5
SHA148a915fe8958b0882f364b1e0ceb37e7b7948319
SHA256e40cc25f9a709e182c284705b0b50b448deb4b1b81b456a633638003db77068b
SHA512717be51be74aa8b36d714f35942d40c8c18bea13a49d293681e16f1b10dfbdf3887a887ca40688348eee38b10ec80c96a17c338378c315c70d4abebfd42e9076
-
Filesize
190B
MD56ebbeb8c70d5f8ffc3fb501950468594
SHA1c06e60a316e48f5c35d39bcf7ed7e6254957ac9e
SHA256a563426e24d132cd87b70d9cb5cd3d57c2e1428873a3f3eb94649cf42e37b6a1
SHA51275cfab1c9f5a05c892cf3b564aed06d351c6dc40048faea03ae163154ff7635252817d66b72a6ef51c4f895eebf7728f302df51148acce2a0c285502bf13652c
-
Filesize
406B
MD5ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
C:\Users\Admin\Desktop\[email protected]
Filesize933KB
MD5809f66780f3f6cec72b6b45927b7c944
SHA1ebf14095b43e34f6e92dd079d5157166e329c24e
SHA2563b6e85a3dbb9bc4b37bb4a11fd5499b9e6fab1f8a0a41baf318896f128ea2faa
SHA512fc405eef299bd5faffdbd8f30bc5e69126700c323d17170c1c042d75b9222e47f5698fbc64a760d600a648a48d3e18598970f03963f46e0e776803c8d9e10350
-
C:\Users\Admin\Desktop\[email protected]
Filesize500KB
MD5ba24095d9212fb51461f4420f4162693
SHA140612c9d3cbcbc65659d3e174dee841df68bdffe
SHA2569ac5ffa3c7358eb8ac1f89ed86eae0666b4b5b3efeb2df4212b4232365c0e5f3
SHA5126c31b75768c06af13b754edb1a1a55c138185dfb830d1a1e48eece84ccc97a33fb1a763e82bc07a2f228297bd09fd3cec176676de0aa7a1f2694c727df7912bc
-
C:\Users\Admin\Desktop\[email protected]
Filesize733KB
MD55cb95337601b73764035859fc10a363d
SHA13a2ea9872b4518687ee3be4187b55125cadc7a47
SHA25607b12a8cd221315b853993947291a4dccd659b4cbbc0b17a20bdf752f56b7a80
SHA51251eeccf7e3e72a8fefce4bd96a4c2303a5866320c5c1a3a810269553feb4751debceee570566af1ecd7e3a92abf61182bedb2ffcbeca71bf2833eb5a25a32ca3
-
C:\Users\Admin\Desktop\[email protected]
Filesize534KB
MD58c34aad08ee5635e966973c83c1ba893
SHA1497a77e647288c688c7e64a7e82dc719ffd828e0
SHA2569df0273751637bcac37cd62ba62ff01e8e32d30390a896947ca9929b3e8c8381
SHA51204ecd02e1c9c6ebc3ce6697c7f97ba940b87ba5ce75079d6aac05fe78ca168186985f390557b1efbfc6948ae179f41910bd34ce0adb585517da13a87fe0d374a
-
C:\Users\Admin\Desktop\[email protected]
Filesize567KB
MD5a5bdd9024e59cb3249f4b6be78c75a2a
SHA1a6acfcdcb8985bfe5a17dffa3d31a476c6b10f25
SHA25652ba2107d0d492141ee540662a640b3abc0cc713ea1005d633656add912b7f5b
SHA51201e405e5ec8ad77eeb3c1e54cb2b1d9efd694e1b42789dfda79ddb64cdf59ef5c777dac7bed7e08e1e1c0f5ebee480adb0f82a87948376dbddbce0b30faaeac8
-
C:\Users\Admin\Desktop\[email protected]
Filesize1.3MB
MD539a2bf74943d40607c319f65daf39c0e
SHA158f0069b97eb2f362e7be5f522ec8ab438638416
SHA256d52ed6336fce26f9acdc266809f854cca28aa4006ab5ab266b2d0f91a360ddba
SHA512c7eb94610fc005e8db80f3b5b5983422e82bf07ec6007de6bff3a56b5d6e48385c235eedf4607948564abd66d6210d38319c1e7bde79898cb77cfd8a444ff75e
-
C:\Users\Admin\Desktop\[email protected]
Filesize767KB
MD536762b55e984f1a7cce499fcb9659c67
SHA13328666320fad5f8b56c18a5902e4491bd93f057
SHA2564b4908f3c894ef234e637f4b019450e57c555d6b6106ba13bc77e7643faa2304
SHA512bb45ff5f5535636bc522bb97377189ea88e0850d4847d1fee828498f0816f57310de33a5b9a981e57e3c2e31d949b1e38e3ab4328c61e6f7cc17bfc603046b01
-
C:\Users\Admin\Desktop\[email protected]
Filesize434KB
MD5d1db6a625f529ca8704bfcf37b171b08
SHA125d6f00e83ffecec8ea1a6b84a8c29129895b3cd
SHA2569fec616dfc75f41eae054af4272e154f4b9f0b806c54eae99888864ca6494f87
SHA51265b7e702cb770d8c1806b7eca1434e4045fb4766401b3b887e6a794acc2346524a8f70bdb6f1f4e9e9bcb5fd399a4f9bf208c33091dcb08e80b975f1e6e884ac
-
C:\Users\Admin\Desktop\[email protected]
Filesize866KB
MD57a1c0e1842d1060ee34d7566f2f846c1
SHA1fca337027e6c82dea6ab75f79885c2c9102952d9
SHA2564fd03ee9573788e0225c3fb44b62c623cc5d5b5c812fd4c520ae5d3478c1e712
SHA5127a64f10c23cb8dd082aa97c0b4fc844319d6153aea9c73039e47224ca6ef07ce212f16df4cecb97c6047c15eca5ad5ff3936697c3d150c0c1f710200fe0dc5d0
-
C:\Users\Admin\Desktop\[email protected]
Filesize800KB
MD5ac1b71edd24ea8d876533f9ebd62ca14
SHA16c6429dde1cb9ddae869ae6c713decc3c3876757
SHA256318c88448503e77c1dfddbd02d049f3a6aa8fd5ebcbd22f08148043fa88c7595
SHA51223c57144c94880c0c6a465b2a1a38eae8449a57399fa53260a657de0e813586dcd51280cbb751ed6820d1e321844d11978ab2824a3b07365075a46f8d6ea220e
-
C:\Users\Admin\Desktop\[email protected]
Filesize600KB
MD564a03440c49c4304b4ac177e219adf7e
SHA1bc3d81dfe4a926863097742c9b484f16000f0b97
SHA25614a902965b323ea7208f9977d0fc343ab1308144665794836849a34aadc6f3d7
SHA512b371f0333ad295d1d4e7ad5a3e9fc4c725fd86b7510a98fe91bb568e5705a4be1a84a5b802499b1c81402db74b03fb05bc811e2739659c71575c151230751d0a
-
C:\Users\Admin\Desktop\[email protected]
Filesize900KB
MD5890575c0c9de09e2f89db3089a64c228
SHA1612bbf31428f244ef7d28995c7e0832219880c2e
SHA2569fbad7af53a43d0d52305381d88bbdd92622599e9399264e3f7842ea28a4df46
SHA512299f85e479c8fd85622334404f2a133a0c9f34815967886bd0fd1e2945e289d15222180ccb02226cad9035a585333a6a03113ec9eaf25de8f59bca8010e9d10c
-
C:\Users\Admin\Desktop\[email protected]
Filesize467KB
MD5cd93319bca6e2398edbab46ea76503f3
SHA104b0583ec3215c577e659bbfa5fe0cc0d15bd0c6
SHA256b738ca53a4c512c2f8d14ea3c1351c58e802251e0b1396cfc236b4c0364cdbdb
SHA512243bcc32f088586a99a3337a78f895861a5bd3fcb018400aef5f9d24d5b80f17410f1029b62c526fa19587eff61aef992a726e15a911194918b0f7fdf7a07c19
-
C:\Users\Admin\Desktop\[email protected]
Filesize700KB
MD565b51661c0e12089b58a87fd4fe2491f
SHA19919703581c00cb32c9d107c1c459d45d78d8d7f
SHA256c470aef80f6afd209a85eec43d48508104db19792712dfe9b5727346ad4869fe
SHA51212e513c5fce20ef2d06103f5ecf34b20daf33c3d040e5a14c9c0fbeb427d6534bcb4e184c6e4fd10c276b67c6d9e9e612273a9bf447ba28f3f01aafbe9cda8ce
-
C:\Users\Admin\Desktop\[email protected]
Filesize833KB
MD50430ad0186009cb3bb33333343139a6f
SHA16bb46ea34d096ee3f347c05de5ae8f7af7d4677d
SHA2560363ede7345afeb679fc3d90f351a61c710f101e263db796fe488fc919503591
SHA512d88283ecf366a09c5192c1d04bc95368e8b0112176eac0373409ade1d85addfcc552414c1506809497d20132ff3308022dbc9f9ad0efb43a7dec70c2a696edfb
-
C:\Users\Admin\Desktop\[email protected]
Filesize667KB
MD50570f305dd8351e0f3c304d955548055
SHA17ea51f1b958a5b413e2ab70cf2b6aa7882096e8d
SHA256b75cd8c69b46df49359d955e19dee7c1dfc98960a195ea0f0fb734c3755951b8
SHA512024e5ffcaa4b59f103118b882289f65e5f1b61376c172fc8f185b0dff50b840dfe5a4bc1b231ac2d5d317b00c7a3909c4df4a40e4bce4906bfd444057f0e28f2
-
C:\Users\Admin\Desktop\[email protected]
Filesize633KB
MD59e571d736508a7a8ecc6fe6b52e2ed29
SHA1330fefbc1ae12dac2886a3cf45fa5e49f5d6dbce
SHA256048727e9964822d31226f62981049239f3dbea3a8c5e24e83bd06a74b2166f9a
SHA5121890b4e91cc5db8478bb93be4d225b46f0f87d31b6a8065cc0a402e8274cc2b95f807f8bb0ff1e21b0e39683deb61e1abc6af37f3599c0de6a269efe652bed95
-
C:\Users\Admin\Desktop\[email protected]
Filesize334KB
MD5f9f84ff8f00029221cb4bc07985712b1
SHA19e58a8624bd3015062dbf29d93357b242e696022
SHA256aac54cdc5c6f672d0c59de157ed678875cd020084b37052e6ccacca32cad5dc3
SHA512f14d184b027ea7c9c09bedae4a403e878b1f14db67de97c34a296d9fe271a8dd7448dcb95b867fc8005dac7737204291d58bfd650bdd072f78ae7674617c2c9a
-
C:\Users\Admin\Desktop\[email protected]
Filesize400KB
MD582472c6b76c0a75aaa5e6a30d8da9db6
SHA1ad70b028215cdf25f3efe8c2702e653dfaf0b0e1
SHA2568628d7dd6b928703b4b66d2c526c0edcce63537e1b9348761ede7f0dce3a6344
SHA5121fd428cc71d25381fc40f3a7771ffa5f0c6e8ffdae223190157bab1978d54d784e034d52f56100b79b15d2b62825031fb42f48f288964d65b0b06f27ae27d556
-
Filesize
83KB
MD5f3413d605e30581c6e0ec1cf944386a5
SHA1856f8e78cd36bb652982fe02ccb67f4814f00a89
SHA256dd92a96faf38539b430d2cdc46f91080cf98605c19560eaedfbafac4dddd8792
SHA512c50cff84814fd4250c5e26dc20b2520931c23789d0ca1b3ab29e020c38264bf229913924fa0f51b44defbbb167cfc30b10dbadd823de606503dc651e61660cff
-
Filesize
513B
MD5ecfe8a0cfd448efa54714199b9baf1b9
SHA166a3ec5947a3df360c2f2e4eb2980a877b1bf252
SHA2568623a5f2e4e5506ebc5c18ee5d29d5f4e85970d8dde8dc474666c7724f209791
SHA5124fa9ca5ec02281f9c2e18ccaf8296b823db2a558017a46fd1e4cb89fedd1c5be731b2fd3000e11dea7c5ea3b69399ec6c7e093876c44a36f6e54b6ab87f266cf