Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
9feb1834b2e8d527a98498b2604210d6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9feb1834b2e8d527a98498b2604210d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9feb1834b2e8d527a98498b2604210d6_JaffaCakes118.html
-
Size
56KB
-
MD5
9feb1834b2e8d527a98498b2604210d6
-
SHA1
18cde693eda9ce460b2c91578fdc7a23f0fbb483
-
SHA256
f6546ff52f386d2efa3ea63cfcade3657783add4f7939e1001c8e62d3918860b
-
SHA512
359de6863dd2c3c44b874ca411f4130f6f6e5e23aed9c770f3d19c86605371e0b97cef625cc3164a166aae0e4e8dd2f48b7580b497248eb12e0c8782e31deeb9
-
SSDEEP
1536:S4Wqw4CqtDpavPyIMbByE5uzFEfz2fg5ZZp+NYw3Fxo7C8EG0/iIeblt:Sow4Cqt14aBtylBEfz2fCZZp+NYw3FGf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b086fb721ff0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C5975D1-5C12-11EF-8FFC-DA9ECB958399} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000ccdde1445e1b92fb5a36b3be191dc0803683eda09810a8b33adfcb954d5c433c000000000e80000000020000200000009a15bb268454115f4d84986546828ddc4e519d7ee8c01b090d730a73eb6717ac90000000e7882c49fa2cded354024ece66f2f73cd3b7388244476060e68f4bd5117de8c63175cff1aa5bed049f475ae196e087ca4fc8fd07fd86b3d946acc6e722d88cd32cebaf7aaeefcbe69c43df4451cd5dc4ad4557061ec2897db5270f66c772e4726746bb358c5afd3b9a92653bf805b1316f22b6c11605054e48459eb2edccd2f1451b471967c50add47d0bd6e4a724cb8400000002e008977d3b2c9f9094eed317008f2544018b55f9ba2e1089ff7a8823faee78912d37cca8e437332c16c0ebd3ae41ba165b0766fd619d28f952f24ccf1a6c670 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000a2ceaa045073c6e91ed6f22b591f4fc4c2971dedb082fa6eeacdc4605ca686da000000000e8000000002000020000000ba09489efd025f70cd48e09d4c1378d78d53a86b1cd643beccb71db60315bc582000000025e581c5fde47c9eeb0a80e63d5329bd0e8c64431b0b04dc793ad965fea2b35140000000a0560369e5868bf58edc6671a9af9883fdd96655b5897f3a6c5b985ebaa297f265f833d0554e1368f140b707bebdee8dc8ee17076fa609e267e820c5468e3255 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430003915" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2400 2536 iexplore.exe 30 PID 2536 wrote to memory of 2400 2536 iexplore.exe 30 PID 2536 wrote to memory of 2400 2536 iexplore.exe 30 PID 2536 wrote to memory of 2400 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9feb1834b2e8d527a98498b2604210d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5728b83697122df09ba88c17fc758aea3
SHA173762f9bdcd0724dd9ea9272b23619043353ddcd
SHA25684bdcdfe6d6f4c80d0afb010ec995c9021dd7e3023c88dd328305f8e19f792cc
SHA5123cdfe5759a7afe0c89249b7a41a6c846c0c99132fb6693f3debcee7eccca11b641bd3d472d041d53c559445dc51550fa5279b1bc90136df2b4465b4d511d9da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54d17a268f58ccbce47ac366531fd79
SHA1c96794b3256bd3fd8a9fcf7a9423c5dc0f6fa15c
SHA2561ecd2af0e998eec3e5428f0439ff4e53c978b5ed6223ed0fd659c928a08b14b6
SHA51227f6161e6df2e44ec3a20752e24713f5bc378024600439ebb639ae95e6a959cecb74f06159f364da14d23c31fecd8800c397e1105a0765542782d9a2af491bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcdb0721f87f4829141e874904426b22
SHA1fcd8b954103c70913bd8425e14dabb0edf7bee44
SHA256cd61b9eba42ef515b5930ea59355cd790e0bf35865816de41d129f2f9889e903
SHA512482a2782b77c4e8970879524d70a69fb001b9aa619de698d3c4b986ae1a31e610be4c1a9e5615f8b1aff696007732f1ce0affd129a39c6e5931976dfe7afab9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcf6e3562792089441215d557587a8a
SHA109318b843315604a91afed802d4241d3b020c41a
SHA256bb2f0797d2091970344e84d30a5cc5a38adf4c30fc219507e767423e5b13a0dd
SHA5126f32460edf1d9d3f60d015082bcaf68e3319507b1db0901532ec829b4a78728c03980e689f7c3ef6c0c0480a0e8a85a6f2c97b619e8c049dc3fbf4f8591b6ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710672b55aea0ca85382e5a71c6059f1
SHA1d409cd0ecdd4470477a6e7f0d82393b4d286b733
SHA25600ff4b5df66b8c624cc18945dfee9de7127d0a5b24e1784e1a3ec1c2f2323b9d
SHA5126c4df5a21d247d988a7f83e2365c6e1951ce76dfebae1c741889ff45e962e79573e2dd78f9cc913830a6a552cfbff8794e9adc05eb42a9baf6888a90d8b9216e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d9ca4bf241eee10df58eb375a26552
SHA15329f6b5eeb3d33c254530ee0f1f3b64c4c4076c
SHA25622c278e2f97aa624a4c54b86404306bd0dd5295d120188ca0b5f29ed4b711ca4
SHA51256df1ad374569ef8d45b16aee708df1fa065ce19b05abee387ac994aba2546d8ab8b78a1216e22f60c6cad5c6d5dd2f4971466f2387fc3b98407738df5b1441e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acc19766bd1ffab1ec6667c2c899a2a
SHA129cb57d1ca5756f960909c97f737dd3c7f77f6eb
SHA256fd8cbcec3b26393c7b5562e9b70e4429a970684fa518c97e746aca9425e2db13
SHA512e488df4dacd72907ca2b9e011ab73173702b9118bfbec2daee3fb0cdb00226bfe98fc002aaf5c301b39d7b012a398b89c0a3d4f226a0d4e336ea0b5af52c0209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c0440cded20d5642ab0868c2b2f2699
SHA1f2d334992246e1629a1ee696ac99761b876bffe0
SHA256dab0498362c3ac38a16a7325d7f9068cf84c4d400bc422b4c3894f4fcb32a137
SHA512f9e83909ff84064973b2fd257a68b2430aab1194fa2a0f7bb317ea693c751be63c5405c95c049376abcf19677a5f1d6470a93e721cdd85a9076009043fca322f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65fa42a639c8dcdae07bce43abcaafe
SHA1932fca7d68c0e806f6d7ed07db5efe0dfc708deb
SHA256098aad9b190311b17a8267fa1bd036383ab8d7977e0622dc128cb091d25a9852
SHA5127904f5d87c926deb130eb999b71d208c06a2191eefc24925a2d4ea5b04cde6efd1c7d8f9b4f76291c3d057ac5a3ac172a4277d86396cdd7e5c4fdeb380c85da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0d3a16cd7ee09e32321480e5cc1058e
SHA1554583221b29840e1a9e2d15e205f5a11df99b8a
SHA256c15d02263c3cbecea962d47ce3318f5fcfd4824308fdd52c527ea483be87fdd3
SHA512de547e1852abbd7b368bee330f7b0d7f95eeffaf52fba34cb7848f53375ee7a79302afdf8b4144ac52ceeed310701299e21cbe029fd2c532c497c9a952336caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548bbb9df7da9ffb9a3db34b2327b297f
SHA1f9b62bfdc65648d1cbf9eb9a1d99359a4694a1fc
SHA25607fe1da4e6e622b35255f0a434a011ce6fcef458a9e67dc50110aa27dabdbf3e
SHA512fd333f4970670c24a19e0f2b1f4f94aec724d6fff421f7bfebb2b95664277c4e4e95aacd4ad8b2ea0eab73db218e48ee9ab92814d8bd7ca208ee5846e23f513e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a6e477d9a077ad4b5fc42fb979ec58
SHA1435108942f5766848b04d8f371a4ceff342f7292
SHA2562ddca8ca7475984f069e77de1b9da666a3ed6f5ed9a92d4f771c290a373bbfb0
SHA512458dad6e416210a0f685e3b27ccef8a8e9975ecab45e7edb09e4542eb87dbf214453ee10285c1cd4dd1931d05e4f2ad367327c56f8f2e77a016b9378a69e1c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7038c980a445f92b0bfc7efbc10956
SHA18271db4e3dc58a9b9363c0dcb56b1da9ed61c24d
SHA2563b1d7ab436ba7a9487d049385b17a522444bbd39bc92bbe87d7ea307b5f2cee7
SHA512967af640cfb320081717b28103e7e0ab15433522234bfd5eebf5ee181d0c3bb6c7d4b1fc981c2ce58f3bbe2ba09dffe70ff10d1b7d0a241ef9891c69d973cd48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415be78ca5fc6fd99ca713a78bf35d3b
SHA130478b930860c807b3323f36a5d1f509bd253ad6
SHA2569e1ab7f7adf95afd35d046d57fda2a5866ae4a4fd585541aa29e6165544ecd7a
SHA5127d971c68985e1444c25fb133558adee2c5c429f101b87b53b0071f27e4ecaa60433e3fad3a5dbcb29bfb5a81bb381ee4a0a659b4a637805006ae81b50a460732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574c68e89daf2d96bcfafd4f1fd598d5
SHA19a62a31bd971b847742df4765cbeb8a76b2c2cb2
SHA2560021e40ec069b1031914820c828babf5dffb523d647642a54703154186e7b2aa
SHA51249037ed208f648595286578a6e05472e26ee11a11720fcbe968a9aca7186ce47edf95553c599109bff4e031d7c324326424689d5edf345b75ed43eb6aa27dc93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535aeb17e8b99859f3a8a730fdce4709
SHA1816a14f76dffcdacb6066419ccd1ba783b42e0f2
SHA256481146e7e616e524cf316e40158b1f61b18798fae15c003922fae93f3d735f17
SHA512622d433285f17dda9d5d9ec5c581de7bdc4283e9aeefae433a87aa9da3a147c64b5dbd2e5597039dc7920879a34d7cc05c841cd9b6f6cb51cef2e4c596fcf5cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa6a7ddf0d2614d11dfedbae970c8d67
SHA114b882fd5c1a5bccbe5fd0e00e4d9f9f604ca88d
SHA2562170ef874ed321be270274a48a8cd00e1171756dfcde524a01418e907b004ef2
SHA5120a9f3fec86fbeb69d8e027483276da5d08cbd17c410ea0b69fca9046e92640a999201e991636c7b718a1cc81bd626119e3f860455f6d2ca9ce90b651ee0facc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5634b17bdabb50ec1020f69df941afde8
SHA1eee3146f2d410b48f623ce67a329b59f2f6eedec
SHA2561e641b53405c143ec0fb60c05dde67fe5614d6bf89ab62790ad6b065daeb4600
SHA512682a2000cb11f395999946478bdd23d48995b8bb064d9f19683f79591361d59c863fbd379d8ffeaefa1ca7b88763db2d86d26e4bf6487bff84e58a8b575ffcc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d57862a0700219a9983192b528e9b818
SHA1a913d4f317b0596d87f1faa2ad929a517d1b665c
SHA256a69609756e5f047906ce54a09242e105d59a1a36a194f99ff07c0250a6cea6c6
SHA5120560d0945d9e9beb9b96aad1f388bdc2d02aad9fb2592ae790670192026e2b58db1656635e4e76bb6e2099e36c6ff5f47d9166bbec7acb61d9d18ac001d095ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b