Analysis
-
max time kernel
129s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 03:48
Static task
static1
Behavioral task
behavioral1
Sample
282ad643961517bd36f871714133140e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
282ad643961517bd36f871714133140e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
282ad643961517bd36f871714133140e_JaffaCakes118.html
-
Size
162KB
-
MD5
282ad643961517bd36f871714133140e
-
SHA1
59dcc4584a364735fcf9b332f43238503d03b631
-
SHA256
29dd3637322d8babd5f8dfccdcbcb53cb13936fc424a11ff57db172a3e12c3c1
-
SHA512
407a376ceb43d81f6ccf86b5e3a45666d856501a7f86fb49b95b7f6b240027a6c59f5b1367944f59994243c11f213d91cf1a991eba2c5f097d5c95d089e1582c
-
SSDEEP
1536:isRT7hGaKncUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:iu7ecUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 896 svchost.exe 2896 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1728 IEXPLORE.EXE 896 svchost.exe -
resource yara_rule behavioral1/files/0x002d000000004ed7-476.dat upx behavioral1/memory/896-481-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2896-493-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2896-489-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxFDB0.tmp svchost.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421388350" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF6632E1-0DB6-11EF-B804-569FD5A164C1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2896 DesktopLayer.exe 2896 DesktopLayer.exe 2896 DesktopLayer.exe 2896 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2844 iexplore.exe 2844 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 2844 iexplore.exe 2844 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1728 2844 iexplore.exe 28 PID 2844 wrote to memory of 1728 2844 iexplore.exe 28 PID 2844 wrote to memory of 1728 2844 iexplore.exe 28 PID 2844 wrote to memory of 1728 2844 iexplore.exe 28 PID 1728 wrote to memory of 896 1728 IEXPLORE.EXE 34 PID 1728 wrote to memory of 896 1728 IEXPLORE.EXE 34 PID 1728 wrote to memory of 896 1728 IEXPLORE.EXE 34 PID 1728 wrote to memory of 896 1728 IEXPLORE.EXE 34 PID 896 wrote to memory of 2896 896 svchost.exe 35 PID 896 wrote to memory of 2896 896 svchost.exe 35 PID 896 wrote to memory of 2896 896 svchost.exe 35 PID 896 wrote to memory of 2896 896 svchost.exe 35 PID 2896 wrote to memory of 2008 2896 DesktopLayer.exe 36 PID 2896 wrote to memory of 2008 2896 DesktopLayer.exe 36 PID 2896 wrote to memory of 2008 2896 DesktopLayer.exe 36 PID 2896 wrote to memory of 2008 2896 DesktopLayer.exe 36 PID 2844 wrote to memory of 2716 2844 iexplore.exe 37 PID 2844 wrote to memory of 2716 2844 iexplore.exe 37 PID 2844 wrote to memory of 2716 2844 iexplore.exe 37 PID 2844 wrote to memory of 2716 2844 iexplore.exe 37
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\282ad643961517bd36f871714133140e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2008
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2844 CREDAT:209945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5823a598c86a18ef6a08aa84f35f3dba4
SHA1b240894d2c2eb8c480149f23a191c2b550a61a61
SHA2568e28e4a7da2396bdf7a31b175dd0804757e89a1e3223a55fcfef03c65795d036
SHA5129e1ccdbe8bcfe9d7290ae609b98e27516a7446ec7028630274701c18e9e00b955babf28914c4ff84d18aeb7f5f8ed8a157dab8b3f3dbf1c6bdfac13f822ad90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58348998d3776ad1c82cb91addf220c02
SHA10880e8363cb78f65157ebfcd7a46145f53a64033
SHA256669b922636fae189f432364351ec76f44d9eccde1efc3f982e4fb16846a941f8
SHA512367fd2cd4364c77d1182f6f7830677bbadb10bc393b69c436bc37d6402731734f0745c2e62cf055be15ef856aaf4a96d6bc9949dffe1845cb7dd6c7753c3f108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5261c96e174cf3b53367b734c06987a0c
SHA16dacc28658326fbf1d7e53183787f556de2967ba
SHA2569f39027dccccf3c3879644fdd43edf478c75865177af261e8dc0f21056f9b983
SHA512ffdc4201c4db95032c0647944e176cc789d58225531ba8aa94f01a53069b8c2204f9331de4649ae582730af2c27feb4e5d88f657b43131c6e2f1671d39c32d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd2b2d5e3284c1aa3a9d62c5212b370f
SHA19b74aa11df369cc30f3dae5f7d4385edf9df647a
SHA2568431ac137f4603b496ae4d04b9be37be35024c9cc0c058d4014f8a1318055703
SHA5126217d51b9eaafabbf60ff412b20076850c3e5564c1a8af5ae103f1021bf1e0b51c766d74119d3675e8859f9c0fd470d0282bb7e52560b7e5fd2c048e4aa05daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531a2d4677af56a79f9ec2da0a56c772d
SHA1892c1e4e619fb7168f1bb6cc24d8546700e4e85f
SHA2560de20d287592b46a7b42955d0bd0f556ffcd920537b5b37384b426e4b8630e26
SHA512dd0e250caef655392b19304af44710b073ac9769ed2ad4290899b65bce68ddce11762f157d5984b1b0336832df572465f3554a47de15a0b133c567d70d9c21f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5644ab0d7d4c0dc9b9c46a43dde74853e
SHA18f26c0dee97773325d7eed69d3a39174c9a74911
SHA256c14ec9cbc44ff334c62bc9d08d03b94528e4dc8819485ad5f2cf94578bbade11
SHA512d0e15a951d1818e83801b04cfed7dc82ee49649486145d6fc4e5525985d8b55a835b73183e209859acb69296ec07514f0a9ca1f8b77ba354c7db1b4dff248013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aebdb84db1243df9fea18e91f4adcbbc
SHA1a544606cb4f3260950a303dd87938b5d4bb9ce53
SHA256e6513f27a639ee90da83c11de8a30f2fc018866e2b81331220bd288547577d74
SHA51205cd0e74ef1516480c63d7a127338cdc4f61131ec0bc42b997f242dc31597cec87a709d8c6b8440528b9b578bd4440bfe72a63d3a35d53c6368b6b19a556a1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571257c9e043f911ead2645864a6bdf7a
SHA168acaa41571e51eee348aaf740d7c6391f0616a6
SHA25601ac1b272074e716c2d34cc2abeda105377826be7781021effee9d39d3d5a8e1
SHA51212fc1ef87b86b078d4320a9a9dce5d33e8381087c00404b9fde4307f2cda1900e87a04fde969fb20a4c24d747ee01ef659c3a9664bd68c48fe4608f69c3140f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eb4453b01411475e813e2d2fbdfede7
SHA16a2c42ade5cc2c5f995fbd0bc170aa1015df408d
SHA256d7f29cedda3c57d6e86c175d6d8a45c765f7443804b062e2d867574ec5112b70
SHA5122ce4078608dca25c56fa9e6ea94af99d80f66207765cb7283cf4300b726cfd4651f14974ec7b1684e7bcdaeea564ddebf48e857fefa0ceb684922f7ba976dbe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ebb0cbd4ec2a7c12cb4a8a67db93b7f
SHA1af9f9e7902d1b692bfc0013090155c10d3113544
SHA2567967623450deacce91f2e9e33707b756b9839acda3dc780b8d7fe8119d988234
SHA512131781fc03ad0bdf1eada114096f068d4e1b51c97dd73f387a8713e1bc0a173a015cd762fa22432ba1cf59f8a4cc1ffb3afa3d4bbb6eb1e445f6b948c9ce7f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573ed9276c9cb42ebca3472d0d1e1c67b
SHA1de2cd9e40b6502d2cd3cf5a5b0dca03516f0fb73
SHA25695d72aa87bbcd6bbc84d8e788cfcc3ef6e8fa636adac4018fad5785fc2a81837
SHA512b9dd9944e071671c31fe4d228c665218587ca3de04b9094c392a8e4fa9d947d7ad2017b29ace8cca52e195ae17d9226fc8b3037c0fc1187d1f1d3a629c792ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a15ea65d335b28444f82925be25fbe4
SHA183528de9ff5d39de033cafe08b9dfe7c0a4b25f7
SHA2562d6be1c129d5f8cfb27688bc63018731aba745e80416893e9a34aa76f28ea393
SHA51264e37ad88127b6f8f1db175625e5da6091fc21974a10cb0c4cb13eb8a183c29bf8a8eaa6df96da0ba55fe2d654b0df352153aa720bdd94fdacb1e6daad0a283d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a2260779f95b6e71922c3b499aed53a
SHA1e69fa017382e37f6bc034d965e29141015a5576f
SHA2565c87f16651537dc9c6266fd8286256665c3c9e385ce6ee7fbcbdd65c76a8de2e
SHA51261705c850d10460cb3bf1ce2f880a28bf68a34cfa749efda297d74692e662f5ab7331db978f432c504ac32da7962202949535264e865f3c73b3420161181059b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a32cb4468d038d66a0acb057862f590
SHA15bc0871f3e75e5aa650fa4bba35c94523502da2b
SHA2567a80173e9e2221061112a7c5441d30498244a118930dc0dbc5afb1a171d83465
SHA51290718dc60968bc00f0c8cfcdf4af6207a573a0af91501805c2a0ca0b20a2bdb2f173e28ae43f6fc22eb7be036cc058e56ac8105ca9e79528e3b982c27e311dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548fa98b37b88efa5a6d4d033de5fd499
SHA12ea6d955311d3ebfdc64b279d6633387dc701d39
SHA256ba79ce1900fa81315c544429cad53129b168441d78ead187c97cd1cbf1962a3c
SHA512e80ce2332006779eb85378334f456083c9f045dc4a426d9658f929db13f547176cd946aef3c4c363fd206de4bd4336f8c3c898d2c2cbfd2bc86f3814467ee55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc780c50a95be1f1fdd649c38c371f90
SHA14b299209bf9d91c71545e17666ff51d1c499ed14
SHA25610fe8129da2593fc31c0722740c53dd20b2f52f9d678086ebc0adb88ecba4b46
SHA512a89540adb051160fc5bf0ccf0c9635dda82184886e8738ace6ad9d7fa6a7283ba519f2163850c6e2886120484b90fae4fff462bf088d7bfcec5ea51f69a9950e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5885b7a8feeb2de61ec18c767b2cca0bf
SHA1146927e59cd264bb538246111168633326208e50
SHA25696aee1933bdb88c17c650443cb380b27c494e86af53237745f1544ec80606c82
SHA5128110ca40eba2fe90d0b0dd081ea777535a53db623345420b66f2b2ec444ce113ecb2f5cff275b39b5df825ae6e028b1fdaae55c29cde556e2701e10bead86a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df4898996b2d18d3f2ffecf84ab48859
SHA1196a7bc70fac7259d5c129925a94f2edd213ae6b
SHA256e0d8ab409f1c1850893c1350996b710d4799df769e72f268c55f4a5518b97d3b
SHA512ff65f105d049493b6c1275907d2f1b0bbabb98491ce9ffc81d4c003ffeabe4f1a5dba77b0afdf50c1a4351058b9447d9f961fccdfbfc82ee9c24bdfa6f0149b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542d555e952f1c6a9cd4058f32b7cfc47
SHA181ba03f6bb30fb9f34259fa5ff651123571c1871
SHA2561f0eae46c78339712f08b83cd6246d91d099769656bd493168f8dcfc61d847fb
SHA512e567eaa1dfdaac91e840a5bfe942a6694852e5229bce8bf7105ad8c01be534064740f48aa6a0d79c0b8e767846392601fccadd10bdf3e01d64dd6236bbe2067d
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a