Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html
-
Size
143KB
-
MD5
c10a54ad78ecd98b29fdf4608638fb6e
-
SHA1
74346810f1a527d6475a743354f5ea3663a78a9c
-
SHA256
218462ae22866a16a4d0f3e3fd56152a33eaa8df0b96d12b2e49323e3dfbe8a2
-
SHA512
0a379720c7c3d811f72bfd394a29185eb1e72337bcb53664b5f53938f184de4e6127a0f264c5edb3cb4ad7cc75ab23228062b13bd73d0d48f5134f7f74746fa7
-
SSDEEP
3072:SUMIocpvrIDx7dyfkMY+BES09JXAnyrZalI+YQ:S8DpvrIDx7osMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE79F101-62F6-11EF-8F8D-F6F033B50202} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000e730a1c63714fd447221a4118e1cc5263d7c2bafc6d85ece0664153037bb545e000000000e800000000200002000000011abe96e96e534682a6a9a292cc223e27c67466e3a5b5536d7cdc035bac4a02790000000f7c6958641a4cd086449150eb8ff2d498d04189d2a120b4cb6a147dc8968d7615cf91635b15d3e7e1432a85c7ba912f5e6804d2c56f007b50a62f3e7204a957d6f7ea85478d28e00f568a3b1412976dd8284646252654ff7a3544d001ab511d287dcffe2f7a13edfd198b838d832b7b699575d999545baf350ed3b487af31225931e3213e9febe5d9643dcd6751b307d40000000617405ef37cd976b5b155d074a2a44cf2b2772e3b27e2dd87ad3c85102c1860fefbd8d021c6eee715c82e33e940bb1b0e2777fcb4bca6abb02bd59f22e49f6ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430761711" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000003808f90497658a35c8846ae112f7a20ecc468559b4182eb5a3f7f59af9536e93000000000e8000000002000020000000d1f491ca5c13f169d464025e5654effbd2767598b8835264db4a370c44344efc2000000059c8ecd34c7d7fc5940bd515b0500125c764eabfe2ea04616755b95ae724002f40000000b31ab33275306337297b0e2f4893cca10630ead57e0501834b0ceb65894f29424c63c1247707c0f1a60eef5e46376f80b7d55cc3367d592f2ffa8f9d71712653 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 904c53ee03f7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 iexplore.exe 624 iexplore.exe 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE 2636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 2636 624 iexplore.exe 31 PID 624 wrote to memory of 2636 624 iexplore.exe 31 PID 624 wrote to memory of 2636 624 iexplore.exe 31 PID 624 wrote to memory of 2636 624 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b239a42f13c1aeee9b66c6d0eb7ac699
SHA16715e53eda7dedfc012b15959e3c6a76047db9a4
SHA256c81663f46ab212c4d7cfa42ed4ef30404abbfbad1e21a4497854fa0e6c04f8de
SHA512d99e39ac7c9e965a69189d3e213dcf930bd367e213828c127ad6893cd6f3b38f8f1a6eea07b4f05a62b8b686519da4e543168129f2351ecd370beb8e52f657c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd103402559f8564bf1766d7e6b5907
SHA13b3c76271a9b3782763128d24fff5af6e6cf0410
SHA256cd2e89aaa3b0621a9b26996fcb43127515a57ab5df37547cfd1be06ce13da8c0
SHA512b4d9b5bd42e47359ff6fb948c0cd34a385590f5746575fd9b102d09f2b7b487eb6f96f606bd9186549fe37cdf2b9541663acc8da42c7125fe1dbd85f7e1861e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13db45f08bdad46ec5ad8d39b2d6aa3
SHA1cbd314c7de87f1dee69027d30891953713c60728
SHA2560a5b64ba4de93cff429e0dc09421aaacf5a5f17ba0d115330cf222ef2eade16b
SHA51282bdb38c76da982be2d8b7ba32dc8712d999721228ae09c4b44490f4575747146480efbd4b6911fcb9cbda98e840a4890d4285535594e58056100b51cbf596b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c513349c0aa594e59db50570045021f6
SHA1d23f6a2752c5f43d1d09fde3627bee67d3f9a992
SHA256883ba8b270e1c529ba5c4c7d694a9380bf4d70275f58e80bb0c6bbd2bd4e68b3
SHA5127107ae7a9fe2cfb9af3089481298fdc4033465405b4447cdc017e7aa3620d09f97a77ae6b37c0a2e24a85e5abadbbc76d28cf1dd36b009364c4f5258b1fa2f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471d687776ab4068b119c0141c4af0e3
SHA1614622815d0075b8c39f6b8e5cc754dadc5b1d6d
SHA256790a5b2fcda2669693272c3f37ac50833b9a708f5777dd008cf227084095c629
SHA512c43984b976248abee5ec812b7fc8d2c6e68d8ab901fa47bf7a31845fb85899327dd2883a87fddfca743e208ea14ed989f6fa1be62dbe01dd5a5f118ad3941f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8a1879735824d08520ea439074647b
SHA15b18e6376985f7ad18ebd952ce03fb20e7f16360
SHA25683fbb6ef9553c4e0990bc1280a110ea093c20980b159927e2d3ce29d27e0ea27
SHA5129a43a8b53cee490ecba995648c5153bc10da374e522e5d20e91d34a730a6d3a9e877111a2cfbd44ccbb1b4d5bf960e23693e032a771df8a19b87104f17eeff27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd6b1b99cc6067dd428fe8ed5f79e2d
SHA11efbf6df347c81f2808c329577f5508763fb029d
SHA25683123fbeadcb30000e0ca13520b789f2e7bb1c62bcaa3b689439351c88cd908d
SHA512df14f55d20665e8a9d19bbdc883ad73bc66f7053a69f5a670a2bbe3a32f4894b36b39457b5864f5eefccd7ae906a6fedd39c70e297aedda54b9d274fbcf56134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562391182797926465338d00d90c390a3
SHA188e1ab7b1b4839fa409eeebff1ba2b768a8c620b
SHA256851675b52fb0dfdfc8ad9d8b27db062ae43294aa08ca97c3964b2733f31c8050
SHA512d7adf7ee975abe7271e7f53d22a2f4c43d279231ab915f612b906bd7ea678f55e2dcaea727d4282ac930f063b4d4d0676bef5087913ac3eeb664c850301a3fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547c7f6888743bf45b5c2ae6efc5ffe92
SHA1bc9dbb89a1861aad92e7b3ec32d9f5ec6ca45a77
SHA256b6e2c370fef7ad097f09f43c7f0b1b8fbf9beabb18e5cd04b6fbdbd61957f68f
SHA51207005a18dc35efa72489e609c8420db05a2688ef0be53a41b2eb3a7c69e468c22cbe7bf17c7bf58318aedbbf52bea54b8090ae1b318862f8fbb939f13adee47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b382deca874b77a5647d1be3554b3f9c
SHA1129fc0d6e7386e94e6573edb1c37eb264ed2e6c9
SHA25658271d4d6051c65857d3d562812c66048a6796391779b346ba01d6a7a6f390d7
SHA512043f091f1672410fcaffc6d2ce3f545ece8c4cbbff3508a458679d7e55c3ed74aa9872dbb3441fdeeb4192d92f4cfc4f10ef737a9d0f8c28fe4af618e1225e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55c2a2f4b654e8d42359a638efedfac
SHA17f31e02f48efcbefef0f086e10bf65bb15ada798
SHA2562e44af65918c41e62c29a19f61f00f27b344ed7be227e3e863116521c3f3216f
SHA512d87dfd6755fa237ef9965e7dde617d8c01afe8b994ac2c5cc33f049c426235cdfafc0298839c81e4f438d8aa29783331a05fce69152b41dd7ce482d4b33d8db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc65fad2683d15fa5303f82f87ed9f9d
SHA19ddefb12e041d1d3ae396a4b30f895a1a77b14ec
SHA2567b1079dedadd592cd095569d544ee5ecdd2e586ef0a1ee9b1a1cd7142162b1f0
SHA5121ccb90465a7a31af332e9d48780ce94aa3751880c616ba24cba387a6ff1b60da68429a3a7aa68c53c991cff1872af3462492d21ee6c301f44edf7f6628640912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a9ec9cb0a500712dd8cff1f2d5cba1
SHA17b2b5988ccb858746e241fb8ad325ed932ec4482
SHA25654746cc3a310277dcbefec192fd3083b54930dd28f327c1afac67f08ad41524b
SHA5128b2431bea63e789d929a918d2f66055e708c056a330831d8dbc206690683c7f4c78d490daaf19f7112b50d6484521ef6de706127052db06ed0f8cd707b7806b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409b35c1624370bf16b327ad9017a85e
SHA17ecd6320e3779b1bc81ae0390785d029bba34c31
SHA256040a2340293ae70c556ed4d354fd7522c780d82ffe559580a1372603f25bd736
SHA51252c2b703a663bc979dc1dbb338afeb1d9c7ee908df398dfa7dd8e91e9291acc25461971ff317ab53ca5da84fd6addc384778d64a1f8c8ece4a44d7db528bf546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501601ffc0f2cdf346ae4a6ac5c78d616
SHA1781c626f9ac01b0560c65b02dc77225890eb7c57
SHA256791d64da9a05a734237e304f781aaf9769f37d42d8a00ba8bc8f76a31d686894
SHA5127e8362589001041a9a818c91a94f74001b47712a39ee42fed80d1290eaa0e740df879b3f7575a3078c1d6341f2eab3ce38158c61506452e36dbf985678bf55a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e21d5bfa50799cd6c025552d5982f7d7
SHA1e6e04bdcc8700603db1d7f7d51ed65e6a29368c3
SHA2565892eab20964dd692e2d5e05851911708cb4ce3f00a57e5ab6e315ea3f704345
SHA512e472442727d9fdb5f7fc61365c6c91a01551b394fc206a8bd6a611701bb4b0601421f9b3eab25d9f8f578fe644ad01bcfc92c500fe6976858994679907654534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96a1aca4fb1ac38126182405cc1263a
SHA1e66ac01bd037405b61fc8382578b3724400d27bf
SHA25616d4334de94f470c18ac3270f5fcad57784a009cd30a8608b38d61def3cdd106
SHA5127d76f56ad449d93f04c526b4fc07325ba6625f906d9e735315ee57c0e943c1c41374edcf8527a90bdbd5fa835d2a07e851c900b3d749b64646c4bf4d8164ed0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55be3f12386cedb93af8e57d4f0cbd7eb
SHA1ffba248c9e3962fb412d680d959d226ff4893093
SHA2566c6e9d87105dd3ce97daf8f9ca18be19719af14951d1f0378864d57a2c8c32f7
SHA51273fa1754bc460ed46eb4f9ed9baf58cb0746c1c8d7124fec27c526bacba19de0ad7ff6c6b303993d21aae707226dcc096337249897f47a408a2a7c8912efe968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e89888d3d48f3f9b8e61edb08cbace1
SHA165e31a4976d6ec9b27b2d544fc4a1262c8bf1423
SHA256957bfb39355684f16c3b917b4b76b999e9092a6e09a71d369f1dfbf6a3d077be
SHA512d96a284f6a20466b0586c2e3d6bdfca39465384b37c1ee50111d8ca357545b459e21849d42c90e410523e90f4df7ca9b997066c3b0607ed0e95ef149d36cece9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b