Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 09:44
Behavioral task
behavioral1
Sample
158a2791893332580758c83dcd69b08f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
158a2791893332580758c83dcd69b08f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
158a2791893332580758c83dcd69b08f_JaffaCakes118.exe
-
Size
388KB
-
MD5
158a2791893332580758c83dcd69b08f
-
SHA1
15a4bfa638f868d0ad827820edc3a373216d3f10
-
SHA256
893347995c3a34cfce8011cfc6de98104840842250017c9e9333a29dcae32ea9
-
SHA512
f1ad8236fdd559a84106ded49bd96c52e832be299d0e8c6f7db5fa1ccae2eef7e91df0e3c53a64f301f244c4743666b6307e409158c66e0d3e040ae7dcf043d6
-
SSDEEP
768:ae2gVe2gVe2gVe2gVe2gVe2gVe2gVe2gVe2gVe2gVe2gVe2gVe2gVe2gE+WD6Y3:Z+W2Y3
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\gm.dls exc.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt exc.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys exc.exe File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\wintrust.dll exc.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 exc.exe -
resource yara_rule behavioral1/memory/1928-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x00080000000122cd-8.dat upx behavioral1/memory/2216-10-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1928-11-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0001000000003e7f-18.dat upx behavioral1/files/0x0001000000003e88-22.dat upx behavioral1/files/0x0001000000003e8a-25.dat upx behavioral1/files/0x000100000000e6f4-35.dat upx behavioral1/files/0x0001000000003e93-33.dat upx behavioral1/files/0x0001000000003e90-31.dat upx behavioral1/files/0x000100000000e664-29.dat upx behavioral1/files/0x0001000000003e8c-27.dat upx behavioral1/files/0x00010000000054f7-37.dat upx behavioral1/files/0x0001000000003e98-41.dat upx behavioral1/files/0x000500000000559d-44.dat upx behavioral1/files/0x000100000000928e-67.dat upx behavioral1/files/0x00020000000057f9-69.dat upx behavioral1/files/0x00020000000057fa-73.dat upx behavioral1/files/0x00020000000057fd-75.dat upx behavioral1/files/0x00020000000057fe-82.dat upx behavioral1/files/0x0002000000005800-86.dat upx behavioral1/files/0x0002000000005807-94.dat upx behavioral1/files/0x0002000000005805-92.dat upx behavioral1/files/0x0002000000005804-90.dat upx behavioral1/files/0x0002000000005801-88.dat upx behavioral1/files/0x000200000000580e-101.dat upx behavioral1/files/0x0002000000005808-99.dat upx behavioral1/files/0x000200000000580f-110.dat upx behavioral1/files/0x00040000000056e9-118.dat upx behavioral1/files/0x0003000000005756-129.dat upx behavioral1/files/0x0003000000005750-127.dat upx behavioral1/files/0x0004000000005709-125.dat upx behavioral1/files/0x0004000000005707-123.dat upx behavioral1/files/0x0004000000005706-121.dat upx behavioral1/files/0x0003000000005757-131.dat upx behavioral1/files/0x000300000000575d-156.dat upx behavioral1/files/0x000300000000575e-167.dat upx behavioral1/files/0x000300000000576a-169.dat upx behavioral1/files/0x000300000000576b-171.dat upx behavioral1/files/0x0003000000005771-173.dat upx behavioral1/files/0x00040000000059a2-175.dat upx behavioral1/files/0x0002000000005816-225.dat upx behavioral1/files/0x0002000000005815-223.dat upx behavioral1/files/0x0002000000008ae0-221.dat upx behavioral1/files/0x0002000000008adf-219.dat upx behavioral1/files/0x0002000000008ade-217.dat upx behavioral1/files/0x0002000000008add-215.dat upx behavioral1/files/0x0002000000008adc-213.dat upx behavioral1/files/0x0002000000008adb-211.dat upx behavioral1/files/0x0003000000008ada-209.dat upx behavioral1/files/0x0003000000008ad9-207.dat upx behavioral1/files/0x0003000000008ad8-205.dat upx behavioral1/files/0x0003000000008ad6-203.dat upx behavioral1/files/0x0003000000008ab3-201.dat upx behavioral1/files/0x000300000000851b-199.dat upx behavioral1/files/0x0002000000005a37-197.dat upx behavioral1/files/0x0002000000005a36-195.dat upx behavioral1/files/0x0002000000005a2f-193.dat upx behavioral1/files/0x0002000000005a2e-191.dat upx behavioral1/files/0x0002000000005a29-189.dat upx behavioral1/files/0x0002000000005a28-187.dat upx behavioral1/files/0x0002000000005a22-185.dat upx behavioral1/files/0x0002000000005a21-183.dat upx behavioral1/files/0x0002000000005a1b-181.dat upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\diantz.exe exc.exe File created C:\WINDOWS\SysWOW64\jsproxy.dll exc.exe File created C:\WINDOWS\SysWOW64\mciwave.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\P2P.dll exc.exe File created C:\WINDOWS\SysWOW64\duser.dll exc.exe File created C:\WINDOWS\SysWOW64\iprop.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\kbd106n.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\dsound.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\MigAutoPlay.exe exc.exe File opened for modification C:\WINDOWS\SysWOW64\NOISE.DAT 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\PhotoMetadataHandler.dll exc.exe File created C:\WINDOWS\SysWOW64\uicom.dll exc.exe File created C:\WINDOWS\SysWOW64\defaultlocationcpl.dll exc.exe File created C:\WINDOWS\SysWOW64\DHCPQEC.DLL 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\eapphost.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\mfc140kor.dll exc.exe File opened for modification C:\WINDOWS\SysWOW64\msclmd.dll exc.exe File created C:\WINDOWS\SysWOW64\winrnr.dll exc.exe File created C:\WINDOWS\SysWOW64\Bubbles.scr 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\elsTrans.dll exc.exe File created C:\WINDOWS\SysWOW64\iccvid.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\KBDLV1.DLL exc.exe File created C:\WINDOWS\SysWOW64\KBDTURME.DLL 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\NlsLexicons0816.dll exc.exe File created C:\WINDOWS\SysWOW64\pegibbfc.rs 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\telephon.cpl exc.exe File created C:\WINDOWS\SysWOW64\c_28603.nls 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\httpapi.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\mfc120jpn.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\autofmt.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\cipher.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\xwizards.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\thumbcache.dll exc.exe File created C:\WINDOWS\SysWOW64\C_10003.NLS exc.exe File created C:\WINDOWS\SysWOW64\C_861.NLS exc.exe File created C:\WINDOWS\SysWOW64\dpnaddr.dll exc.exe File created C:\WINDOWS\SysWOW64\C_10008.NLS exc.exe File created C:\WINDOWS\SysWOW64\SetIEInstalledDate.exe exc.exe File created C:\WINDOWS\SysWOW64\msmpeg2adec.dll exc.exe File created C:\WINDOWS\SysWOW64\runonce.exe exc.exe File created C:\WINDOWS\SysWOW64\C_28591.NLS 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\C_28594.NLS 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\MFPlay.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\wmpps.dll exc.exe File created C:\WINDOWS\SysWOW64\wups.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\dhcpcsvc.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\icsigd.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\taskmgr.exe exc.exe File created C:\WINDOWS\SysWOW64\grpconv.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\kbdgeoqw.dll exc.exe File created C:\WINDOWS\SysWOW64\KBDINBE1.DLL exc.exe File created C:\WINDOWS\SysWOW64\MP4SDECD.DLL exc.exe File created C:\WINDOWS\SysWOW64\NlsLexicons0414.dll exc.exe File created C:\WINDOWS\SysWOW64\authui.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\cliconfg.exe exc.exe File created C:\WINDOWS\SysWOW64\EhStorAuthn.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\NOISE.CHS exc.exe File created C:\WINDOWS\SysWOW64\shwebsvc.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\NlsLexicons0046.dll exc.exe File created C:\WINDOWS\SysWOW64\taskschd.msc exc.exe File created C:\WINDOWS\SysWOW64\wmpmde.dll exc.exe File created C:\WINDOWS\SysWOW64\C_1251.NLS exc.exe File created C:\WINDOWS\SysWOW64\IMJP10K.DLL 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\netevent.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe -
Drops file in Windows directory 52 IoCs
description ioc Process File created C:\WINDOWS\winhlp32.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\PFRO.log 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\PFRO.log exc.exe File created C:\WINDOWS\twain.dll exc.exe File opened for modification C:\WINDOWS\msdfmap.ini 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\bfsvc.exe exc.exe File created C:\WINDOWS\write.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\twunk_16.exe exc.exe File created C:\WINDOWS\twunk_32.exe exc.exe File created C:\WINDOWS\WMSysPr9.prx exc.exe File opened for modification C:\WINDOWS\setupact.log 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\splwow64.exe exc.exe File created C:\WINDOWS\twain_32.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\hh.exe exc.exe File created C:\WINDOWS\mib.bin exc.exe File opened for modification C:\WINDOWS\setupact.log exc.exe File opened for modification C:\WINDOWS\setuperr.log exc.exe File opened for modification C:\WINDOWS\WindowsUpdate.log exc.exe File created C:\WINDOWS\bfsvc.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\HelpPane.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\DtcInstall.log exc.exe File opened for modification C:\WINDOWS\msdfmap.ini exc.exe File created C:\WINDOWS\explorer.exe exc.exe File created C:\WINDOWS\fveupdate.exe exc.exe File created C:\WINDOWS\HelpPane.exe exc.exe File opened for modification C:\WINDOWS\DtcInstall.log 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\twain.dll 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\system.ini exc.exe File opened for modification C:\WINDOWS\TSSysprep.log exc.exe File opened for modification C:\WINDOWS\win.ini exc.exe File created C:\WINDOWS\explorer.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\twain_32.dll exc.exe File created C:\WINDOWS\twunk_32.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\WMSysPr9.prx 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\fveupdate.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\notepad.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\WindowsUpdate.log 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\notepad.exe exc.exe File opened for modification C:\WINDOWS\setuperr.log 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\Ultimate.xml exc.exe File created C:\WINDOWS\mib.bin 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\system.ini 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\win.ini 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\splwow64.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\TSSysprep.log 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\write.exe exc.exe File opened for modification C:\WINDOWS\Starter.xml exc.exe File created C:\WINDOWS\twunk_16.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\Ultimate.xml 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\hh.exe 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File opened for modification C:\WINDOWS\Starter.xml 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe File created C:\WINDOWS\winhlp32.exe exc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "8" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DE1CBB1-346A-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000be15f98933032d4cb06459134eef5fad000000000200000000001066000000010000200000008c24019de5a75bff116e97ecd789e61963caff71cfe80a7d7a1b9e6470e86e81000000000e80000000020000200000001dffa7ca5db92bd8b27d2e68f25a37720ef4f4e1493601bbcd8a71b565b272a5200000001d3d3cc648e4491c3d5da16149e2c27ef73605aec2b153142154fb7d05b6c0c7400000004de6d5e026e7c26778d8d9dc8a0092106bf9239f61f0fa5efddc76dad6a3ec55c7053cc6b21c6100f123dde8e4bd4a2e10b1d384da29ebbba16bb7d71892429c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "118" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "255" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "8" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DE42D11-346A-11EF-825B-FA5112F1BCBF} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "255" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a05dece576c8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "366" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1344 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2764 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 2764 IEXPLORE.EXE Token: 33 2128 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 2128 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1344 iexplore.exe 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 1344 iexplore.exe 1344 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2216 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 28 PID 1928 wrote to memory of 2216 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 28 PID 1928 wrote to memory of 2216 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 28 PID 1928 wrote to memory of 2216 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 28 PID 1928 wrote to memory of 3020 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 31 PID 1928 wrote to memory of 3020 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 31 PID 1928 wrote to memory of 3020 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 31 PID 1928 wrote to memory of 3020 1928 158a2791893332580758c83dcd69b08f_JaffaCakes118.exe 31 PID 2216 wrote to memory of 1344 2216 exc.exe 32 PID 2216 wrote to memory of 1344 2216 exc.exe 32 PID 2216 wrote to memory of 1344 2216 exc.exe 32 PID 2216 wrote to memory of 1344 2216 exc.exe 32 PID 1344 wrote to memory of 2764 1344 iexplore.exe 34 PID 1344 wrote to memory of 2764 1344 iexplore.exe 34 PID 1344 wrote to memory of 2764 1344 iexplore.exe 34 PID 1344 wrote to memory of 2764 1344 iexplore.exe 34 PID 3020 wrote to memory of 2128 3020 iexplore.exe 35 PID 3020 wrote to memory of 2128 3020 iexplore.exe 35 PID 3020 wrote to memory of 2128 3020 iexplore.exe 35 PID 3020 wrote to memory of 2128 3020 iexplore.exe 35 PID 1344 wrote to memory of 3032 1344 iexplore.exe 37 PID 1344 wrote to memory of 3032 1344 iexplore.exe 37 PID 1344 wrote to memory of 3032 1344 iexplore.exe 37 PID 1344 wrote to memory of 3032 1344 iexplore.exe 37 PID 1344 wrote to memory of 1096 1344 iexplore.exe 38 PID 1344 wrote to memory of 1096 1344 iexplore.exe 38 PID 1344 wrote to memory of 1096 1344 iexplore.exe 38 PID 1344 wrote to memory of 1096 1344 iexplore.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\158a2791893332580758c83dcd69b08f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\158a2791893332580758c83dcd69b08f_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\exc.exe"C:\exc.exe"2⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:1520653 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:996366 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD596d32a6eb79c3b2fd753e59d2a0bb64d
SHA18f88a8c3ec7aaee6189f76d3896ae6c09f462650
SHA256f5b93e6a45e5288d035f0cda326bf8c802aa830181ecc3ee00b51f6b12bc7196
SHA512ec9d80962468124c83f99fdaf79c7c5226e1314fec54eba26f892509135c293bde50deaa59ae8a6229d6c300e3d6569249cbcaa9236778da071aa10135c18fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD55c7e0c31f0153a598c19264dc046b9c6
SHA113c1c02b986a427048145dd5d6f7f46e8af7119e
SHA256e0fdcfa6e212e10d7895d877a629f405630bf88d0e5b78c43e7f93185eb53f9b
SHA512f49a8fd9d0e727d625f3d4ca6f56a014e7ef57a5576b56905de8d7f587d17506640a95065fa33e02beaf58cc4eae3f0230a9342a3a48d5fac3ffb34b05c7bc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5933ed244b8a35a1429ef5384e4c4f7d0
SHA1d63af5a204e2d510d2cc8ed5f7954d01073572ee
SHA256148c74c6da515a753c5d8ef33e0472fde67e6770fc030fd8e18dfe03204d96e0
SHA512eae3b65f5ee855571978b3b52006b05825fe66ac7a7a09bc934c40df324e9847f08a67bc61d948c4a6f2643ec89430e0a9832e5ef0fa51ce2b5cfb13433950e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD52df4e240df2f4095c2c9e09626c87edd
SHA19e6fb1913c0939e06143f86efa0934708aed4169
SHA2562b60451a37ee3ef2ea4ce76d8879e19c3c6128f51c86d28a983c0fd019a80252
SHA512630331b652dd0b424357609a7dd33c65461d7416a9ec983cc144fb524b2bd92fabed3581770b74eefcc383bc33aa98401417e550b4d79e30179ce54367545b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e75939ebb6110a898dd8f438dffcc3c1
SHA14ee13272d80091517aff92a72ca5b2e049fb31b7
SHA256786b8c391d1f444fa6ed07dc0738e1be3287e3beee61ba921a2a3e1a11dda60c
SHA5128a05af0e2c66e8f81a4ba65d1379aa690abac8a7d5646ebddc4cf301a60b0908229191f189dfd12dcd13acbe72220b2a7c8c128d2918699cae2a6f2c54f11f28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f600fc1eb7bd1f5f1508402d576d672
SHA191073685b14d5eaa7f50024fb00d195ebe7283d0
SHA256d645d4b802eacf0671edf76b6451e7b1a7ab24beae2c20420aaa3b830d331739
SHA5123129b583be1279410f19523d82dea3d9caa62c6b726b950848af0ff94cca2c57d5d72a0947cf50a5f07b389e1ae54eae982ce56274eca3c89ea517362cb2eb1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d815fa22127dfa174f6ec43d7c5323ff
SHA1a8e6040a8b9dc3e01fa28fff03cf4313a9e1b839
SHA256553037863c2a2c8b4674b319ea412d924a91d042a33489fed3b20512010e8a51
SHA512850c1c07ab9491773c4c69e0911003cebeff845a5c0f3da97c7a933e7affd3f8cf1381a3765d50ba08bad1d944f87df03c4cb84ef32c08aa2bf45252bad50316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500fa8ac50f61946ecaa4a9e50c37bb0
SHA13786f9b822f3bcf7cc91215848aa1173e972c3e7
SHA25648e53655f578527d44e708dff59639616c90306915d99274c83d48fef019d48b
SHA512454a1c3f1c23a7f25cc4e30cb7bd0be90cdd2c9cc8ed1762afb7bdf6ab1e308932ff431f65fdb2959f96543652f84e7c535e0f4b5963c1c5ee00fd3f85deeedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b39f8922ed6df9232d854d19188348
SHA1527067d6ecd0f511b57bbaa06e1f54ffb9c9efa4
SHA256acbccb1aa525d16720e7b386dcc87cfe7869510b84b0f1f66fab9f8407cdc2c2
SHA51225fdcff2542f7b6c18d55a9b3cd4f5da1ef8aaf92f2d3c14c81e4e1cef1a34c4f4f47da222c2a21ccee8deb999328b22df4364066d792f767679aa2598903c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561af6b8a8cffb5bbba23d12dd270addf
SHA1e67376240d11ec7b1fbb7c4d8060fa69b11eed01
SHA256e76428e3ed9f05164d440d77136f937f7a6c5c248b48ed2f4c307d59a80f06fe
SHA512eea0cfe3dff719ce0624a6f06503561977d73324d25fac3754dec5b82707c059ca5cd02e58d503d7e99de3d6ac20515a3ab9a310f79e90b0c59bfefc5bfbae8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d570ac842bd93ddf8b2b8f712b2c0e9a
SHA11148fa5f2e2b01d193cc352d5537590431d2d8e1
SHA2564be24369023c3d8d7683667093debda48e81bf0136bdeba89a301615866e131e
SHA51266f2199a60752037bc87afc3c549840b5d95ebef8cb2475751eec5629a1b784e1f68877a25233fd6b0554897e46ec89cde453a43803c22c9d7b20fd159ca00ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c3c7601cb4794818d45d96523db53b
SHA16ece947fc841995b57018291e2899aeaea7f4a37
SHA256b681feed76e73418071d0dfe54ce1b9ed55081226b539c79113d652fa44ed574
SHA512ff9a1755e8be4cb5b9ffba46bcc65b373378b51f567b6fbef62314f98bf2df04f5de31243f3f21f9cedbdd4fae7f99ac26a5e6e0879f92336ac496ee3334f699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553902c529dccbefaf9a3e8d1a9a5298
SHA17845aa600a170e5b4021681fbe0b726db49d9556
SHA256a8f3bad7c88ae8cb2fd47daee0ce70312990284416c5262531ba96bdc39a7bb6
SHA512dce52838412ad82d01c5d80911de270af6b4d9293cbf7b6216706155e795fde06fea92e0cf2f8db4e095d3bd5c22dae247369df649202e86150d94eb8ed03926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530eaa7736e9f1727ab2ff54a2738488
SHA14c695d7ed51ecf5aa737d82eb73d6407fd304f03
SHA25666bfdf8c7f67368686c92654df826a23e74911659dc31ff0d5db286c7853991d
SHA5121620d9755c840cc0c046383fa9e8916e8394d77c3cdf4b05e4814abd0c57b31ff3f769075f5353b6efa490591b4646d5dc753b1c5b2f699208fb586aa9afcca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfafbd778ba204bbca30aae2c0ebf4e
SHA1e16436e14cbc261fe4552175efb73597db543828
SHA256b19771fe2e9239bb3473fd327709ff808d035c19b9df64ef15bc577f46fed469
SHA5122e4aed17bed5ad51c92c755bc9a9a180faf994c46686ee32524323c771b747ae12d605a386a7e03009f76021a5f25126c65a5458199a71f4e1efe3fb377ab568
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567490414f2f423b5219caf17c9867b9f
SHA1663cbbdb4e1315ab1b78b7ce8b359b46acd82257
SHA256dfe58e7ff45d363b2a1c250b998dfdf1209b0c2b717d48cc658c4cda4bd6c2b1
SHA512694bfb875f3a5af5337602cf4fa9bf5e7609adb7b16797c94821c264505e8178c14c8c3935fc2260a3b1678178d2510959a6de79dde3f911078ed6bc367e7dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008bb889ab149e1f103c5bd28f1928a0
SHA1bd76cca18793211c23c579db6e3fe67e7f392ab9
SHA256c305f996085c1a1647a975a75a72355781374d21ede4ddf3229b376fe60c425f
SHA512b4b0fa9d87a82a366bddf828772b6233ab7cff816c6f567fa387499d85726c2d538f9f0ce666b3d8a2f6a8b2bad51a23ba6f6297a9f1d06c909c50486eb24d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699c12bdc9e4afb3659fd22b8aa6fb84
SHA129579da047beb43ea73b7c30da11d4e10306ad79
SHA25646cd0a82069a23313c096a11090c3f018d2946c1ba41a0f5c6e67f374217eeaa
SHA512b41215c4c9e42b802f58f0b3f8777eef0661e6c0667c948da81ddfd47c2395570fcc2145f49a6af2f4138d6726ec5171e58c354dba801186e5df22b972a60bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22b6100fe2024b3ead1a2412e85faa1
SHA12d114105c32b1ffaefcbb7c9edd153fd3dc8fbd5
SHA25653ecbd928a49d5e7d85831ff0d0f0c1d4705a19cb6633982e092929350499970
SHA51231dab9468e0c7e328dba73c1a565d0170b99930362f781efabb78dabd5cc7d0706918cff9c88b703548e82ab51b03113b9bb6467b782b9133fe9ca1e271b8c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548044eae4dc09af989e12e5d7aeafde3
SHA1c2bc1244bfd696105df367095e9e62555b24d00a
SHA25691bac981ba88f621400e6e7afe9d978aef3f2ef84cb804d761095748cfa7e8fd
SHA51291f52edef90701bf0dd9c2009170c47fdeacf7e3897d8f618ad21bfa9ac45d3a7a72a7fa755ee56cc72aa1599f427699a0aa5f15f53546ca38796183cdeab411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30b82a3bc911a3d059b624199bee799
SHA1159ee0678869d160975bb2d88531de3a3e20954f
SHA256f51f5d21be0bce6bca2742ab628f4f50318a425284852fc38b09ea04a79cc175
SHA512613fc86cb626254b36ee270b5f2e1bdedc571f698afb8bd8067b7094dd696874741c0752239abafe755048f6976a36d8a8a08f9020e60d17b0f4f1e736381425
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd8dff1139b67bb33bf0056cb51b520
SHA1dbc03da49d173ba4faddee49a6bfe92555a5626b
SHA25649274fa0c24ce47dba3fc916fbbe2f36df2ec94decac5bb2983c59945e595360
SHA512be4e65563900426b94ec9c6e6f60357b3120d2d943b58eea9c8e76651e4426a70bc429a6ddcfac763c7b594228c7021cb23027a42ae1698a9c76b8d516290903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574a7b1a3b6ef5d7e8ee6d525af9cde8
SHA1e48d99fdf877b6c2a3097f2a35246904852d8826
SHA256985fe1f881526f64767bdb6fa2238c1624cbca86f98db21884dd410bacea71d6
SHA512ddb1d448f85bd5a37797ac50be65f542ad09a63567391057bd994beb535a1ba3faddb6d0e7753980e5ccf444ec5bc04816d0b3736cfbf3bb7cf0c501c1348dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728d514d927a6582df4543d001ed092e
SHA171dce7bdffb9b0d750656bfd1edb79e637e3d879
SHA256f88434e797a134aa615df857283ba3a4ed6a67e472c70b4276a9ad629a299d5a
SHA512e4caa42d3ba4d04f14abbae69dd62cd80692b47946338edd7005e9913e0f992f5fbc8dec9f072ce28eb970c7d7b5a99d2c3332eed8e5794b03a54bc1a37b90e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5312238914fdcc4ac0512fe1113fa66
SHA1015701905181010f7ad98f834d3295d70dac4ceb
SHA2568950e442d8d08a6eaa9c84aede01e113504aef390ad29135c6c6f52ef0ed82c8
SHA5128b48f88fb1534330c973104e9ffe4907380467c6883fce2badd389328db9246460978ba211fa79c2a8a2a376b08d847b83003e69ddc4944176abd2d7a1a5ce81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ad1fba64d411a091a91a63304f526e
SHA1ccec0db3feb83b00a4d62897dc0f748e1496feb4
SHA25640f95885cc3d898fe814d6c3e68f753490073792d5c689412a0f2d08f6c56ca7
SHA5127c45195bf2a6e4b512b204eaec83a6642bc7fe0204713d3947a4b32042cf6f112b8243127d76a99cb235f7488859f17140f41849e89a4b6b614f7ffca3bf0fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850f0246ea9d25d078dfe133b5c3d7ce
SHA11e8a5918a19c2e9a32e614cb0f44ef16008328c9
SHA256f84f8050fceee646d39bcbbb21de6f9630f03ba5f25c99d154103e78b1dad57c
SHA5127fe0599948c3f43d3018c0ed3521b5398c9252102640d40008cd6d38a4ef8630c6585bb3de30ec885fd03b12caacadb580f2ab2d5b70104d2bf116fc19738647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae6acc0395eacbdee4ddfb6c049c681
SHA12fd459d990506e0cea5680f067c26e00f0432136
SHA25603b4679dde48618cb3a5c1fb2e096a069d5bebdef0c035ab15f7e8f3346911bf
SHA5120a8df1b5d3aa90c082190d0546008de25f6e3ccac87949b9d068c11734baaee85a7b4fb82f2c49a5136dc5cfe6bc07a778a31ef88a7ba40af9f15c582cf333c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573792aae632591c2eeac18f51dd073b7
SHA107a784fe1dc0dbffc1333adf3553415390da7896
SHA256ae7b2ccf53e456f8e8bf3ae186879d384c662205f505e08a84bb8f1e2d1d2710
SHA512c7c57637fffcdcc15d5154cfe1fb63fa10c645e0e787afd1c684b9371b39a31150cd9e252be574ae87ca2f93e76e38a99a824ce420ebd6470ad4d07e2fb22e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed37b28f764f7080aba2109facd58cd0
SHA193a97d7a2ad606d57d8f688a2a86c1ce0a43e17f
SHA25638c5f50c72457baa52646f24310f8f381d24bca7c91ea4536b4045a6b7809e00
SHA5124ce3c3e4f6ffc8b2f3fe8f7e9ebf35a1a07fe62bf6e2ee16246f7aaddb1b49c6af8d70ed7d1d2b85466f045142f54cefcab93ddf12fbf2ebf979f236f00d7d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD573f09c8e22131cef4f54438fc2bf939d
SHA18e15c4b76c782750a789c8f7f669dc8f42299c0a
SHA256d34c119ef62d46d5b29d02c858ddcebffb5f8e45b48ff90b4fd51ceaa8e1130b
SHA512ca4bf65f671e519f294fed8fa76dd7a8279814601cb1300db4acce4f36f72529c2ab9c256e79c31278238911b6f4655784290426c07e6e31762d0bc4f75d8016
-
Filesize
224B
MD5318190b2a45ea14aba66871d34a08050
SHA18f124448e41c14acc7c2004123b51058cb539034
SHA25608e77b9d730f2ab8915c344c34738f53c91290f2331539ba068a8ffa61179245
SHA512f10d422cec5c6645ef14ea60d5fbf8212428207d1af52142834890671c478ce675a7cb57e74ddb220437ae0da3f1c39f2cf750f6e00f46f1eba85abb54883bf7
-
Filesize
437B
MD5293068ab2c7610de97e67efabb8fa515
SHA12e485642ce032392cd5ac1b8ef463f4fe48b3318
SHA25626abf6302d850af96d9baf1450ff1f6cc16a5fcc23abfe061faa6cd5b9ea3526
SHA51273152b3ade38da3e3cefbadfd443ada16e3b17f92c1143748e8c62dac48aae08b71dc458fe9ae17b8a14699a9bc47f01e182714c70e6a4b69b51d9217e3badc7
-
Filesize
437B
MD5d04b70b1cb4f39b19958a82930a7abe8
SHA19149cbc3ae9c9647d4192ab9a892950c80802140
SHA256106d1d60f5411cde7b4a0fe079b5346ff0a2d926dc78548ea75cc66e1d9c26f8
SHA512ad682d00b0419c5b9d819aa17903df22f0d88c36b7773a9921ff35df20345079432f7aa44ee510b276cf357eeff5003f27f4cf1813cf9deac5affd4ff32d69df
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\9F3DH-WHDX9-7CG66-F4G3J-99FEC[1].js
Filesize140KB
MD5b1290dfc24cf0fa7fc8086f1b9dd99a3
SHA19e3ff4c4b46853c46fb8f6bfa46939b92b1bcbb4
SHA256b38b56cc66465707f7a28c32aaa60859276bf30d268eb6d3a90a02bfb6d74ba2
SHA512f3fad1e09005557fa72fc402fd3024c15350a5c30a3532989253cd4e9d1523719b7c7c6a5ee673a2b86b61519c7e3e73febfad60527f9774f59ea60feb7288b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\OtAutoBlock[2].js
Filesize5KB
MD5d20dd37c0551ffb1ddbf07bb14eb8673
SHA1ef2d7f3f351d4f066b9b114e45ddd1fff86e9da9
SHA2562dac11b6349b6fbbefe783a2cea3f35e8a9f2bd7e88a786874c0928700a9ac70
SHA5125504c2067982eb19c8e4aa929171d3b4d2dd88eb059fa4716b83f81e72fa67e445868a6c4715276c4289c931ba9366cec4f839cfdd4990c4caba76f16628b6f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4JZQ5QLK\favicon-32x32[1].png
Filesize1KB
MD513e4a579c3cfa586f665ecd794e0462c
SHA1b629b7170f76734c495630191e665b6a88024268
SHA256a961b4999fbb3ea58527df10b36cfd5c6ac7cf9fd12a0ecede32a8f7f48fec30
SHA512813d424cb854ecda3bd1cb73e87af2e1072364e5e6345e2a7ff0c93cdac34628146786f1f5fbfa869b95d72ff0071414af13c4453545e76b3f627c1343cbdc8a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\all.min[1].js
Filesize178KB
MD5973473fbac1c0e0cd82cf83bccb7247c
SHA1f4cae9ffba8d2ad240555ef9716aaf33f391fa22
SHA256b1a2c56a4fae2771514476846f64219f23ba473ae10cd0accd1203c9ccec6e22
SHA5127b1660a2c6185be9e6bd7bf186b54ec53e278f5cd7c0f6d94ee42d75cc3aa3031fa610a362f2dd2f640b79a2dc9fa03737f6bff64d1ef8c96d010de5c511250b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\avira-global-website.min[2].css
Filesize624KB
MD51b90822ba21625b02f9e17b3124d01dd
SHA19aa240d86b39e2ebc6263bccf2325674b1f488f5
SHA256093ba3cb28fd20ce50083ccaa5bff704098fbaf3c3dc8fdfa128c8f23ab37807
SHA512ebd4a5cf91fdcbb3a35cc0ad2ac99e4917d3bb9b290ac64df6999eb5e3827aa22a450b6d095bf3f10e649bd1cc83fcf00dbdda66e79181c5b39b18570184138e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\avira_targeting[1].js
Filesize13KB
MD53ce6674fa9a054e053700e5da7dc7f55
SHA148cbb4f34a190e35c5fb5435806de0d84f9014b0
SHA25620c2afd6d70dcbc78e9995631dd355ae1bb8499e6f6f8ffbfd916f5287ee862e
SHA5125a8049f78819c58cc38db5175eec815895a2d4b403dec2238d09832de962799b793ba5a4a02eedc661dfb7cae5fab3ea9baaedc09a6d8973340334f02a13fc6d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\jquery.min[1].js
Filesize87KB
MD512b69d0ae6c6f0c42942ae6da2896e84
SHA1d2cc8d43ce1c854b1172e42b1209502ad563db83
SHA2566150a35c0f486c46cadf0e230e2aa159c7c23ecfbb5611b64ee3f25fcbff341f
SHA512a55f55d56899ab440ef0cae17b28d5cc8f5b9766d1e9bc1a8ac6b89376924b476c1ab0c325497eb5d44af41f4ebf8eea236d87a36902244b8a3eca54994b8711
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\ouibounce_min[1].js
Filesize1KB
MD50067986dd93b7869e9dd229ff44251ac
SHA13e89404238b959ac1d3c113b21cde64ac95ad267
SHA256b74c3b8c5f786bcc4aa29f55ca0b178a0e2b5fcc6da3057a121bececc1b572ea
SHA512dd84f6d85c350145b8237c30ee644e53195e5ff5a11d8d6e87a65b58be5b472a8335cf1413c5107f8a2d4e272ab69cd711e49ad82b77699ffc8298d572ccfd2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\components-all.min[1].css
Filesize197KB
MD502d116bce543e6bb4fd3834eb5e3ea3f
SHA184923d89ba1f7743cc10a3f80afdcfd845de5295
SHA2563f858e488c447a1120d57c6b4ec77b74d35a142ad89ee7570a53b63cf7d4d89c
SHA5122e222c3ffd723f3df119cb1cf525207481d10059a723b7d2a3ebb126f49964565c06d4f8591b9617f6a166b2cc84fd160d1a93630426b72695c163447d66ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\gtm[2].js
Filesize286KB
MD5b6f90fc8b08f8596cbf44a4b5a08c81c
SHA171823a7c62663ed320b9fa371bb78c358f99c05d
SHA256d635e1e7e84a43faf91abd7d9bfba025a1e7a6e660374e50ddcb004cf90ca858
SHA512cc4391817fcddf058a8a1cea8286a5a68dc755b61030cdcafafd341c4786ab6a2553984d8fa3d574b70aa05fa33a88051f0cafeebb6f86b257efaa47f810222b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\gtm[3].js
Filesize475KB
MD59f9a80d7b7ce565909c2ac333d98ac35
SHA1a3754a3a7aa740bd0d10309eeb5c7527f9669dd8
SHA2561949de20cf8081daa57e0e3cded5b107ad2c6cd27242fcbef06700dca5bc85a5
SHA512ade34af7df42ff4e970a90b78bb709940da8698d65c899365d6f6702cae60555a0426a7eff705e4d52404d4330930f15b3f29a8e228a397521fcf95da3f3b014
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\one-trust.min[1].css
Filesize51KB
MD539ad837e1a331dcf6654116073a3ee0d
SHA105e7811d2bd3ccdfd5bc1ebdf063c86cbd1a4e0a
SHA2567a905ec7808e96434796bb7c6876f39c05f4ba72b2c54cb27e9e87a7fbe7127a
SHA51232555fc33526c8e0aee77575cf25694ae81358cfe2105720adbf96f8f9283ef1d113a1781709d2123e61518baf3cd0a8eca4dcb43a193b2b13dc119b13f470db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9ZQLLOZN\otBannerSdk[1].js
Filesize421KB
MD565d6272013fd813bcb3bb059c3611dad
SHA1f3d451ec0b826d15f1d7dd7b6f3f56f9d5fddc4b
SHA256ee39d0cbc9e9cd88b7dac8ebca680b89e8879081f855152f21772c7834474437
SHA512b800d2bb9d3100ef9baa8f095e5f574ee665414664ced3f9e334725ac155a419dbbde7f242b21e8868038dbd9e9f1eb4ae9dec39b3c39f98a234cf9c22cab400
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\otSDKStub[1].js
Filesize20KB
MD526dff7b84954ef35ed7b3c7e01c4c08b
SHA16a03338997d33c4ebf80d3d6c30a467cb9aa5488
SHA256022e2f39deba7f332eabe69b27b31d98d4d5f2535116745957a691d1b1ec4cc5
SHA512ee5c7768b702099d46bc3620319e378a528fb5724de0a9df8166ae92364956b3e45ba717a8257a937b058664e60dff4168f72f184623f95902ccd264a63c57ca
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
57KB
MD59569955b425cdad3856675b8f89a40a4
SHA1ec2e5e0b06186ced20665fd9b7cac6cf48ffbcaa
SHA256a1159359103061976efa95ceea59dc331874b24deb88e70f68dd2cd8c0a26c2d
SHA5123cb96f9d439f133065570b62bd150ffae642d772ecf6af7183bb071beb454c1e7b464eae1fdc19475745eb22f5a8a4e6b9d4acae603549cab1eb333af7c60f03
-
Filesize
60KB
MD5fa27eb9921f7ce4e3d89b22a74c916f0
SHA1e3e3425644b5f20d2032b6c3ec196ed53cc1e1be
SHA256eb0405770aba941ab7be80a6d370c150359dfb6343033f33afb5d259a93230d1
SHA5129aa2b0153bdabbaa56b62ba8da4cf1437871c7d2406a5b180e42659484e1ef0119af9dbfca0bcfec45121e1ac3e6441d3bd5837d40c5285fbd803950e51ea0f8
-
Filesize
102KB
MD559854a7cd5ba473e447209f3abba76b3
SHA1c77c85fec27f8ede91059b9e82cfb46ca507f29e
SHA256e3f74921bbb228a0483cdf08e3dcb5a2443ea9789cac0f1f2f0f5e20fd0876a2
SHA5124d1d2a4647f3eac1ad4713b67c2a7e40af7cf1ab0c32bc420cf563e1b69bf92275f3805f500e1eeb01f392eea5edb7fd8b656aa2ce8879a00131f3f5568f4eba
-
Filesize
55KB
MD5536fbce0c4dd884c1c401e90843511e4
SHA10a5b155a2102ebb532d181fe668bcc59c799020e
SHA256e35949787d9eb8443721c3d4eb057cbf03e7ac5bd7ddfab8d59360dd34cb2285
SHA5126817685f0eb57ba59a67838992a07fb717f1254d63b349a04dd4dcc19cdca1c818fa10236fe8d96fbd75f37169757396576afa8ebb9b0d8fe8122499bf994c54
-
Filesize
4.2MB
MD5796f4bc300bbd6542f05010427a71f46
SHA14a7406f9ba8242e2f222760bcce920ffa4ee26f3
SHA256685e9b8ccd310c4a963ef9568562c50314653c0e161be8f04baca0adfbc4a370
SHA51260849dd52d11b7569b38b7a8422bbdb6d379365ddef60b0c9f60a9b2228e72dfe820921f5f446b42085062a8bdaefd5294e30d99723195f278198486209e65bc
-
Filesize
90KB
MD55e276f7c541600573cc335d0c40a5e2f
SHA154b1772f0e3cee814e55f5edb92cf67123830e84
SHA25696293e83c8abf3d7994d07a63ff082a9804304bf9541341f1761ac46c8b31a09
SHA5129bc134b7f6eb88ff27dcaaf33f4e5949970644cb0f991f8d7c9c3b62751bdf105e3c3178251726485f7119c93ced9758d5549c3ef8cd57c2c2c5b032bac8394c
-
Filesize
62KB
MD5a3c00b9e5f24bb4b9a6018b65e57e23b
SHA1ab426190286517a5f7f3a9ee4fbdb499f71c039a
SHA2569fda45dc77a7e61af502f6a2ffc5473bf030a0c0dd19d6a74effddddc1fa1c3e
SHA5128c50ecd1579348efc27d79a0e2354c396387df832539cc4ff007c56970cf25523cce4e861beb96858d45c7c5e0462dd575267ce6791c47cc0b5ea760ab7a0644
-
Filesize
118KB
MD56fb5552005de48a51aa136a37b9c7661
SHA17c3110d93910a6471444cc8a7f78c4ddb437f1c8
SHA25666a74a6fad27d5a79b2eabfdadbde883875b581043e2b590ee5e54f728c877be
SHA512f9e60caa83d3bea4154c777f140c54d4e5ad9e37024b1b5231f8c29bbfe3273b8603e9e1000560513818c6ebd2920c71387b58c7c1da156022d595a749fd0983
-
Filesize
109KB
MD501b9fce9f7a7e8835f518e5eb36b1f06
SHA1308beef876f47153e1777597af4a771247756bb8
SHA2562d659611be727b6a4c7ffc75bad59f55099779311ff81a255554663a3f21cc19
SHA51281b4e25e4878581a10e5ff02b09542d898953db1c0a21dd04e5d5fd24428456d8c224607b71adfeb0cce093a666b0ceeafba62a1eecd64c0ffe9ba5139ce5d5a
-
Filesize
117KB
MD54ffbb2f9c6dd7f9bb2a9b0f31f9ad4a7
SHA1264efccab79ae74b1028ee2bfeb61a7de7fa14e6
SHA256b6e867b044fcfeab09854125d309fc2b9fc69511a625aa80961d482c61a2b87a
SHA51234e56c252ed4567599946285f09c7f9a8821c6aa1afbba2e30d3088d403f97f158b9d96a415ef157e4457f213a14e75a2e231a884ef5ed685da9c890f98a6ff8
-
Filesize
118KB
MD5e962cee4cd309b1842cc3730473abfde
SHA1cd6a8fc5ca5ca3e6a4c9d761a9fd661b5058189d
SHA25658c03fc0e3cb51470ababb971c2c86c4e66404d34aa659227d062cfe7acb3e97
SHA512edbb69bd4f48f47bfa45770c111589332659c9da800fcec82a8798136ae781311d97ec40587808edfc90bcc48f95f91da6757f1ac9510862d0063d8ccd1c45a3
-
Filesize
116KB
MD5b0ebea8dfc8a27a599492d22d7896ac5
SHA1a3e3bafb1bde3a8c517085ddaa45d21d60b2f163
SHA256febbda57a25c1d1e9edc16dac893415d9635e0d8850fdf637acbe3b4a0bc16b9
SHA5121f56d1652e4b9022e249702a3602bb61f3a74f76c0dacfd93e7a98effc8fbdfb08b9126521ae359a9f4f9dff1e895d53ffed61a86fea8fc10d17cc03b4adc09c
-
Filesize
98KB
MD5bab316a47d899ec809d378197b865ed5
SHA1eced8ba44ae14815af19386a0e2d0d8ddbbdb9c0
SHA2564b9cbd651f9d754ee604fab7a96da4f9889337323bfd47c7c279347234713f67
SHA5123d098049409d2680789c39f1f9153e5f572f73cf65f3f8b3cde273e94869da04ce0ca2fe5453d07ac75244880f37ebdebf9b87d4418b733ea43cd1f08ec3bd83
-
Filesize
51KB
MD5f908a7187584f259dc8803c19f483d79
SHA12d023395d241b346db83d762b30536f6d9596104
SHA256f75a160d90a0671a641d32c20ca659d184fdb48ddb731fa66c91fa0f52e2cffa
SHA512ddad626dc4bb9c4b8a99f0ce68b8b0497b36128dde19a3edd6305bbb69aec56626f98736089a906e4238345aedfba3343e67710989840c058d6e4015441e4a0a
-
Filesize
114KB
MD5f4717f92606e670b81b64e805963bde6
SHA1e112292599382dd9e68ee594fd1f7b0e52414429
SHA2565f47c1a50ebd772d36b1b4d42f9a972e75d5d490c352538a344ea208e9febb53
SHA5125b76f7db5bfa90048752f66f5a60629a77491a5dc9f74ed029b6e781ffe0b9474439b68469983a995685ceabd468c81b6b6b4189e0d5381c0eda2c62cb923dd2
-
Filesize
4.2MB
MD53e18076949b8442f0fcf3b9bed541f75
SHA1214c86e3f6c282d6e66678da475cfec98204f744
SHA256a61ae6fb79674b6beb4f80e8f05274af322d5e2943783173bc7a2ee9d71300db
SHA512274cdfc42f66389970cb807aac0dc3075f54530f87cd0c0fc94436b65aad8159aa0e2eefecfb2fd56ce18c2c0dad49b0106e39df575371be6bbc143db3a988ca
-
Filesize
4.3MB
MD53e32829afdb23d84a1b503188ab74557
SHA1e5657955bdb05f6f36a656f0c0c57bf32a6d1da2
SHA2561053fcbef13c5550b323a271ce2b2de90f3cda2dfdc153d7d85c903120a39a7d
SHA51200a46aa7e1ff03cdfaf773d12d3f7bf93f256af46b6e47e99c0cb806d1a21fe767843d04b8c6e3a9929843e1744b0cb3af2aec29cb6b0c4018a6e7dd71cea88d
-
Filesize
100KB
MD59357e22156efaf6985a3213fdfafd27f
SHA14cc7152243c867cee86ee036b6dcc211834452b9
SHA25653717a963b22f4f8cc60b1ccdb31977c3ce039fa5323ccffbf92b4b916922c2c
SHA512b76e6015b3283ce413c133b23818bbc75e550942ee7b594abfee3ce9490398c62909365fbc5eb5cc343cce8d4038c6ae2b2b7c3c4b8f2297051b77586a385f04
-
Filesize
100KB
MD55ce66af34467507f24d51f04c21b22f6
SHA12cd943e4083739dc7eadd57b4ce046f32cc5f5f8
SHA2569f879694ed488b088de6befa8cfbe61c9cd960daf233e71a6983ee1c55823382
SHA5128276d6a2a2a423638e7fe539e2ace863a8dd8a57ef434251b8a282a4d32368f2abeae7f59e3f50b29d449e5c437c25551080cec778d7579e16fce05400ed701d
-
Filesize
128KB
MD554876bc4ee48587d8a4400f22dbea0f3
SHA17609160446f36bce7c1f1cc65257c513dace0cc0
SHA256bab9ed44491d83cfbc517e9bf96db764c2c7f1a305de4dc3b2893e03556dc379
SHA51282fafcd487eb0ea3bcd3fca235e99c2890c53c4d66ada5bece415067493182c0ecfbe94a017a7fe6638dba4cd90524628f05ff82ec7743c76d332be973e604ca
-
Filesize
118KB
MD578005044379901d9c516612bfb460538
SHA1752daa9946040373a651031008beb42fb3f2d957
SHA256d9e97b380213f9a2af7e9bf602e4768f999886de9c4811151de9771338a4d1e1
SHA512ad73ae45cc7f6d7271501e1f0be4b8807a7346b8d451d7e7b1f1d77ebd78be506a08f02a4545cf48f61200dec0ceffe90447c66a93d4534956350a6acef74340
-
Filesize
127KB
MD58cb49466668b81e8c804e3e0e39f17e5
SHA189d3e4142c9cb225553140f6245855e2a4623b9a
SHA25654af71357abfaea979f7b34dd24ebb2a70c633e452440874a4e52af19c9dcb90
SHA5123515790c17c9e4d9a6558c782d0d3fd170616058dd5f671ffd38e8225221ed1c23945fa33161bcf79b82fc02a12ca5742fb2789cefa6733ee6e3a1896b9c9875
-
Filesize
128KB
MD585e61dc15cb7f5ac8d79ab874e72b984
SHA18a7f7a2808ad0122fd73d08b8f4ea2e9e8aaa82f
SHA25664a7ad2ef44c1b981e20936d7f40a87aa30feb88ca512e7822f92784180030b5
SHA512f54b2e70584e3fe6c685a83e519c72cd256dce4a98c96ed43650f4312cb260a4dc3da2830918e004d31083e46085f86f1b78778dc9b91a18b11ac8e27d629313
-
Filesize
98KB
MD5f25aac1529cd06a979ffaa7d7c90f9c2
SHA1278235c7331bc1a10c9a0a0d2e166d2fc05ef87e
SHA25680d6e0ebbd9d88196d8e87711f871a42d76bded54023b644c1c56741b0c227c4
SHA5122bb2ea7560b528cf0907901d5dc6e392afc7ac3ee85459572690feb9300ae981191f35ef973debe9b15f6907022d6f5eed78d760933362f1c57c1c8f7c09226a
-
Filesize
107KB
MD56852bd59437a4ba616c8cbe025407554
SHA1c8734de71c4e14dbcd6555e5f72c7fbca237490f
SHA2568f7dd216e00110c340337319948d8ec86cfbfe6b450571032941819efac48c4b
SHA5122ab73a5b0d2aef8229c403c41eb9611f6505fc1164e3a42e368c4f6107367ee06f4f7d59b7b1c51a50020a54879f6c29d38c932118feaf515f74a23b9b7de6e0
-
Filesize
107KB
MD517807c2f585d76b8cb9082d1848b6ea8
SHA12c97e30ba17bbe6e1393192a0ec79c57bc3fabed
SHA25628e47bcd97be61d808da5719ae44f028c189538a147a66b08283448e4f25a401
SHA512c66dc74e3f433a7214d122b28c1b9c443a7f6faada1aa737c6e84cb69e6732193957538182edccff0d74bee3efaf2c01b190635c6c5844631b703fee50f7cdfb
-
Filesize
124KB
MD51e02819a57c828108f723cef03138e82
SHA1ee721413ff9a0813106dd671f097c4b066161a3e
SHA256fe029fc0048f0f59ee5b431f9429b7b34320a442a9939b526ac73ebb94f3f5b0
SHA51207d13bdf7e2fd80bcb2a9c5cef8c7e219ecd6f6c8974b0a6e63835be7815c47f489060d5bb1cb003502fdf3131de48268b5f698e650b89fbfc80905dfa9dde06
-
Filesize
4.3MB
MD5f0105ce0f5fa125152805d282c44ebd0
SHA15a1dab9bced97ac559594f00974aa04fcc2d31f4
SHA2560cb0859b4cd8d0476528753ada906edecea547999cf6089ad02e3042af6a028a
SHA512f1a7bfc5efbddab9662753ba35d1158c40a9fae86f4c96b4d9ecac9f2ad5ab4f9adfc55a503f35132a015a9c4363f7f8648ce2a6f21678901fce6d836f659d54
-
Filesize
4.3MB
MD572983714a18fb18a1aeb6f830441e7ba
SHA1cf76a94f6a95e59951617fc9075a5a1043f631ed
SHA256838e0705f281eafff62220cfd82332ab2e7264744c993456120bb3c9e2c70437
SHA5123fd802d40ba887d7472ebf902bb8e4c709c9f19183fb5651c6d58426ead25099f10bfc594c23f27bf75948004ad80f1c5be9f218175c59bf9387670cc01b4db4
-
Filesize
100KB
MD548a43d98dc00f614b7f8a42c239167a2
SHA195d7d615057ec63066b83bc9ad73ff963798ddc9
SHA2565e266105c9e2dce04d182081b3795617a8880b418bffaeb64788ad0e978a54f4
SHA5125704f4641e636c114a34e7d0e8c092888a50171572f3b8c30b62825aeef9c4c731b2679d94ed58f3674fe8dfdee805212a43fe48f33eacc34cebff37ab92f0f8
-
Filesize
100KB
MD5c9eec0ed69a96652319ca9bbc47fe61e
SHA15a6f6c2ccc8e5db52e8fef6fdd09ac01c66de64c
SHA25634366ab7e72ff839afaff1cdfc17fbb1c2340c4b96d0140b75bdaff72307c679
SHA5121732062603589e80b7f2694a9139e19f7d19daad6bfb7b2a5ead4af87ff45317ae184822c3cb3be776a302baef9a7577c60fb15a437923d63d2f05d631a2304b
-
Filesize
128KB
MD52b4dd2aca954a7869059c05bc0d60098
SHA1f47f009a5c7d2d5d79630769fbf947ea8ac9e48d
SHA25694d83d4fa2ab984148b8142fdb696e2953766524aba78353653e7d8ce42f4f85
SHA5120a1b379a8700f09e290668900d62de557e4dfe229a1721ab0ccde34b1a719cea9d6006ba8a07dffd362a5566e2eeb2248416af5be06a98cffb39f305c92e8e52
-
Filesize
118KB
MD586b7f59fdf2d3da8d40ef15af1b427c2
SHA123cfda1b55dde601eba05f2f32e1724171593114
SHA25658ae73ce613ab3efccac0edde06f6c4092bc5c77705119ce005a30e6ceca7d67
SHA512a9de4de333f17ef499da327cd7376ad1e8b5ae2408745df9ff10d965d06d9691f42238c85c1b748c5aff21045d32e0fea06e445bdf6f1b61366c581b5e03bd8e
-
Filesize
127KB
MD5ca880140cb9bb869eb6dd2a17cb51e36
SHA11d81dc30d60f4c66b2bbdbd49365e339aaf87820
SHA256d0b1c33603377159a2f6db413c28aeebed5180902627b7988ac2fa1b75bbae6f
SHA512297f253831ecfe65e6e0b4893e92ed0c0ca1c5c7096944f24d2f566b6e1df7b186630cfbf48a3d2bfd37013b110cad5c860011b60e7fa1f39a14a9c9f1c822ba
-
Filesize
128KB
MD591635247eadd8e7940f60c2a7754dd83
SHA1bd0feb5b4edbaae0017e24a5dd3b2e72aaa498ec
SHA256f3397af13b5214e5003e50716e6e2fe8b8dff705051ace3c23e0b30a858bab46
SHA512e0b17439440d579fc5fb0607aa686b2326e2201c2629d44f03ec03844f98fe97b3da172f6b3f964a3ccde301ebad50142341a7de238a1b37e0bd31ff67f5997e
-
Filesize
126KB
MD5cfff26c7a6f752d36a386a125c38dc70
SHA1eea5660cf3e5abbf36a55aab1580f6ba9780d94f
SHA256789ab48faa120b774e9ad883764b204a21439095047962fe1b2954f018739dc4
SHA512ae66f58a303bc3fd6afe576c15e986d0c7fcd979cfad7d16a5689890e36a939c45e10b0cb89e351171c497846af16247413e939e9ba13c33a16f554fca7dbd69
-
Filesize
107KB
MD59fb6e6e2c7b577f370bd85f36400f27a
SHA1bd15c822fddebfad67ea3883b7ed096949903fc0
SHA25682a3b50b8390b058e913918b27d102e101d66cd87567c2ac61848a9c34706ba6
SHA51285ddab53cf2c25c918f1af297b6250fe4b5d01acee5aae2a59a28752eb94b9010927c27b13df0bbc63b15b94348231e284ffa3e01c933da33f3e54030d946bcd
-
Filesize
107KB
MD521075160af7817b583eeca0e72016165
SHA1ed73e16961558739b431878e3db3c963d9978d66
SHA256b5e3b2f76abe56176fb266d1e68e7d263177fd1f631e8c2eea6e7d019a6e0357
SHA512fd1fe6c8054c41af9cb50a0d69670fb226448920df22cc2923209a4cfb8df1660b356f917384fff25cf7a9350d02baf5b7c8714e54c9bfcf4f97d2bbaa5b597d
-
Filesize
124KB
MD55bce2e38fefb75d3c630c9690eda84ac
SHA189ba93c0a558fa7991f2aa7abb071f7b04bfe569
SHA256cefe02f8dbf837a4721d25358a62465f8a00b2784b179f08c0791dea5d042edb
SHA5129e4b73b15fba1ee1615ebaff90c264673860cc0cba6c06cca574e58a97d22091e10f81a1e1c8081530ff7f3d2a054709f37299ab0e621e2e8ca0e8ed5cd26eed
-
Filesize
4.3MB
MD51d8388321e4b2cb138f4eef45e7063d1
SHA1b87bdf44c5a80bf1c63191e9c1443c4208d46f9d
SHA256cad533db8c25fe35b650950338661f1ea1c06b0ef9dd0d1aefeed85bdb62e9aa
SHA5127da44f4dd5f13d2ff42aa050eef2a2d95ec703d37d9d172d9d1a6fd7e7172d4a48a4a359d5fc6343139b08cb93a5ccb4a2f354ad57bcc9ad1036f3089b1e0021
-
Filesize
4.7MB
MD50e94f39308b59e04397561c223128224
SHA11ae1fc05474c071574777f29195f88f6f76d7772
SHA2568f6f153c6abdcc55471a0dd30f8a2ef23eafb6a8b3150ed5efef0b4b21eec852
SHA512523549c3a235817a8c242fdd8881843657dfd3bc7d2191a90659faed36c621a56a0322a45138af0336281725b5bf810f12ed1d0c5535bcfe5c2eedc5d9876592
-
Filesize
94KB
MD557dc9dc1afa5314f666e781615448774
SHA110191f437a2258f5a814fef8a55fda2addbb5472
SHA256be030e163ac8450344fbaf11aac83ed66459e577b016c667e2bb9952d2391972
SHA51275f1bae1920f6c2a857c732e4caded0294b4335095d7f819d9b1e610f129020a0e5a979307318d4d4b65d47381e8fd27851c55424b20a71690cd2127d9f1ee06
-
Filesize
94KB
MD5afa4f7aa12a7e8e0fd5257a88e32442d
SHA18111a0a373cdc6a9b760bbd8db3115a118d77602
SHA25603cc82f5771b3eb56b88861176e4665577f55e66bfbdc4b31ba4b0428a79baf8
SHA51282308003d8060252b224bf091113bf0cae0f28de3de7dc4643765851a415948e845f00ea6d9208f2c5d9536dfa4a4ee371ff11d408e4a2136c2e0c339fd9930d
-
Filesize
122KB
MD5033a8aae774f15bc73655b76edab6f20
SHA12a26797d80e84bad5d58520d2e4e7a50a744467d
SHA256ab754ec9479079de429ae6bfdebafdcce38a22f171099ec302e0e0718ff7f8a8
SHA5128981084c03b96794b019f70b8a897fa9910700f54a19bf1dc0fdc9e4a4b50ecc31fdec5a9ba777823def57b103a607aa1ba5959e4b276c79585575850b5fedb5
-
Filesize
112KB
MD5f34f13aadf0cd6fd3586efd47e075456
SHA1a6416421f80b60b1e034b23227694005e7c8e29c
SHA256d953c57293d433b292309a6e67c480ec1a6420d4d1ad08aa15f252292f873f36
SHA512d5133e0c1d1f698757fa0071cf9ee98c243ce0826d3f972299a0c9c102a6c0f1dadf7cef5aa1d0d4f3d7490858d10f0fff0de98385391afcebdf753310776cd7
-
Filesize
121KB
MD5ab5e22b65547bd0f51733c65a7317fe2
SHA13154feee813e3a7a0e5b0394d14c7f6fd10e8ed8
SHA256ed11a0e1de162704b9e128c4b21dc34de927b10524b2007486599c103599a262
SHA51224f8fd9a93a0e4d1d40a7e1626e363bdc1ab147853e7610ae2221800bf44b1c6519f51523b2bccec72b8e8a5e8e2134f2c6e8781f7d8cf49d4573e91cd55496f
-
Filesize
122KB
MD50b448cac0db67361ef824b64955fcb49
SHA1ddf034873f21b7d4e3e2f1a363537e6c5e05571f
SHA256d59edf7e6f66647d3735e0e514a4f819c6f701bebd6b15109fd15f4e5d54d53e
SHA512c751cdd870bce34ef5edc6f5c1f0014b1d46ad9fc503a54923c2eca47d8e80895732b00050e80f34baaeb8978fa7647997c7159d5f8ec325cd37f4ca0e04c533
-
Filesize
120KB
MD57457e01d8060923983a60d4ce16e071e
SHA12a301aefd9811a80b828075d30cd6f2463c8e7ea
SHA256cb85f1553bae123b19457f606c14222c29240542026227743741c000a45208d4
SHA5121a6af45b59d9906ff3ecc8314e6c48aecc32aabb5bb220a2ce6f43f3fb905f6e38edfb2f67d879bd4fb8f76f464a9bafae08a399a27b64c3ee41619558fe0493
-
Filesize
102KB
MD5b4a6e1f9cc716eb724dd2fdb0dc2c024
SHA131c6cf3c24f5cea6ed7e968bcb1fbf5f079322b3
SHA25661f80e593e8da55e9a00bac0447e0b5c74b45a7b4a70b9f7cded9f5bc48825c9
SHA51223f53ab447b567bd8a20ce12c0303e12e44dca3e3f228128d9e3d964e9f09405906520bcdeaade7b9c1716dc5875ed0e7a107a6a42cdf8f0de7fcfe253aa9eec
-
Filesize
101KB
MD5745c5071969fab4ab86418bb21af802f
SHA1381b874dbbd08a3651900470f5fbd1bf475f5095
SHA25635e213b24e4b26e35eb84f1af039eee7a78e79096ec957a45c1a444344b8c7d1
SHA512e7ee63f851d1abdd0e02940a40b0d25200aa52c95ddc4bed79c86c4ffe50ace8743dc08a4e979f10c7f927c6998a209340ddc274873d9195bf8b6e1a57e599a3
-
Filesize
118KB
MD5ab19f84833edcb65821ea60010661bdf
SHA161ecd7cee1768a7ca8009fcc583c91511a374922
SHA256ae36659edc957e308d402e76d71163ad1ca408e3157b686f1200fb3236629ec9
SHA5127792cdc87c78bc4aa850b87c81c118b20b5967d5483342ed0408483e24cfd131b4f915b77c3c8fbe47ba219aa2acff0dd078fde175aad902f32ffb21d8c1cacb
-
Filesize
4.7MB
MD54a687d685e0f308fa2b4d1dbb39c696d
SHA1c59592f63fedb6aa1a3fd928829ec8826e9cf09c
SHA256f29fee486276c208ee7cd75abdfce967ada7e4f6ad8dec788be8278026a67e6a
SHA512c1d94863cfdb6d24679500820a18b55f3dc4c000a775f856b1d7b0845d208f89a55261ebc578098ef3a7fdb26bdd8b5b881ee225760cd2ef7a7eefa0ba755ba5
-
Filesize
135KB
MD5baed51e7e16e2674e83a458afe1e7e2c
SHA147a1cf85092f14f8f9a8ba94ee41eee026a8cb82
SHA256556a6bf4fc9fb2ce56ecff07ae01c767e7052d5d72d923afb1f6436a76f0089d
SHA512636832f7dcd4275d70ba2bb0663b817950778e94ff4fad4f5cc6d5acb819198c5002edefa1e58dd7787c0dddfe948a5ce873eb0fbcacff1a62eb65afbda3d2db
-
Filesize
135KB
MD56deb0e7807011f657eb257112fc2fc84
SHA183fca82b17119da334e3bef50e7ee4486a3cde45
SHA2564383765b8b7e5266c238e9f240c7b28ec3861499f80be97d251ef2c3d9b30bbd
SHA512bade10a96e23425f6a9501295b92f2a51f69a8d57c628a76e89ae8c0837a5435aeecceb43f4e236c26e776134a5e4d9dd20e3f3c69550a8d0af23126004b0ae1
-
Filesize
56KB
MD50488c29e07ea737fd8d78c7117a3032f
SHA1bec90e86a202fd2e93ae14067994b51cbae54b57
SHA256f855e55e3a52a7d00dfea3537783fc38639e50ff7e1bf4327dfb00567a568c3b
SHA5121c8450cb5eb556d4ec05c483595aac60932c745ddbed442203cf7d3e3cf3ae4eca6986246866ae731f0e576b9ff6e5a1baedd13bdd0171721c18beb2cc8978ac
-
Filesize
78KB
MD5825bc8d5a3cd634e75395d4b96587ebb
SHA1cfaceb854ae7fcaeac9ead787a15e13fdebe5f93
SHA256d69c85072cbfef32295d389d76b21cc9c13d59e42bbaf2628e4debbd08684ba5
SHA5123cdc390696f628412dc54436086bea9c0c978368d7f6af812fb0a744dafd24beb032fc6117446857ec285f0359f7f419736e8c7efc5317ea6526fb0cabef93ff
-
Filesize
43KB
MD5619a2d1b344edc8c8e7f888fbf9d8dd0
SHA1a3f25ec4667e0508e72e629372dfd303985a047b
SHA25641a16eb8fa82ab567d86a322ab65a12b97f03357041832874296e43759156941
SHA512c90c5900e7e814f1d2c9a99d78efd2b460370f939e0b4bd3cc3317c0584037a540cb115baba80e68e2b5a6358673ae71b0b2dd1103f896b8476263de81b9ed77
-
Filesize
56KB
MD543b55a2726bbbf347173b0d70f0eddd3
SHA17ab734087de6031ce707d23a8617c44efa7f7fe8
SHA256e9c4e036546a578e112efd2903388c39dc1ac983d8b9325c8222bd86a399fb8f
SHA512cc31fcf0aadca43c54bf39085b1644ea380c4135654c6ad7083462cb32f2e4704289595ff004f22e00804b73cd3d04e6ec36e1ff0f85b2b0d4b82888eab9f5a6
-
Filesize
76KB
MD5dd1ab4c9bca7dfb2b9949cf8b6700978
SHA112ad24edf35f75a68bf2a5eb7bf81942e3f52f87
SHA256178e7f87d94c255744f907a12eda8756580f38bc354e9a6c465160a87eb6302d
SHA512915c1596c90ec26eccc9f50123b97ff3d205a23037e9b7ecb486ef2901e509cf640af3ed950df1fbe7fa6c1aba00962f4ca81b2d010a47f4dd46253ed0b08ccd
-
Filesize
55KB
MD5ea6cb09243a21e1834f246044062d411
SHA18d920314db37f966a7092664648a75472f73c8ac
SHA25644fe6b920cff5e8bb4c4f224ec010f8a5d47620083d4d2fb252e343dd784ad6b
SHA5120de75fb95b223d959729c7874054a2127723de83d45c6b9cf775e2003aaafb93d12ccc846f4c9b7ce594440a465c02e7b049024af6328c7385a5dfd999c387ce
-
Filesize
55KB
MD52fbd17242b608b917469bb3214e8e696
SHA16e13467596f901d3297e0d103d0e11ad2cbf7a0f
SHA256a9bab39e29cd49e292a7fb3a96d90b85af29f2db2f9f6c4f8b6f9d518030c4aa
SHA5128eeca0060f3ddb8b06af2fbe07339ced025352e201e33086b5fe31b19077fdb493b934f4316cb424308524e90aa879071e202b9f4e80eed59b412ddff5975609
-
Filesize
55KB
MD5880f4c45f0c16195e88b0a0891313811
SHA1bc73d4cbb9e4a2e112e5cdfde66c1f7f18a58273
SHA256a38afdc0e52cbe83d1091739257b9277724cc71c688ac06b6ece329f6d029b22
SHA51273d09cc9c04da8f8d005f8ed4ab037213ff73047c8cb9067b6e71764e981233a13d7d805b41dd6e7c037a1495819333f0c419e57f24009bfcf9e7af5bfe8f5db
-
Filesize
360KB
MD59e4861645d0867ca16783c1f881e31f9
SHA159b08297365f46a476ccfd20fb34cff15edcefc1
SHA2560fe15f75a0822106d3ede259d0a066a31177fe7ec35e09a15844918a02f7c66b
SHA5127e78da9949c8966440028898acdcd176d6ba86ffbdc27cac6657bbc79d4fbf580c607a9d184699764efd264e8ebfa8aa4cbc94cc43216b02783d1cabd75120f7