Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
24c3830372ace082c8346a65942cada3_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24c3830372ace082c8346a65942cada3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24c3830372ace082c8346a65942cada3_JaffaCakes118.exe
-
Size
360KB
-
MD5
24c3830372ace082c8346a65942cada3
-
SHA1
80adfbd70ae74a92e459da5785b551ecfd3f62de
-
SHA256
caabe76af1bd8354307b83eab3a05582126d2626d925c8afe14d5d8e32571ae0
-
SHA512
c4516d43316b21151b16b9da27132bc780016f7cac110b08a65a72f8fde9117c3500abed3269494a873062be5c8aa1e894bfc2936edbd8535345e607e1c3d2e1
-
SSDEEP
6144:jG8r+hAL5uOc9U89oI+jo+u7+68JSnxN6X5cUBk/so/IoHqPYMsrh7Aa3+P2vlj1:jvr+XOc9UYopje7+68CxN6p1k/so/Iol
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006878dfd1cdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d6381df2bd99ae45a1e99061ada9420600000000020000000000106600000001000020000000d95c7ce7c182ef7a1b3bd9a6d76d95350340e51ef606d48ef7370e129b1a391d000000000e80000000020000200000006e4b5ffd2cdc9dee24d78ee4e47c76c6664f9647082501cd261274d9d4a458bd2000000012ef80cda498f2e9134a102d0c73cbca86786037a59a59d62a157a30d03b6fe1400000005b6b8f5ccc1191ccdd04777892977a9a02d4488425849ea88ab0cd88529793afb4440f3ab48a30e9861c6b33b972daf1297e0eff13826b3d47c90967d6c75ba1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main 24c3830372ace082c8346a65942cada3_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426232218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F1CBB071-39C4-11EF-873B-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d6381df2bd99ae45a1e99061ada94206000000000200000000001066000000010000200000005165d0dd7318c7a1d5f87b077db42fb053514039ee428337b269d98a54e813eb000000000e8000000002000020000000673e21d563c1c103df0fd3ea8274ba3a8c4a5118d2b944021328643b1f261711900000001278c22f6f4f2846ed02415123f07f8e574cf408b163b77910119b1783f93ef3522396566410f82b3f45b3bc9f3bcfff464fdedc7b6b189996d129847027e36f2f44c805ac4b6cee371961fac6927264a7f3b9fbda9079258187cbdbd7060528ab409a10cf92fd787644bef7eb5e78ad17c4f352a4e7990675a6d743076ce7a19139890323fb36cfe11301e3d803ef654000000083e5fb5c4b24ae57447aaaa16161a3dc9bc6a0e785187a2b3665812e02783abd2ad039055d6c9354280a354d04287e5ad4c597db37f129ef31631b0925767d98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3048 24c3830372ace082c8346a65942cada3_JaffaCakes118.exe 3048 24c3830372ace082c8346a65942cada3_JaffaCakes118.exe 2852 iexplore.exe 2852 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2852 3048 24c3830372ace082c8346a65942cada3_JaffaCakes118.exe 28 PID 3048 wrote to memory of 2852 3048 24c3830372ace082c8346a65942cada3_JaffaCakes118.exe 28 PID 3048 wrote to memory of 2852 3048 24c3830372ace082c8346a65942cada3_JaffaCakes118.exe 28 PID 3048 wrote to memory of 2852 3048 24c3830372ace082c8346a65942cada3_JaffaCakes118.exe 28 PID 2852 wrote to memory of 2732 2852 iexplore.exe 29 PID 2852 wrote to memory of 2732 2852 iexplore.exe 29 PID 2852 wrote to memory of 2732 2852 iexplore.exe 29 PID 2852 wrote to memory of 2732 2852 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c3830372ace082c8346a65942cada3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24c3830372ace082c8346a65942cada3_JaffaCakes118.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://playgames.fupa.com/?aff=newgateway22⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5894543dd6f4fceb393a72c88a6f2b3a1
SHA11a5bfe4be27f8d9e3325670d95601b6e1ee580d2
SHA256316f393bb12927b9c15304cf89ec00ccbd1aaa4e6b1b15661e641e3c58b381f4
SHA512c3aafc9fc5ac56aab719aac14e74651ee341cf9be1b38d0a327c65210491ae0bccf7d3d09a7e7a132d056a7624daa16a1fd0a99b6e8dd613ab9ecd8f5797cbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74109a50052f6231fcc8feca8433680
SHA1d09b409b6f5836c4095b834ac7d8b66a7bf76bb4
SHA25634adecb56a5f3c102c1527a68c6fe8dfdee44bfbff3c1b6f332e58323452c8cb
SHA512698cd73245e3c33978a086d9e7cc40055f29c0471941aba98180534372ee422dc28022022a8447150bbd990837b35c4221ee60b94446b7674bf94e3e9550ea9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc845f6f015f94d250ddaae33605707
SHA13b787d9de7826f8dc94bde2bd895574bc66170f8
SHA25625710705275c45cd8fb874fb27505c36d6b629d079f92ef2e9a765107f165abb
SHA51299dc7d92634f62218a5c4cd9d4d46cf8489d1ccc2e2c4139d482fa9bef4e44c496e960660197702fbe3bc3e0fff8520879c03c5f7631c6dfef5ef6c1a1daf50f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864be3f12427c540506d97ac86ff98e2
SHA1834dee74e32968be5754dfa4a20fdd403d788aff
SHA2568f044fb08621cfee1cb97083ae2f5f7b1e52ba5eabcb83ec2323f3a91e7e9167
SHA512c15d24cd1c05d2b38285f4f608a65da4793e115d36d77a57f9c759a1e458d95f9b6e92b81da01ff34e9b07534e6382ae3ceb633896c41c84c8dcb3a04cfe5e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b71b91e24f9e88646b0d2d3367ac3060
SHA1a8721c34750e30756cbd4c0635d12640cfaea8ae
SHA2567ec22ac6e5c68f0861634309313a41ae75a10f78177e7547475fd69cd7731663
SHA512b6be7ded6dcfe5bc6b30be7023f13d2d60a96bdab033d9d95c28282288bd92ea231c2d1805fa3cf72ed591708e566aec92c8bcd09fcee1eb059cbbe65ffbf5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c6ce2c476b1d7446ad30575218c0c6
SHA14a7d4c4836a6fa4adaeed8f076815ec4ce850fc4
SHA256368bd54e03b91ed7c547daea9ae80bc19ae270a8dde2e93d92a167dbc8d5def3
SHA51283d8a8fb0bde2e5d47386caf7dbc6610489878edd5525d987715b9e8a6ab87f3716b6bc8fd7449e02e7f7471fe83bbe64d114bc1f8c9889184897931dfd86412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1490687b8a8034a9defeadb9c762c82
SHA19344718029dc80660286fba2b5025b21e66ebd70
SHA256d51dc6409f02268586bdb35d49575b18028b9330067def17d1cd21a3083fd79e
SHA512dedcc1de20e7d86dc5d1d973b89acd962f3263194eb9ef8580afc3b65574fc774a0179ad9c5b4ce4801badb4b00b26d2d2aa78d845ee2ec2c1d72655f08277db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e64c8ad8be060bc4b63e734838baae7d
SHA1ea515661e5f8ab59c06a8c91c2910af39fbe99c5
SHA256504729452b261eda7b91e3e151e719e5b93f6ec5af9aa0d9c94cd335da2111f8
SHA512acbfd86cb24e169c3847d3f746164ec52664bcf7146f4226a7cfa2f6889a27cdf6692ef71b55471ef33e1488573bef79476d77963efaca61b72dcc08df432f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51253efbc6a7b519b828297fc8b3407c1
SHA153aff4b22ab91efd6f8b8ded6965c208d327ba72
SHA256fe9db4a3a65d4690b245c4564c72a45b0ee0a3eb0a8cd341a50a713593786def
SHA51226ed5f342e6f520b5890798612912d0535dc449b5b45d13eff7ad66096f291aa3fa79b6c2af1b28ba711b6b8bf3b2837a6cc2bbb96d169bd5ea97aa31814dac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce31ec46d5ff4d62c7a00f1543738e14
SHA10fccc25e66885a4a4d5267bf95ab0d96b11a6756
SHA2569a20a0ab2c95fa0bd71938cf4b6a5bc402072bedf0eb6fa534e36fe1985887e5
SHA512381185f1a4efdb33e69a85938c34353e0d132c4e497396b3c8fe8c9059436438eae44660ff25d584217a6e25adb5ecc3209bde7d9494ba90ef446cb3722afc44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b51fd786f174809fda7e8af7e4fce61
SHA1ba3f8bc948528aa644c0e32ad8c7fa780083c6b3
SHA256e75bb963579eae79e8f80e585a2e601a814e4161df296e50066df6b99dbc1109
SHA512669d61cdd539145fb1c4e5699424a94a2466fb94c5941c66d5a1822053d9a9919cb25f88b8e96a2c1eebf6914fd44763415472ab0f4288e7ebc2cc8f75221730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fca40343f9e46b531e72e57448b0ece
SHA11b3e855a4b6c2b886f59d55efba41a3be30e5625
SHA256d25cd64e3244642a74df2070e6b0b0d824905e180e05a18c01099c7d661294fe
SHA512af8c45e0bc5f57b5019b0c066b75c5ecbb8e14ff1574d7b04dc4f6ccadeb2ae8c6158ff4db497a9a404632bbede45dc1ddb59a21f95399284b3c719f4d9874fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c9d26591eaec9870a15ea16040f4fd9
SHA1c4a426cfb6e4675fc32514b7a34992f8b0c3353b
SHA256e424cba5f98f40ba52a22843f57fb85ab168d362813666fb761752021a29bb72
SHA512bb433d5bf857ed272008df35852f66dcc8fde546526fc295e8d545247f5c9d70c1ba8ce55d3bc6e8d1656d85dc645b18050c495f39f9beda269600ec5dff92f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55539cf454a26e218ee94896b88e687ed
SHA1385cbfd820f6dc0ef73436e9618ca8886df348ca
SHA2562af9ea7b1367504213622b3f730f4f7cebca5b1e77b1574140d9d2786c3da0e4
SHA512ea2b5717eb233f96e39fada8f739718b4bc2ef0807e37eb0dcc1d3df4b83378cd9f00c85e0b24d8b65e9cc8e80d5437a0c11084d8eb2bfb84cb0901cf4eb1257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf27992336e567d1fa066b535d3bd4d7
SHA1d5109b9c8a45ac09d7569757eb301f25ec7bb3e9
SHA25653ff51857af3fadc40258fbd23a4184ffabe882027ea391715e67be98740feba
SHA51265343756a2e8678f913238910494e1226999a75bd7df4748244a15c708e8082b817e8c937ca036ea8eceb57ed729496c32b89bb42117207e7e6bef3be0aa4ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd3115f6034f2b1fcf9258cd2ab310c6
SHA1e9beaaf113bede4835a98ebaee6c97e9ffa46842
SHA2565f6c932b7cac435b6e451ebcc9eef26722a122ccaa243be583a2dccafd14afec
SHA5122baf2a3ef64c341862bc52f1219f82a2bf637fbc538fe312346d31bc87511ea574d01ae54b405bf9c5f8c7688be9d863d1273ca08c7fa879dc4f5a4ebc35c40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526015527cbda6c536e086df7f74ab4ed
SHA1f5d3f3272db606c16b73c72a1adc2b9e3b0afcfd
SHA256c156d28e8132549e9d6da72a0153bf25a60dc21a236d91051fa258bb779a3de9
SHA5126df7709f15c6ab65a2264c247618c6410191802c1201a324fa1326480a365222557bf8c4f58284b57bf1ba2ee1bc933e4c0f74ad1623ba09a1e20cf83e65c74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6445f96545fc79959ccbd289d2bb6df
SHA101878a24417a502a4a000bf923ae73c09f9894db
SHA256dc5261a226356921aeb8c8c5287cda5b28f2ad53c8c3d08213e9097e91484c6c
SHA512bab5145b0a4ba389b55c21c628695f6aefd98fa81c35d7028f15c44520d5bf41be20a592bf95cd69ae904742a30dcc843001a2bdbd61c0e4e3b7b91c5476f9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518468049da3451b57d38c2bdb9f9b4c1
SHA164afa270e520dd087bd2e0344e5499087fa9ef58
SHA25631a3b3e55f5755727e87d42dfab782bb3026fd0df8308bb14849501dd9b30d6a
SHA5124ce615754493bcb4939bb31e755426aa9649eeb7280cdef4d28152bbe73eb4cf9ca079ff251bad717e25a0706558c9826610b50b35efd69878cf487e2f6749ba
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b