Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
717b3807668161cdcad611574a15cbda_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
717b3807668161cdcad611574a15cbda_JaffaCakes118.exe
-
Size
276KB
-
MD5
717b3807668161cdcad611574a15cbda
-
SHA1
afe312100817e1ba3ca346bf15941f54e90056f5
-
SHA256
d3cf35c0c5e0550352c133d7a34ad49eeb273ddbbdad75476fab6e3fd4444bf0
-
SHA512
78ae9d2e02d328ea8d0db745ca988518080bb355711785ad5386718e25efb54748d688b52ecef391c94f88438c801c10119d1b67bf699187e1ff6115bca4087a
-
SSDEEP
6144:MZ05b5Mu5MBZ05aZ05b5MBZ05b5Mu5MBZ05t:MBBhBk
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\gm.dls exc.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt exc.exe File created C:\WINDOWS\SysWOW64\drivers\gmreadme.txt 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys exc.exe File created C:\WINDOWS\SysWOW64\drivers\wimmount.sys 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\drivers\gm.dls 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File created C:\WINDOWS\SysWOW64\wintrust.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\wintrust.dll exc.exe -
Executes dropped EXE 1 IoCs
pid Process 1952 exc.exe -
resource yara_rule behavioral1/files/0x000a00000001227f-4.dat upx behavioral1/memory/1952-10-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0001000000003e80-21.dat upx behavioral1/files/0x0001000000003e88-26.dat upx behavioral1/files/0x00050000000055ce-44.dat upx behavioral1/files/0x0001000000003e98-42.dat upx behavioral1/files/0x00010000000054f7-40.dat upx behavioral1/files/0x000100000000e6f8-38.dat upx behavioral1/files/0x0001000000003e93-36.dat upx behavioral1/files/0x0001000000003e90-34.dat upx behavioral1/files/0x000100000000e664-32.dat upx behavioral1/files/0x0001000000003e8c-30.dat upx behavioral1/files/0x0001000000003e8a-28.dat upx behavioral1/files/0x0002000000005800-79.dat upx behavioral1/files/0x0002000000005805-90.dat upx behavioral1/files/0x000200000000580e-99.dat upx behavioral1/files/0x0002000000005808-96.dat upx behavioral1/files/0x0002000000005807-93.dat upx behavioral1/files/0x0002000000005801-83.dat upx behavioral1/files/0x0002000000005804-87.dat upx behavioral1/files/0x0003000000005778-141.dat upx behavioral1/files/0x0003000000008ab4-178.dat upx behavioral1/files/0x0003000000008ab5-181.dat upx behavioral1/files/0x0003000000008ad9-185.dat upx behavioral1/files/0x0003000000008ada-189.dat upx behavioral1/files/0x0002000000008ae2-216.dat upx behavioral1/files/0x000200000000b1ea-239.dat upx behavioral1/files/0x0002000000005a44-235.dat upx behavioral1/files/0x0002000000005a3d-231.dat upx behavioral1/files/0x000300000000577f-229.dat upx behavioral1/files/0x0003000000005779-227.dat upx behavioral1/files/0x000200000000581c-225.dat upx behavioral1/files/0x0002000000005816-223.dat upx behavioral1/files/0x0002000000008ae1-212.dat upx behavioral1/files/0x0002000000008ae0-209.dat upx behavioral1/files/0x0002000000008adf-206.dat upx behavioral1/files/0x0002000000008ade-203.dat upx behavioral1/files/0x0003000000008adc-197.dat upx behavioral1/files/0x0003000000008adb-193.dat upx behavioral1/files/0x0001000000006423-293.dat upx behavioral1/files/0x0001000000006415-284.dat upx behavioral1/files/0x0003000000008517-314.dat upx behavioral1/memory/1952-331-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/files/0x0001000000003e80-336.dat upx behavioral1/files/0x0001000000003e88-338.dat upx behavioral1/memory/1952-2729-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1952-3398-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/1952-5054-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\connect.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\onexui.dll exc.exe File created C:\WINDOWS\SysWOW64\SystemPropertiesHardware.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\winrnr.dll exc.exe File created C:\WINDOWS\SysWOW64\esentprf.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\ARP.EXE 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\atmlib.dll exc.exe File created C:\WINDOWS\SysWOW64\hnetcfg.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\msvcp120.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\MCEWMDRMNDBootstrap.dll exc.exe File created C:\WINDOWS\SysWOW64\NlsLexicons0019.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\odbcjt32.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\tcmsetup.exe exc.exe File created C:\WINDOWS\SysWOW64\avrt.dll exc.exe File created C:\WINDOWS\SysWOW64\C_10005.NLS exc.exe File created C:\WINDOWS\SysWOW64\iesysprep.dll exc.exe File created C:\WINDOWS\SysWOW64\msinfo32.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\NlsData0027.dll exc.exe File created C:\WINDOWS\SysWOW64\NlsData003e.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\mswsock.dll exc.exe File created C:\WINDOWS\SysWOW64\C_1148.NLS 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\C_28599.NLS exc.exe File created C:\WINDOWS\SysWOW64\dhcpcsvc6.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\FM20.DLL exc.exe File created C:\WINDOWS\SysWOW64\KBDARMW.DLL 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\KBDIBO.DLL 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msjetoledb40.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\userenv.dll exc.exe File created C:\WINDOWS\SysWOW64\C_720.NLS 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\ksproxy.ax exc.exe File created C:\WINDOWS\SysWOW64\NlsData0002.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\raserver.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\tlscsp.dll exc.exe File created C:\WINDOWS\SysWOW64\d3dxof.dll exc.exe File created C:\WINDOWS\SysWOW64\KBDUSX.DLL 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msv1_0.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\encapi.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\more.com exc.exe File created C:\WINDOWS\SysWOW64\oleacchooks.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\perfmon.msc exc.exe File created C:\WINDOWS\SysWOW64\sscore.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\adsnt.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\bcryptprimitives.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\IPHLPAPI.DLL exc.exe File opened for modification C:\WINDOWS\SysWOW64\mfc110cht.dll exc.exe File created C:\WINDOWS\SysWOW64\napipsec.dll exc.exe File created C:\WINDOWS\SysWOW64\shfolder.dll exc.exe File created C:\WINDOWS\SysWOW64\NlsLexicons000c.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\pidgenx.dll exc.exe File created C:\WINDOWS\SysWOW64\Wldap32.dll exc.exe File created C:\WINDOWS\SysWOW64\eudcedit.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\iprtrmgr.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\korean.uce 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\odbcji32.dll exc.exe File created C:\WINDOWS\SysWOW64\tsbyuv.dll exc.exe File created C:\WINDOWS\SysWOW64\cscapi.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\C_10029.NLS exc.exe File created C:\WINDOWS\SysWOW64\mctres.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msacm32.drv exc.exe File created C:\WINDOWS\SysWOW64\oledlg.dll exc.exe File created C:\WINDOWS\SysWOW64\KBDDIV1.DLL 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\SysWOW64\msports.dll exc.exe File created C:\WINDOWS\SysWOW64\SyncHostps.dll exc.exe File created C:\WINDOWS\SysWOW64\wlanapi.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe -
Drops file in Windows directory 52 IoCs
description ioc Process File created C:\WINDOWS\explorer.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\system.ini 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\twunk_16.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\write.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\PFRO.log exc.exe File opened for modification C:\WINDOWS\DtcInstall.log 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\TSSysprep.log 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\mib.bin exc.exe File opened for modification C:\WINDOWS\TSSysprep.log exc.exe File created C:\WINDOWS\twain.dll exc.exe File created C:\WINDOWS\notepad.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\HelpPane.exe exc.exe File opened for modification C:\WINDOWS\Starter.xml 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\msdfmap.ini exc.exe File created C:\WINDOWS\winhlp32.exe exc.exe File created C:\WINDOWS\splwow64.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\Ultimate.xml 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\WindowsUpdate.log 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\WindowsUpdate.log exc.exe File created C:\WINDOWS\WMSysPr9.prx exc.exe File opened for modification C:\WINDOWS\PFRO.log 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\twain_32.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\twunk_32.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\explorer.exe exc.exe File created C:\WINDOWS\twunk_32.exe exc.exe File opened for modification C:\WINDOWS\win.ini exc.exe File created C:\WINDOWS\fveupdate.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\mib.bin 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\notepad.exe exc.exe File opened for modification C:\WINDOWS\system.ini exc.exe File opened for modification C:\WINDOWS\Ultimate.xml exc.exe File created C:\WINDOWS\fveupdate.exe exc.exe File opened for modification C:\WINDOWS\msdfmap.ini 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\bfsvc.exe exc.exe File opened for modification C:\WINDOWS\DtcInstall.log exc.exe File created C:\WINDOWS\twain_32.dll exc.exe File opened for modification C:\WINDOWS\setuperr.log exc.exe File opened for modification C:\WINDOWS\Starter.xml exc.exe File created C:\WINDOWS\twunk_16.exe exc.exe File created C:\WINDOWS\bfsvc.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\HelpPane.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\setupact.log 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\setupact.log exc.exe File created C:\WINDOWS\splwow64.exe exc.exe File created C:\WINDOWS\write.exe exc.exe File opened for modification C:\WINDOWS\setuperr.log 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\twain.dll 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File opened for modification C:\WINDOWS\win.ini 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\WMSysPr9.prx 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\hh.exe exc.exe File created C:\WINDOWS\hh.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe File created C:\WINDOWS\winhlp32.exe 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "8" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "251" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "233" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "255" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4081eeb7e1deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "233" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428108227" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "233" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "290" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000004f3b9fb7ed291faa58e5ce8050f9cca9c6266a10278daca8bd309c1e9b68f6b7000000000e8000000002000020000000aede6a90388c6189297acb437492a65b33806dac20ebadde7bcc5c0d6c156ffd20000000895b18ccbd677211ace99ad4fbaeeef51670732973612d3fe9966dc864ed013740000000d1865d8685c30b0b223e4f48b597c80fabe931624bcd7191bb150248c5b42e94fd5df0c5784962ba183b54c34b090ddcef70693369c5a398250ddc3ade7922c0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "233" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "8" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "251" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.avira.com\ = "290" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "251" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DOMStorage\avira.com\Total = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1224 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1684 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 1684 IEXPLORE.EXE Token: 33 2260 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 2260 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2016 iexplore.exe 1224 iexplore.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1224 iexplore.exe 1224 iexplore.exe 2016 iexplore.exe 2016 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 1684 IEXPLORE.EXE 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 956 IEXPLORE.EXE 956 IEXPLORE.EXE 956 IEXPLORE.EXE 956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1952 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 30 PID 1716 wrote to memory of 1952 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 30 PID 1716 wrote to memory of 1952 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 30 PID 1716 wrote to memory of 1952 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 30 PID 1716 wrote to memory of 2016 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 32 PID 1716 wrote to memory of 2016 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 32 PID 1716 wrote to memory of 2016 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 32 PID 1716 wrote to memory of 2016 1716 717b3807668161cdcad611574a15cbda_JaffaCakes118.exe 32 PID 1952 wrote to memory of 1224 1952 exc.exe 33 PID 1952 wrote to memory of 1224 1952 exc.exe 33 PID 1952 wrote to memory of 1224 1952 exc.exe 33 PID 1952 wrote to memory of 1224 1952 exc.exe 33 PID 1224 wrote to memory of 1684 1224 iexplore.exe 34 PID 1224 wrote to memory of 1684 1224 iexplore.exe 34 PID 1224 wrote to memory of 1684 1224 iexplore.exe 34 PID 1224 wrote to memory of 1684 1224 iexplore.exe 34 PID 2016 wrote to memory of 2260 2016 iexplore.exe 35 PID 2016 wrote to memory of 2260 2016 iexplore.exe 35 PID 2016 wrote to memory of 2260 2016 iexplore.exe 35 PID 2016 wrote to memory of 2260 2016 iexplore.exe 35 PID 1224 wrote to memory of 2120 1224 iexplore.exe 37 PID 1224 wrote to memory of 2120 1224 iexplore.exe 37 PID 1224 wrote to memory of 2120 1224 iexplore.exe 37 PID 1224 wrote to memory of 2120 1224 iexplore.exe 37 PID 1224 wrote to memory of 956 1224 iexplore.exe 38 PID 1224 wrote to memory of 956 1224 iexplore.exe 38 PID 1224 wrote to memory of 956 1224 iexplore.exe 38 PID 1224 wrote to memory of 956 1224 iexplore.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\717b3807668161cdcad611574a15cbda_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\717b3807668161cdcad611574a15cbda_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\exc.exe"C:\exc.exe"2⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/3⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:2307083 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2120
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:1782793 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:956
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
Filesize408B
MD5d05cbaf07c23ce954f7eae048211dbaf
SHA156990f2fffbfc92c3a813f52791fbe88770e7d35
SHA256a48939c2a9ef86ef313a0ab477115a5a4f74c227545bbb795fbf97815fdb2793
SHA512b8ca0767ed2ef2950ca9dba3202e439ab6ee294bf3bde96dc467c0f0890abcffc3fe183213113db7fe1ab35b03116578e1f87b120bbbbc148ef14eb8615c4e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff34629ec65ef2103da7e7c01d07b829
SHA16f215b92885503e76f4314988be270a9a6944592
SHA256386a18aa4d184a0ff41146f734d55c35c794e02a23e123454ac59a3b2595b67e
SHA5123704753c1ef8f9ca28c3067d243ff32a27d04a4853510fd61b3576838c11b4d4e3da5061bb3cb273251333280c55d0d174614dd1566e8f3f24398a07e083c6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebe3cdc41fea51cdb223d1d0415b42c
SHA1711b7bdf65f6e56ba4b6526237309b91eda0f565
SHA2566106ed6b6f798b460d4c4cd83d948c965e15c80af3f3e6c7137ea69cabaaebc6
SHA5125041e2f860adccca22161449f1ae7a2dffd479914ec921e1b1c078705fde0a08e0a1dbbbb65501c353affb00073ad27c37c85f7cd9820cde2e658de3cd0bcec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0cc16996fac2bb9b5e1b9b1562fafd
SHA19d010c441baf66f5218e55bb11929aaab5fb0834
SHA2564922b14a6e4ec95f864d1745ce1a2ce2486146fbea31a00da7563eda1d685131
SHA512ec66aab87a537f3140115c96679d3dcfbc20fffea6eb590a85b6551f86e3736b97e7d7f288a2e28a7dffeea58b31913a35f3eda0192ca927165d54b28f230e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1ab169fbfb308621cf86c8f4b7ce12
SHA1db3871800f01c092334c01832c3de134f4228a70
SHA2560589e0e67f0d1d2b62a588706566abdf6fc449f95d3469dc9f14f14a1e13d417
SHA51268d7253994527e116be7dce4fd7d7b28dd52cbaefcd37d9dc7ffca72fed18acad68b96e570fdc3d919305b43213d48da16c4943370a55110b7b802076e917bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d2040a1df443a68b674991bf40ec23
SHA13c856231a56a4623e3f2bb32947db53c306fa155
SHA2569ff6d65bc76bc0bd6d589dfffb65406b143df28387c70ab94e1b269ffeb86dff
SHA5124d12e0a2df0b9c9e26b3b8bf90b2495e3bdecee8e4605c04dde125eab15066060d71ada0092e72a9e0351f73d4419b8575fbc0b1284b1df9a3f773c5eb87518d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d383d12a4c6f9744f866a7a3667d9752
SHA126c5fdddd7c5faa119aaa0ef7807981ff07fd504
SHA2567a11ba66d068ecbccbe5f6696e96403b771751138b633c342ce905fc08efd00f
SHA5120dfaab9b2e720e40821667b0953142efc57c5975cf524a53d2652241467ba736e683de363a240385e01750ccc97cfe8a8765ba4bf6f14cfea07f91c831a874a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669df5757e04c69ce0e59742c70c8025
SHA11352374a326912db0af87893b5789eb0009ed2a1
SHA256d8a670fa4d61ce1ff305d5e5a4519c5174def53382ec2437788c79e4157aded5
SHA512902285962d2a08a87af52f5c62c306a28ec29991c6870c1e1339495ed467ca47be3cd4c4ee86af6d8b89aa9d675ab8b217f2f8975abad30d547afad4e3f5ac8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1c400b1b1b15fa2b2b81ef0fa71979
SHA13330a4589d7d3b7569720dfb234414a1d8aa62b9
SHA25619226dccbd6c96c5313863add0f3085ba3f4b9bf2224055231901f9956c5fdda
SHA512a260776e660d42140dbfe3cad6c8319eda19e4b3fd45eb3e0678c50c20880bc7558727545eef3c75914c29c0d7ef1f84cc0084d3461b610c3d45f651eac6fade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a290e688501a2d9a46948f3dddf6bd
SHA19853e43a103fbc3f3b77bc9bcd55e45424fcc0bb
SHA256f212cf1ccb062ce9fd2142efcf006e505f0bc014b3458282aa55e3bc6284c2d8
SHA51285821772c61107b2ce4123395846074e95c650afff08c00b6ba2479578e00cfb36ae13a3d2fe6ddbf315b72bcd3948b8f278837e1c94ffefd9c26d28ecd43985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782eece6eaf259ff29fb51f13db2f250
SHA145f141e70f91f8f2463af41ccb38910c90fc6ea3
SHA256aea30c0fbc7573d69fb2d8eaed0e2752f39ba42a2de1a2bcf4efd45850299937
SHA512e39ed68b08feeb5725cb056123ba1cba9234b441af9da2d22fae3b2a0d1a7986890a60e25479aae418ce4e64be311fdd9e1c346a45e004a0e2c38c5935459b65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58273256add45b38bb463ad9f2c019116
SHA124324bbe1ffc0a56b3a2e363ce2e346b1268357f
SHA256758539f1c6b0a3d9ae8a7f1514398f1a5f5ff34688795f0ba9696b641f90f1da
SHA512103f17ef7a797121c743eaec407ac5034191eb7c749b98dd673b32c391f4d4f033808b167619725be63caaf0d37a8fb44bb1f9866efef619247a6ff02326c240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0573fa158871804f6b5bd7e8aef6690
SHA184ba3b106b2a8e135dcf7833b161a5afae1941b6
SHA256b0c83d02f7f69aa98151b1472667de76a9c3975df3ad5279dd942fed3261d8d1
SHA5122cb2312f674deb8c1013670946b42e9310c8dc9b07289bfe1c748ffb425f9491871db837de5c1d8679556aadbff9eeee4191d3b29c02ac8f75a3d85dc9af5b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403fbff23b4df3bd7e845ce9ff1be57c
SHA13e98521e059e8b846e9fbd2e781ad0b9b4fd75b8
SHA256604d7cc6acf1fb05bbfb7dda8a2a77e7790920e6fa02df1ec555d83994cf7fae
SHA51232b635471e47506fa29f60c8d480dc97602b18ee157167745478b8c0da92c88345929225e085d947fd1e54c25157c805f7797d40791ff2d507e908e57e50ac35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd3b50e8de31016dd4765e01604835c
SHA17b81b44df15e038ecce640af25086531e62c09b3
SHA256357000b9bd537be50e9fc859713474a5e1ebc05b7aa274053f49879dd5e520ea
SHA5127265df4e401b12f340a3ec7a2a0be187037c4fc725c2b90f3b8bde0fec12687731674b15cf5d2bcf5e526e6a737e7a281915eb1234820b67675cb59c04de4083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea06540f47d33f43dfe80fc96ab52ba6
SHA170cbf61742652a139a80f5129cc2e4cc4b69b8ab
SHA256c61741785a58a852f473b08c97bf62916d103e299c3a4915db31c9d8c1b2d7eb
SHA51226409507a03664dca86f1d34c14a75736c7a97c1f09e0ccde3d280c8c8dc0437205948773aa430ff7e543899079da97dacf82a738dfd374597dcf3fac417f7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e18eb2bf9baf3c2e500d872b8cc456
SHA1518edc2286d5b2dda3c88db846a4c1449fa663b1
SHA2566a856a6e8ab07753d4e492d21c0127047061ed9f8af53401e704d393a8d7c741
SHA512babe548f8d1ad08d01ba6ee21e5245181d8b1123cc0798ebd375398a65a9c166ebb99e8bd406e0e86349392a44a77a3abe1c0864824fc6f609dc01f975bb7d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6736cb49c2003f711250329cc59d214
SHA1dbf4496cb5ec60c6912f96a6c478a796ee0aeb36
SHA2569a66f88a8a459b9017decce2446fb06ac697ad907ff2c5f13900666dd4dfec9d
SHA512851bb4579e534666c798bd09a1a04afd024272acf0ad5dd7ee157a846275559026c582227f5c4c204e0be208e776e83c030643a9b485be4fef994520962186a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e7b09e493b4dbc27042b1beda5da52d
SHA124f7ea78b05c70a2362c9efa23e0343f8210a565
SHA25633ea70fa683366dfcf9c7cc631eeac902a0c90d3f1ca87fbb6c9cd47fc137849
SHA512c8da56b1c85065d9e8ff0c792d352b0314aae4ab76e528b10a9ac56a470919270f8fbc3565c6d07479ea858a2ba5f0b492e72fbe11ee6f9a38c910f5049503dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8386804a3054cb6f21ad78089fb30a
SHA12e38a3cfe3864d027f0a1cfdf64c9e4b45e58718
SHA2568b19745fb6e348dd7d3c745ad60de55061e9d83a6eb007d56a0f6deab731aac9
SHA5126184f7ea55f9111cd3de723cd74e43e2c14df39d3ec09ae70c0d3dcc268468be98edb00e5a6f7595f72f58f44973e702befccb2a1e8aeab28cd12d20b98a07c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2e1f0f32f500d11f74fa1bdbdcc8142
SHA1a002aa8d6d77a86d62ec3377fc43a11854edc4dc
SHA25671c90d6d737985e637ae6a8e39909511adee1ce1d05794eaa14d0849183d269d
SHA512185e85e97d6ac98a1dabee01dba50ba033e2c56a67cda1101b54b1806e2038a288a3eb1215958bb0c3e760547b414a18987784e2de40f4ca93899664f75dc112
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b98f286f3c569ce29bcdf444154d59
SHA17d330bf2e96588e74ace74c196879e3bf09fe712
SHA256bacbcd2b0747c9be01fc95fe0ddd30a4a7642b3d72e8525c776e3b6018df71c8
SHA512f9e5a85d3bce4aa8afd657bfe30575be2e6c1c5b0e503a857cea8a7e55c387ef5c9c08994638d12426c93c58c04d376df4d7cd295e06bb8d228d9d51d73e3a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD56ae65d230b56381d7565c052224a720b
SHA170a8a451ac3c54bd3bf9c72703974b00fe0ad5c1
SHA256eac8aaa445761871728f7bfc31292975910ad314597af6d58925a6e984051c3d
SHA5120b98fbcc55db11decdc6f0aa85380b765de2f113ce76001204ac7d4b8302b6643c66a733c5b5db5add504d586ec18dc351b2eb5dbb64fa6dae0dee4a751fe5fc
-
Filesize
224B
MD50abd4ed30e8606ac989b78246cd39fec
SHA153300e8b84d145c360a194d662bc233a5b140ec5
SHA256cf92e6ebe7ebb09ae12c9967cbf2223109e9984db8c168a94cb828c2b4e0f6ac
SHA5125bc8861bef5532ab2256b2a4afff4ccfacf85eccde11148ce23127922a0729dcc917bf65b4f6c7b8931d8471fdb329cbf7647192e6ce1b6540c121cd921d81ce
-
Filesize
437B
MD58fcdfca90a2c451991aa164a8058e9ba
SHA199cea36602d00d3cfe34a485c323fbf8158a679a
SHA256a23703094f0287d68dac80882c93be6599949093b817aa70ffb584b7b7415152
SHA512946f256ba06dd649e45d16e5002a652a84456fff327211a5ac7c6b7a67e9c3dcd9d048098c755cc1fb48bb252102b85a56863ebb6d6313abb672a3c6997e59bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\OtAutoBlock[1].js
Filesize5KB
MD5d20dd37c0551ffb1ddbf07bb14eb8673
SHA1ef2d7f3f351d4f066b9b114e45ddd1fff86e9da9
SHA2562dac11b6349b6fbbefe783a2cea3f35e8a9f2bd7e88a786874c0928700a9ac70
SHA5125504c2067982eb19c8e4aa929171d3b4d2dd88eb059fa4716b83f81e72fa67e445868a6c4715276c4289c931ba9366cec4f839cfdd4990c4caba76f16628b6f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\avira-global-website.min[1].css
Filesize624KB
MD51b90822ba21625b02f9e17b3124d01dd
SHA19aa240d86b39e2ebc6263bccf2325674b1f488f5
SHA256093ba3cb28fd20ce50083ccaa5bff704098fbaf3c3dc8fdfa128c8f23ab37807
SHA512ebd4a5cf91fdcbb3a35cc0ad2ac99e4917d3bb9b290ac64df6999eb5e3827aa22a450b6d095bf3f10e649bd1cc83fcf00dbdda66e79181c5b39b18570184138e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\avira_targeting[1].js
Filesize13KB
MD53ce6674fa9a054e053700e5da7dc7f55
SHA148cbb4f34a190e35c5fb5435806de0d84f9014b0
SHA25620c2afd6d70dcbc78e9995631dd355ae1bb8499e6f6f8ffbfd916f5287ee862e
SHA5125a8049f78819c58cc38db5175eec815895a2d4b403dec2238d09832de962799b793ba5a4a02eedc661dfb7cae5fab3ea9baaedc09a6d8973340334f02a13fc6d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\gtm[2].js
Filesize287KB
MD5791ac8392609d973bcc8585c328c47e8
SHA1c0550c06a97af6ec34c32b0f157035ef28fdc074
SHA256c824d278c86523600dd5a8b806ee7f81b226e1348ff5f33779bbdb325291d1dc
SHA512c484676ac906fa7fb1792af9c7da125c161ca9e326076d7bd62aa9be5fe18009134545ca1e980d5ea75553583089c76f1641a898e4a4dc1caace63f3123fcb1b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CWSOWPAF\otSDKStub[2].js
Filesize20KB
MD55c4b768820444afadeac19d7ed7902ae
SHA1b3fd3a19ce89627dab0129976956fd3eb11749c8
SHA256e0c289faa80333eff728b8bdbbf10b11dec1a6e1938a444e1cc41be6744e96d2
SHA5124664a19499181d9d8c1a60e2e727293423edc33b3359a3a585be215bde914c4425473e8532a7bb2e415c845057e61f1833c1ae6b4dfcfc474bfaf7e27bae017b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT8UAXPK\one-trust.min[1].css
Filesize51KB
MD539ad837e1a331dcf6654116073a3ee0d
SHA105e7811d2bd3ccdfd5bc1ebdf063c86cbd1a4e0a
SHA2567a905ec7808e96434796bb7c6876f39c05f4ba72b2c54cb27e9e87a7fbe7127a
SHA51232555fc33526c8e0aee77575cf25694ae81358cfe2105720adbf96f8f9283ef1d113a1781709d2123e61518baf3cd0a8eca4dcb43a193b2b13dc119b13f470db
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XY2E4O3P\all.min[2].js
Filesize178KB
MD5973473fbac1c0e0cd82cf83bccb7247c
SHA1f4cae9ffba8d2ad240555ef9716aaf33f391fa22
SHA256b1a2c56a4fae2771514476846f64219f23ba473ae10cd0accd1203c9ccec6e22
SHA5127b1660a2c6185be9e6bd7bf186b54ec53e278f5cd7c0f6d94ee42d75cc3aa3031fa610a362f2dd2f640b79a2dc9fa03737f6bff64d1ef8c96d010de5c511250b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XY2E4O3P\favicon-32x32[1].png
Filesize1KB
MD513e4a579c3cfa586f665ecd794e0462c
SHA1b629b7170f76734c495630191e665b6a88024268
SHA256a961b4999fbb3ea58527df10b36cfd5c6ac7cf9fd12a0ecede32a8f7f48fec30
SHA512813d424cb854ecda3bd1cb73e87af2e1072364e5e6345e2a7ff0c93cdac34628146786f1f5fbfa869b95d72ff0071414af13c4453545e76b3f627c1343cbdc8a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XY2E4O3P\jquery.min[1].js
Filesize87KB
MD512b69d0ae6c6f0c42942ae6da2896e84
SHA1d2cc8d43ce1c854b1172e42b1209502ad563db83
SHA2566150a35c0f486c46cadf0e230e2aa159c7c23ecfbb5611b64ee3f25fcbff341f
SHA512a55f55d56899ab440ef0cae17b28d5cc8f5b9766d1e9bc1a8ac6b89376924b476c1ab0c325497eb5d44af41f4ebf8eea236d87a36902244b8a3eca54994b8711
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XY2E4O3P\ouibounce_min[2].js
Filesize1KB
MD50067986dd93b7869e9dd229ff44251ac
SHA13e89404238b959ac1d3c113b21cde64ac95ad267
SHA256b74c3b8c5f786bcc4aa29f55ca0b178a0e2b5fcc6da3057a121bececc1b572ea
SHA512dd84f6d85c350145b8237c30ee644e53195e5ff5a11d8d6e87a65b58be5b472a8335cf1413c5107f8a2d4e272ab69cd711e49ad82b77699ffc8298d572ccfd2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\9F3DH-WHDX9-7CG66-F4G3J-99FEC[2].js
Filesize140KB
MD5b1290dfc24cf0fa7fc8086f1b9dd99a3
SHA19e3ff4c4b46853c46fb8f6bfa46939b92b1bcbb4
SHA256b38b56cc66465707f7a28c32aaa60859276bf30d268eb6d3a90a02bfb6d74ba2
SHA512f3fad1e09005557fa72fc402fd3024c15350a5c30a3532989253cd4e9d1523719b7c7c6a5ee673a2b86b61519c7e3e73febfad60527f9774f59ea60feb7288b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\gtm[1].js
Filesize363KB
MD581dd32697591f8f592a1307e4b97da6e
SHA1e2d47e4ec0201754289945db5375c5ebe09e8a94
SHA256fc7d72f8e92b76b301dc217229cffcbef5de01ab38d9a92927040bf805063854
SHA512b86eb4d9de143b95535cb39c31078ca1dc313675b84ff7f016e19f2ff5b3b1976f3eedc2827c53fa4cf9152aa982c285ca8d60a5889909b0d8a5a3ebb5ffee91
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
24KB
MD5287e32f6f25c84025a169d09476f4fd9
SHA12947979d77ce5a1d64af47dd798aa4357524a288
SHA2564289c51ce7d460f7bb0b2bdac4bdb3b7ecb0c9adb1ad8743f607c2bd1d232120
SHA512481e4f13502860f640095eee944a9e5c9a49188b3e5e6df8f82b763a4fee0ae11f2068131f545143026273c7c8e9d9aaec5b4794fc05a0f4f4d9c93e08228112
-
Filesize
113KB
MD57867d0a8252a5e5b4b2bab2536921d32
SHA1c7755b058e387a7a034d1c45d0966a167fb18ba6
SHA256dfc52c95bc617bed8db736acd5cfbb4cb96835887fd89c0c1ceab9f995c92bb9
SHA5125d8b4755dda6b0ae1b138d17db4989a3284d6711ddc73240d7768928c7dff43547b97a6eac4a4847e75bc0b38ae19d4497810a131a1909e336702bdcd0a7f0e8
-
Filesize
60KB
MD52235784fc22e49cb147f45f79eff1f4f
SHA19cbc1a195e562ec93b5d123a1faa270c7f76330c
SHA256e4ed494553f9021b3a597da5b4ebf9b2f4e23dd66ba4439e98f1ab8deedf0055
SHA5125c389aed73b7710e7749bf243c558b5b65ebd2a519b005ead6d604d90cb2be413808692448a1c3a716731b321d194049176001e778b002e55f0bed4cbb54b55d
-
Filesize
102KB
MD5a97e0141a8d92944f2640d218c64ad39
SHA1843f65c2b6c509fae37034bb8a469f4802ff8886
SHA25669a7a6a386b6135287c5ea27e9d8e364da1d8e58fd95e6fa2b84684b01b8f2da
SHA512f0f1884d7ff3fd0dd5003e9d7a70716650a81e94b7b8a2517914d4e688594f150ca8d3572750abeadf9723215a7623095d5c7bbc5b6a0f47040bf9f1075d6803
-
Filesize
29KB
MD505082a86c109766194d869b58b0341b4
SHA1a98d4c7af8863e85720b1a5b5e102f3dc1ee405d
SHA256aa7e59ec378678656649d399607bff8cd0f4029f8811eeefe2776061b2a273e1
SHA5120bdd4dcabb166035a0222b51b20f5fe20f214ac79f9e67d9dcfa8a85f8bba9d0403fccae6a32d469aea5c774afef5246877f8cacbe7a9301fa1866a603f7a497
-
Filesize
55KB
MD570c20433de77ee2f1c36283c59596b49
SHA1e512489cf22e2023e603b75e4b8a43691ef88951
SHA256d5f89dc2869f3b8c50388adac6cc8a9b6286524a5b159db94177b8fc0762f66f
SHA51275c445f21c278f72149e174614eeb24a1ad7bbdc0ce2876a44291b0cce6cb5d157b3583e773db3e0bce51e581769857fb115bdb0d6824399c038e07aa999197e
-
Filesize
55KB
MD537dc4a2b3fe3059fb0c8fe76e45993e4
SHA16f0c7c781875bcdc99ef746064a4090e83ab71b7
SHA256fa445984ce930e0110deb878b107037f0cff7c4d0cc82772b65583ce4f6f980f
SHA512411b575836007e59f2d5c63f718459a69bdf33741476d8cc8bf594d7d41c3c342b91cd4378a2183f5ce1578b250b4625741937beab2f53103ec292a0dd4d3387
-
Filesize
62KB
MD5a70e78f61da86ba63954629ed405aaed
SHA1602a5241eb4af529dded29f1a57f03695c0b138e
SHA256fbf67007fc4effee03897d2ece17de40678e428288c0477819e96af3e125b76e
SHA512c1a6a6e9885e5aaae7b5f0963f2c0fe8be88f14d2c4fcdd4644533d5e639d5a4c0a89a1b9307923df2c0156ea1b53168387d964a42571439950bc9980a982117
-
Filesize
90KB
MD5ed6848dded136b870435f550918be3f7
SHA1a45a36b7313693e663ddd948bca296f8bf9f472f
SHA256f81489e8ac17ab13e6e5b20c4633d3b8d6c62b896cd9a644be282d4fc2a09d43
SHA512aba7d80b1260e7906f268ada8bff43e4d1e9a2ea8408db46259d1533e9884298a4ca346ab5f6437aba95cbe35429e9f61ed52f269f827568cc09e96a995e39fe
-
Filesize
81KB
MD576cd2e97ab8dede0a3c76edebd17f95b
SHA141cbe2038a107a131ae4f448e95f58613424a6f0
SHA256d0ceaebe3ff7f28c9a29b12acddb8e48c2c1f4ef900040faccbdad8970765df4
SHA512a741f565c2d5951d69782d9872389821d147ddebf9aa9bba344b618cf55ab96a2d9a6aef3409f4b86f0bc83ea470d7bb24d00a5351736199a42dbafa86aee107
-
Filesize
89KB
MD5132e080a3fd71f15c37fd23cc30fba3c
SHA103e0634b0fca72433be6c9aeef6ae74798ca0280
SHA25694d04dd59e98a2ed7ce8d9a84af1460cdd5759092ceecce4098df93b5b56610e
SHA51269f1165109d3b0c1bd03b0e3dfcf5d6437bafbaa2c4dae83b7e6e103e85094b88ca906449c446d56dea903579df2a25a14b748f8eea65104f1686dc24d10d83c
-
Filesize
118KB
MD5af0fc2ca99be7ad6771d0615a12bca8d
SHA19f959c38f7d1c70a4ab9c34528d01abf05506891
SHA25623d287f6b964d2f9ecc719b213cccdd21a55a0ab58e24598413f56051bbde57b
SHA5122584843400d64f6aa4cb9c089059024a77e7336db9ccef00faef6970351fa9ad52072ca7bdca2fdc122bf011fb8f03a14ae3fe5da1d114ab7ccbc9ea54d471f0
-
Filesize
116KB
MD5861f90b849da165995322ae263878ef5
SHA1f056af8245203a5e918225dd1ed59ed39b6fdbdf
SHA256139b62af324086be320b110f5c62c327e1123197f8f03fdea9ee6b823f85327d
SHA512cbbd555291b40558d04f808ff74a4c7fb6bff52d99f527b8592e1222f9e83947dad6156d744dce51de313612caaf68df672df46bc94e10074f8e1e2f0bd38815
-
Filesize
98KB
MD5b758e30f4f993253e9b122b4e5f59ad4
SHA12e3e25f991cfe9ee7aebbb9e851bb7a984637b99
SHA256faa5c8c1e11800575df815c98d626e0a8cef160c5021308dba3ba8c53cfc1143
SHA51244d73552c4259394887c5f7528eaa8b95dec7e1c3c1515b012392bee6a952aee4167bd8ebfba6c42ada3cd5e1e8ba1b7ff9278eda3c6382cfa96ddd47989a335
-
Filesize
97KB
MD5a339330c0c7ae8d682f2314da2dd12b3
SHA1cce2f84bf9b4d00916f91820d822a0ddaa23530e
SHA256000ed5272998ec3a1496c67ba2b29380906bf063407b7c0a8d7977de29cfa6ad
SHA5124a3c44c7db1669150042792371a7f917f14d67e3d57b2e809f74c4dad004f20025dbf55327248a6706f375d2884b1d8b1a6c5fc961663ba75098161f5a8ba9a9
-
Filesize
86KB
MD50bdadbf5c4919b81b201df088d166b91
SHA1b9d2f019d80144748facb3eeea2df9feccef6484
SHA25633dc2487585c82ddb39e521294a4ae75e9d86a025eccae7ec5ae8ed5f1b6c724
SHA512bdbf35932c093be614faf7c139167bc2dced65642c4e91e29a9f412668d5169ce5278a4bc4cd3517fa86b2e27697548b0149be270321665488cccfd02874629f
-
Filesize
4.2MB
MD55d5d3e4b2c8e9f7fa4331b828f9b57ab
SHA1161a271815386251914488a471f1b0678f1dc03f
SHA2568e4fe31b34c016d2c329cda246da2f32a0c2488def598176ebd6d1dd18429e93
SHA512dc8642fa87c05a1ec3163cbb0c34f4b19ced97eb3afc8e9131df5cd3b246b9f931e607fdde1402a71abd1a17afa5d52909aee7557493028759d4688abcec4557
-
Filesize
4.2MB
MD5ba6b01cd76df37d65f67f9acce25f74f
SHA1e6f6188f9e192ec523de959dbecbd68ac85a2ec1
SHA2568116078db3e0430659144a210d3b518b661552e5ff9e3f30bf1213cf7fed42a6
SHA5129d4335f2b585be73fd9d90eec9822d40ec5bef4d077d12820a6aa15cbd49bb03e6a147c27acea61128ffc505acb75e4d70fc6ccc9feaa9ddc6c74d90107ba134
-
Filesize
100KB
MD5e9392a6acd8e901d2078c288356d0d87
SHA16b971d2af891d09fd008d2a517c5da44b56e7882
SHA256f7811c9c8d2087d79765f3e030e3d9e223faa25ed3427dad5b6dff97b2804e3b
SHA512f80de12a46bbcf045cd86585f4d3d5af8ee8d87d432080c71d3e21941a59102c6d381c99b995a9416bc4ca106a58a2f89b764f837a51f373f99e7f7648c91950
-
Filesize
72KB
MD5fe8129b844e5265926cca17ff0256635
SHA1d346535e3c8936696d04573c756ae296470c414d
SHA2561a072d4e4e88793da66a0aa81fe53f143ff384bd2972716efdd774edd879e01e
SHA5124a58b4ffb385a48a100985767781525ada827987ad4df99d262fadd0e0103127af5fda1bcf527c177802610818a83b52eaf88582aac1ded53a4dc53e98cd4e8f
-
Filesize
100KB
MD5f24a9fd60d0f326ba665e6e81080bafd
SHA15859a206548ba350bd0897eee12a44116d85fbf4
SHA2565d4d6f256059e6407df91bab75bc46f50dc205fd8389a5acf6d6c4497a1dbfab
SHA512f6274adb82a0c700bf9521018177e25a041d91504527c885b1c70e0467b008d1c5b45783e77606e32cc887e5fda7e15085ce71d0587baaeb7ee79acdad7d7392
-
Filesize
91KB
MD5e585c49fc246fe59bbe3a3cb4871dd36
SHA172b8a798cac54541d13af1cd8ad3e7fa09879315
SHA256c8959d9c5348265c9d3131b7ad5d7ce2dd73df68b20c622a2d47826b2d7b191e
SHA5120dd6bcaf3d09385a2e0a6b9aecec57443784fdcce084c5baeaefb67cd0e6511f984d5df809a49472b2421593bdd0e70c7809ea641436d257b98b88e5a1b39474
-
Filesize
99KB
MD594745bceb1448d9f33f869b218300111
SHA1affda9a52b4a54456e14244bf1eaabfd874db41f
SHA2566d5aa616704da2783ef2acc0cda95bfbe95350f1a68c86bc226332f9979fad82
SHA5123b331b38d254f4c874dae58fbb521a1beba6165db53fa3e638a9ab7252bce3d981182f4dd89fa048b754339bf33b91ca5a49468d01397838f1a8427db65aafef
-
Filesize
4.3MB
MD5f94db68bc478a4efdc711c6297e854d0
SHA1b10551eaabcb918ff892a3508fb12a1ce8c7145a
SHA256bbcb498a402c58dee6143e52a99d03579a37ef59bee243a5d0ee56caacf8dc41
SHA5125690b88d4225d21b0ec1f2cfa6f24276521d247bbf9dd3022530806a72d72de1b1354de18a8fe33298654a11f286918779f7b5947fbc5f5c8398e738722ce799
-
Filesize
4.2MB
MD53bf0e0560c3180ba3f97c878201d84fc
SHA152c6c334372b2ebe1a2f5e6c701f5804f43e4918
SHA2569d906e28e4ce7f7d4b551d2ad7c5659d204623752461e9235f4c2562277eb58d
SHA512ec574c4b1d594eb1fbebdd6d4663728848c0f54d8a34f7e5bb0741fe8738e32c53f43eb5396c65574fe258697ded9937c946ffcab0221bd28995baa1066c8b3f
-
Filesize
100KB
MD53ad8025c4c8205194617c3a3ef4e3dbb
SHA1b86cb35af5332aea97210d65524472034f64e7fa
SHA256a76ce6002333b87e4b869cfb1470596dfa364a8348947425d0f07707672bbeb9
SHA512e86e49a6c21d89d2149b347539e59dde8fdba31f7452f9370d1a85dd25e74e75a4a37ffba1196691c2208ca702e355dd422337d5853f4d052e6b6de4d449cffd
-
Filesize
128KB
MD53ad177a4ee2ab28ba1087a8f78e12d7f
SHA1ab8fb032470d6cbd5659f768a60adfad80de83ec
SHA25621af046c257b20ac4c35d8374e3acd602e32c8e633d1c046c237deed38914ef6
SHA5127538ae39f819229263726eb0bb2a03dee1411b2b112dc27d53da6b958d9f158988ee6a1a63ef15750f0f418ede3a12e5c5be12df0dff88d2a71e1cd63f84026b
-
Filesize
118KB
MD571bcf734aed3b5ccb370d6f9a607d597
SHA19b3977b537ce9c6ee38492b6a6e0f736bbebfa56
SHA2561d5288163ef2d42a6550ce1876be29bef5d804fd95da43b66743d50f603f617b
SHA5125a66c73173103231aa9e79d8fd13f50c5a9fe7e10dcde86c6b7247926cbe49f112a1e40bb5a64fbf626d598399312fafdb42a951259fffb45d5ad8402a70acf6
-
Filesize
99KB
MD573fff53392fdc71c004f8ad6263f9164
SHA19d1907a2e24639a7d48c3321adac500d4f5f85ad
SHA256e5378b11636ad57fc3047c94ec53b8c57e639361c32825fbb407a0593e1ef6e6
SHA51250ad2afbb2d4dbd6e66761c8f74df9ff888425a36403891a1e821538cf799022d6a527569f8defcf1befd2bee24335ddff752f5f723af8d507081b5c83db4e1b
-
Filesize
128KB
MD51b196f5c8dc939edb20c800854cc3850
SHA18924dab538255bee301602e57442217460230f03
SHA256ceb2478172977aa509b6a368c17595211bd63347a0f74ed5a55239372c89a50d
SHA5124eac3f269fbe666e8713155f9da2ccd00bcc03e5eeefd2742de49e96b5022c5708139e9e1a5e55f8f0bd8af6fcc6472233335aece782654768b650fb4aae6e54
-
Filesize
4.6MB
MD573022d8d7352f296a1b447e9c7b4556a
SHA14b5a382afbc2e53409fd90e8730bd94d7634376a
SHA2566a5071675bcf9a76675840593674bb26e32be88dd4f272d172acc735181ec8c6
SHA5120556c52d981f6ad9b24f71cce9a5aabfa257f1fe4c3e3ebca0214ee9c932403022fa910d53777fd58619de17ef9acc659bc1a0d6a1673b06d3068f7472aba9c7
-
Filesize
94KB
MD57a666d06909bb5c8b51f2fdda916abcf
SHA17fe295c3c44c8127a8beb8721b7c56067a8a865a
SHA256c6513f5a3f170bf316f4bfff3829c35467b3c6d0747917f55b16fcb46a944969
SHA512f0e32071314cc8454a47f4c2318859293342c2d19c13d8dd8a124eb08617afe20d154e73b3779a9b7546b3464448ed3ec16628f14e90cd3f4c38e4d6a7be0243
-
Filesize
66KB
MD57b62bd643e173ffdee82362deeabef63
SHA1896dda835fff325e08498be723ea7b7b878c575b
SHA256643f92f5480323f166464509fbaa40a622f3f77aa64b67c3951613a2b1cd9227
SHA5126fa189c04c2daabb10ada8b59607ff3a4af6c0b8689472fc867cfbef276034a03c3a769d17fda7c6cd18e4f7ca55aafc94fed7e9dba41a3fe893ac538eb04830
-
Filesize
94KB
MD5204ce3057b27561a7320d2cc55295f48
SHA13935f33e0d08023562082ef7431d096f4420889b
SHA256d519e1ee411d188111f82044378a16ecbdb395fdeda08232b66c322b0db6d4f8
SHA512c08c8ac8f7f263ce4fc90dae9cd4b745b84b697ffc5ec36933c1bc5530a95648e11e1cd28791b566e1f66b50b2dc3f062f405c2b86fe2c7f65a701ba44e91046
-
Filesize
85KB
MD5cf961989d701bbbacf946bdf3d7e9ac8
SHA145792ecb488e7eedcce3b7d36192bee32e19468c
SHA2560544c3c2c36c94603c454ace5ccd1d2dfaf0f2393b70cfa854023765a37ecb5e
SHA512fe131652b4b0b8708da1a8f42dddabd1eff04592efc76a94b06678bada947227a90de56b36b2c78a8d3253dece2ae55c635239ba9e37d6c1b80700addf2d1450
-
Filesize
93KB
MD58dae5921f7b36a99f535233177ed2627
SHA15eedf4a939136b655d82ff52fc032942fe740578
SHA256cb7043c95138d43026498fa79fca6614a2b5d4bf1c0862d4178323104fe1186c
SHA512b20302fe1dc7da253a0fedea2d1b867f6ca4f979cd25465fc0c367968c93f5936a5d59225222d7e68e1bd691c291a12dc9b409d39776d98a490878e5d9fa4257
-
Filesize
92KB
MD5047b98193c8c2c33d8316bfe41b92abe
SHA170307631b9f9229a7eb16306d37325ce0bb8417d
SHA256153ea24024acaa35d2b04f5cd5fec7c801c43b25ee20a37810a0fd7875adb5ca
SHA512100fa03b3dc8076e8a0b419e958b79049e3e02c8d4c2ad578d247994a7447c9e857e306ac351f7697ec3b1b722a328a67fc70c0cb2926fc8a9b74309627e4279
-
Filesize
102KB
MD5fc5df55fe16774a6fddfb5b814cdddf5
SHA1c27136fbfa0de3ffc7383eec2489a80b0de8dbb7
SHA256d8390a64fe923034f38dc97cbc6bf42b17caff5571aa2fd40a37d183cd3da560
SHA5120c21f77189072672ba0c2d96c9501be081166a92ec5004cd8f41ca88c5fda301d535490fcc6765fb8adec83b0449cd97b85114da013d915a4cd2e973cbe4c2e3
-
Filesize
101KB
MD5b78a9dc42060b6227fd46fac333001d1
SHA117b408f2f04b3bff620bc3bbc70b578183e39703
SHA25604ea279f06c7a8198b328f6e79be3c48a452234ec5639683e18576f83537a9a2
SHA51270573148ebf80a06417c22e52546d492f2616793cb875277d97ef72c52000afb0a550b5dcbcf0371467e5490417d49f22899e75d4ce97ab193f42f6dac6e018e
-
Filesize
118KB
MD5b16ee4694ca04a181f64486c8988f12b
SHA1ad26ecc40268b0bb141f4bfcbc84e8a4cb11b494
SHA256aa168f494d9906454bdce938c8046a21d096119c529087c4cf2b8eceb95b55f2
SHA512126734651b46003962d6e70dae729d38bd927c0cdb501db5545d68ecc192d115694f7f17294e34bff6eb3d8da1e3053ff5468c0df8c8af4c5ae88990d48cc934
-
Filesize
4.7MB
MD5169f5a2886970e841220922a9878e747
SHA1723cdfd2d44d58f31a031f5ca1eed291c31d706a
SHA2564fa322c7106258b1ccf3ae1684c1b6d6b5fc2c0bcb89182958ce0bf1934ac53e
SHA5123d349eb3487faa52fb6ed37faf7a451701737e9243275cea423c62582a7b1a1c884291dcc4bf09386a5d023496dda63d8c9b28ad4ea9f10da80b7615dd3efbe4
-
Filesize
135KB
MD5195637a56f479984bf13d02cd6504ccf
SHA1013cdfc9b97e875071d7d8b6a601b5e894566c4e
SHA256c4e44b8641414057fc5aeef85c110b4b2eeda8070213bea1c96aeb83a72a5b30
SHA5120c29e1291e7ca713b9a27e3075e0fe1a7a071109d0b3210afdee3ae5fe05752a01805857262261a616fd0f411e560b7bfb89a9a019cd3e9dca66b46348d0270f
-
Filesize
135KB
MD59964b6b5539850315d49993d259a19aa
SHA10b7787f795464914b1a38774cc9761faf22bfefd
SHA2565d59e8d905fc69e56daa25d33df07c306aec70d03effafa7c762d587dc210ce0
SHA512f956cbdd4a96b755df7e9cf1f3d24660893580d3863e496f2fe152dc014d7910d29f4ff8be1cae59e1a01467793ebe493fa164052508455eb154afe7ea21e67e
-
Filesize
136KB
MD5041e5c128b8249e6b61d31318ffdaa18
SHA1a37ec72e635820b9f7079fa7245e85bbc8c3d9b8
SHA256b1a364bda04e35ad7ce59d72ab4c393aaf7b53985b098d04a58cd00efb7df954
SHA5123f6385806f241b7e60d216381dff6a08fc2df801bd4e79efdc185db9f29ee35665dae26a7e40acddb0e72248b1b2261e59583a10c8add33927ab8b8d5a1d2c18
-
Filesize
136KB
MD546f8de0c2e092daa7cc460986df73cd8
SHA103c0f90b1c36a345602c4a11cf9978dd1ec11b76
SHA25616c2c34741d556a9d9aa39d3fc43ec88228a87515ae4f03ad4dec5a662bb8190
SHA512bcf2ecec58d9498a241bd06fed0440dff58fb3bdcd069f76c62527fedac32d46604152b38854cb66b5e088459093e8262c150208ea1e63738f67d6c83f6807eb
-
Filesize
136KB
MD5d34134e69f3d8ac395a2e235cddbc8a0
SHA14fdcf0cafd294117e8d372bdd3f8415aed1a726c
SHA2560b4ee42e6ba77549f4395a09585ed536d9a44b3e10a369f6cf3c075fa632d661
SHA5128dd04bf40ff776b1afa6a67259846c56d7edb713c799abc8546dead5056041913563f0ec7d8bae01a704b980d9eb8ac3c684eb61b5aeea63c0058eed1bc0c598
-
Filesize
136KB
MD5e5d855ae762afa7b4d432fb97825bc44
SHA1814401d345faf574205afc2e97f1f4e9efaac550
SHA25648aad8fd9430582faea25d6d7cd904249da7ce88c93f8755da12a6d1ec23eb8b
SHA512d3a5a9ed468eb8cabc4a1336392518eef6514192b1a53ef9dfd62bb9ab71c4950cda899811175247343d32d9d48c2b024f0bcc68fbd09a5c1dff52fc1e225354
-
Filesize
100KB
MD56e40d80132025ffe75637315070d7b6b
SHA10f4d7753501ccba8ae4377a9c0a50b86380b1f8a
SHA25683b02a12fd0c327dc166c8ac6816607c0442cc3c93e460b79a51e405ad2abe1f
SHA512598bb33c1a3ccdaaecda82b48f92ed47440bf3038151cb389d01812df51dc2d826addbf39cd33ebb9562104d8f2acb6b62ecaac5a1e441dff5f10d38456b3be1
-
Filesize
882KB
MD56cc46f5b693cc7fa4dfe45ffc4b811cd
SHA1be14e67111178e5c0f6b71f1cd145870bcd967d7
SHA256491761ee0417e1ddef51c035d3db9076510f5be6748b7dc8d32a4beb70589573
SHA512f6e12c3a446c0525c532ba80d3ce3e9c6cb681da2646f4f3e8cc681a91e540d50fcb5cb1b5b1df00f39275321d04aed2a209a0e8ed3b37860849fbec2ca1ba60
-
Filesize
29KB
MD589a5d99ae4503e2f6d07f949ec226167
SHA1778607d0de6f5adfb42c48230d7d2c381963b046
SHA256b6f0c03d9e0c5c2f0f6e247cf00dfcf97c2c0b935839a5c6d34b60c5c4bc5dff
SHA512b281fbb90d6078b8eda2df65cdd99a9fb45b4b1facc374b8260de617052f9f8e1a228f577bdaaa6212936ad124cccd786a1a8b562c06ec11dd8464beb34674f7
-
Filesize
291KB
MD57d95370874e882c3e8a327657b716e94
SHA11014cd77cf2861ce5b49e9f8bef1f2220f0b66e8
SHA256e452d607400896710c39fa3648a9e90e9218b05e6f83ec5384b07bf1bab4f50e
SHA512087279ae80ff77e86a561228f5de49abdca864a542779482d7565e17b116507065c10ee5286dee4fccbfa250fca152c4060f976108305ce175ce86b75a9d0979
-
Filesize
56KB
MD58fb9730c6d987b95d5c9226c1cc6e632
SHA146a962e295276bea0107de5f893fdf5c39974a98
SHA256a8dec4c8a74902c1ac6b6be2bdb80c74a5cde64df3c7beb971950a5ee06b1526
SHA512914b3d605c73e5fe1613062d09d306368d0b6b4f5be22d24d5587c27e11e4cc747e08244c57a5ec193d57dac0f265e678f56728c68d9784569c3ac49d1d7eb6f
-
Filesize
105KB
MD5eb7047c805f033c6136ec8fe75b420e6
SHA1942b88a4dcaa944eeefcbf49e09bcfb5ad71d5be
SHA25632a26e1e0ea9b830b5bc6da2e861bb4eca509182d398e59c847edf8bf6f4d066
SHA51248eba8b731884fe88bc9e993b52a4910d6bfdea2b01d961edd5475e53102ef22d73c92b84008d38fb8f9f9ff841302efeebdb1e21ecf6a5c5e2c33c6d041cd46
-
Filesize
71KB
MD5bb45d3d72a8fb4f617a9bb17b438cc9f
SHA103ef9552eca5addcd1ba87c07c0881a657bb6514
SHA256be3de083c39ea1d627702b2fe8ba8383f7eca8a6cdbddaa4488fefa4bb61e2f7
SHA5121b96070c3753dd96454f714bfc98a85a46a4f53fd6ec9b81da75becde925896a54c973e52b72f7551dff49e4f375422c5dd12cdbc21e3749a2bc55dd17ab88e3
-
Filesize
56KB
MD5894fc015d10ce176291a4b15eafe118b
SHA12da7a3e287849114bee0a39d7a5cdb469db08bc0
SHA256a54d03aae0d0de6b69bcc7eaf69151b46b894e4efbdc9ca9313d1c24d03fba7b
SHA512deb397d8eb80fda13012283737831d1a8587862994d8de83fbf1159d508c276322d93c5906533338df2f12e1c610072f419e390a9f911be7b271639e72f2a04e
-
Filesize
111KB
MD519dec4bf74e33ca6757f452e842b890b
SHA18c23bc7a19cf17843fe09bf1f17d5b22d7b1da75
SHA2561c9a0f45417ad6d38e431fe7878354f698c2142c136eb89f967bd890e87c564b
SHA51298b7fbfc35c9a9a668472accc5368e11de36e76e9832095d4202fb184ffb480de9841c1fc7ab701368b750490c7a3b00d49a710a271bb35869da005f79983497
-
Filesize
76KB
MD5be816621790f88534f0bd29d0ab72c13
SHA1627676f7defdacef9cd3fc2ffc2bd40d774869a7
SHA256d42bbc7d1492dfe5e7d333699ab3a8adf05c5fd3dd671119b10d48fc4bd648cb
SHA512fafc5ebfed742c07de389e03ba4a5678781b58e53f5ada76ebda232d031c8dbcd0584ada792d90fd6f4c6168fdb2c2f2ba494900a9de3d3030a16c3c4dad2d0d
-
Filesize
55KB
MD59203b50c356c669b4ed79323a65ba35e
SHA1f7f7a4481c36a84f9f559bafbba1872a856e6fe2
SHA256321c6ce89218510f44b0ef792985bf9818188f5a4acc3592cff6b37b4cd7d0fd
SHA5125c9191e1cfe6cc694e1ca2960103b0a6fc20868cdabd9626852b745400b427f060c6fb68afa79761781a1b827cf7cf51e1452e12abf7744204bd295aadd5d17a
-
Filesize
55KB
MD524d0bb920a77ca984853fff0336bac90
SHA1783b52326d664b09a2041043a5ab5e779614915a
SHA2563576301e370ee28166e48c85da12e73801acb31b50f428c6ad4011a8f2b13459
SHA5124888cec048065551f3583b295ba04aff7dcafc77d789bcc3a9f6e7971dac076245866d864394aa1cae0ec6212a8284cc7d5025c3be62c622535bd59b2eacc066
-
Filesize
55KB
MD5d1d40d4e157d4a44d21e177933c65ba0
SHA186e77028f4df3c3556c51d43205151387dda28ff
SHA25624de6baed510b427bfb3b4359fd924cf7e382772f5d9f67ae2ab1098070eb2b7
SHA512436213ae52b5ac910671fcdaed460cc4c35496dd2ab2c4eac13df7fd891ae51baa5d52b1a7b9393c5717e9177f2096ed0915af11b32ecb0b7c98536f1172933a
-
Filesize
27KB
MD57805538d58f3fd8f35095e8f23cc1877
SHA136f902bc2df05b944308d253a00158804d4e1b10
SHA25636a283a3dff96092b04cab3626eea056a66ee17b98e3b77f0aea277e0ebe12c9
SHA512609109db72bd23cd8e9fafa1b40ab8d7d35f2fa46f49d32a8909d7a8464e8d9164c032adec3d1e071064fc82480fc884b538070ca416019688e373abab5689fd
-
Filesize
248KB
MD5c6c94b7c1effd13a148b1ab8e27dbfe3
SHA1175017ad92b72c7bec8c426e0f2ee3706ede7c8b
SHA256f3496a137a3bd6c67461e2430737bf17574649c3b0e6e72412f3144cf6b57e80
SHA512e2ff28823d90ddad63f1c48e3c9a6796ffe8e872a41fe2b1a072f409acb1ed2b158d34a9bbc3b6a3a16c21bf03d1c43c407cf05f956b3a73a72bbfdb97b75065