Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
453e6344789f0f43854d002d70a72ce2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
453e6344789f0f43854d002d70a72ce2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
453e6344789f0f43854d002d70a72ce2_JaffaCakes118.html
-
Size
138KB
-
MD5
453e6344789f0f43854d002d70a72ce2
-
SHA1
df7144e8736d23513c9b305bd1892789cb4fa01c
-
SHA256
8763cbd47c5e390dd91520db3a523b6aaf2287fc1741bfed7e8a909fc4108335
-
SHA512
36eb8d6e4d42e9a72d7c16da1efa0095cdffbdeb403cc584f7d538a16388b92bbfe3f750c5794bd298fdb96a50637b6207f21f95f92009d78f53ba4f1dc107da
-
SSDEEP
1536:Szng6ddJvilkKCyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SzPVyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 705bfa5ca51edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435119072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001326ed480a13ae4da4115b6a380a40d019b061514c3b9f29a7f7c5aa51a19d84000000000e8000000002000020000000ff153a52e5155941f1ba8b2c8f6b83e2d9b72a329363a8b6f0f0a72d9182295c2000000021b3e1eda5cab963af9f3d8c064b1891a2337f7daf944c7f090944ce16468f3f40000000135a1600f0179181fd977bbfae847d800126f9174295deeb5321ae1df8430ca60f296fbb7e349b0e20696d9f0cd21fcfdf81b52370a15ceeee3ec4a722870152 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{436CA371-8A98-11EF-BBB7-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000007b5a583c77cfbc38a1b6c8b24668e45d1543e68dd74429c1b20d1e0d78e77859000000000e8000000002000020000000cdbd097c1e15eb68e02c9f7ba685a356fbf533f7995861fa96a115a1b3af1093900000002bd9b70bed8f893de255479750ff5ab347912bc62bea71187e3cfb6442bf63587bcdaa7d08caba341b1255c1036a0a126ca105df648ea3808a9f5fd9a1283b6b1fd402f86323f6834b2a2cf6ebd7ea88b84cb891312799b247ad0e1cca43bfdd9b3e73b9b422328c645899684e095ceaf39046a008efdd55009cf67cb1745264fbee0763636e9b200ea662b93a7bcf1f4000000068358a2539ee40d7f8cd4a09ba51e6a7cf904461a145237d04202dca2affd9b31adc4f41722c3e66d5da177aa9198f858818fab55f8242c728b2c7d256b2e936 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1704 2448 iexplore.exe 31 PID 2448 wrote to memory of 1704 2448 iexplore.exe 31 PID 2448 wrote to memory of 1704 2448 iexplore.exe 31 PID 2448 wrote to memory of 1704 2448 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\453e6344789f0f43854d002d70a72ce2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5380f1236a120053f6588d207d9de0d2c
SHA114c343b0d6c0d8a3775f1abc0d87e00e7821cdf2
SHA25654fee32b5bfb75dacaf0ce30aeeea0c68fa5781efa6c953b4b3b5dfea9f58e4e
SHA512741babb1273e9ba386b01e68682a2f7555c231fb004fa542e4db62976f5893c5e89166e6377dae273bc3a73f3ed6267e14dc6bf405592f476a6eb176ca975be4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513cf3cdfe28e28c9e7bd3d5d1ecb2d3c
SHA1a323380933ed945b898d46a09478d4705330049f
SHA256f5e4e56fd1462bf462532292b2fb5e22a5ce2cb6e0075fdc6244aa0b0ffb8949
SHA512376a4fe2fc30033515800236cb5be7b2802cca5e6c551404123d8625a0698589dd47f4a4af1295af1d4156afe02fd15e0d9ddcbba0ac05902bb05125c1a79d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0000617f6bd1368bdc6651eaec735d9
SHA14b74cfef2b7281c387dbb00e063a13bb8057c373
SHA256dd215d9933ca08930c77c285d3a059a8667cb782f7e7e9ec092728099732287b
SHA512281db668c2fc566ef26737b12b736119e73c91787aac8ad7d8f44e7f6c2f7083d4cc03201b9172e4de49f8db47f29d2ba66f8bb2e83d9adb1adce69e31536748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c0a60fe5e53fb47a5d4fe6e55eb18df
SHA1ecd868cb0eaf39cdcb2186a371a03db8e7b5d295
SHA2568d0c0f603b708994dc5d94f28c3c96f1fa59427e3dca3dc3277968060094fc2b
SHA512828624ef7695390fe7d3465a159915a0ae586609870f75db751c71a766d8b3e1c9ceb9ca6b8dd24f46aba9b093ed50f6cfb1ccadbb8634cf33c6565b75ac1ac6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57286ceb3863824336ba87e9aa35420f2
SHA1d319b488bf04aaf2236be6f3e4adc8fbd9c75767
SHA256c3c9d3b97761983300d86fef2bc6dc131f351610405f39046c2f69413c5cb9d4
SHA512dab1c7b6d8ca4778707331d89117d803ed8cd41e313c93ab9a6d75b476d00eb1346071eef1b5b19d8b9165c497404d5ec230decde4f2b7a9af7e65bcd404941b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a616f7b6818c60ab770983af1eaba67a
SHA1016e06a153fbf0181f613f0ca77a94608598c4bf
SHA256e075c83f4935e1100b0ad5c011ab0ba79e3bd78f3d3e898ffc20f92052d053bd
SHA512107ddc52b92ed288befecf9d374e8bcc580df8009d7ca8c3d0e720fe819ddcc0982e71e392869558e186a7cdaada682092d9e6cabb32f6a8456d04c18d0db4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a6e7a5894a5a463b66ac9c34367c6d
SHA17231d24aff31cd209a35797667543f5018c14abd
SHA2567d3fff8d010c07c302e87fd4627073bc489c2622f1f8f9cd788271c39a53ee90
SHA51260c99c05dfa9da0b4b8b874b0bfb5f6ff0c4deb85f234398d38edf15b84257a2f1e46d4ff7005f832560468caf1162d03b46a5e14fa7577db0f511c29888d95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511aea076ca10e190cd2b37e86f78b801
SHA18a0e0c53ca79e93708cec595462c6d162127aa8d
SHA256546668ed26e66595ef7846ceb510d214c0bdf47a34a9697a0be1888579706893
SHA512ca4a5480175ca7cfdb7a0ef11bc7394cc1264a51c9b09edeeaa4b97a52c2c1e039195bf30a58590909fb9a39aeb0353e9899cfa4a947a0fae3d8d01e0adf2b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c7e0ba7d9bf1d4a8bcc71258b0630a
SHA1cb6cfc815d60a479f1fd37bee2e95e8883efeb5a
SHA256cb50c6d3ee32f8fee0906d82eef0956b6c516ec3a14faeff73de181b5d20ead2
SHA5122493d367a7295834f84871a86cb214a8aebae17a85dab841962d8c37ecaf024e720522e861455335d2b6262a09f31e51070f3b0b1bab9eec26453d5a09c8bfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0a3ff72c0adc9380bf2797c4162af3
SHA1f5f4be3b37b4aec89404a45b224b972473d04265
SHA2569c4e1632d08a238509280234c9deb5005a7c6e2df6173ce64b5d5132d3619632
SHA512f1ccd3ca462a1ec0769a1aa423f59d9b0349df3b7ceef22202bbaee09e4a19787d18e62a5d4c44a578601ec3fd1f2bb6e11d8e9d053243a8810e203d2e0c4cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9da2725e28df5743b36b5afadc141a
SHA156792c46a6517740a22abec0714637870e31b8ec
SHA25646b973cce694f751951284be2e783d0588bfafa63cca4eb5e4f2a67edea831d7
SHA5128320fa195761cdac5439b9eeb15f4fc2800ba44270bb01c1bba4948d14d33a2dc701169bc1e4c9d651a2673a69b4723115adcaf33170145234eb123699aad8cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1366bcdafe65bbd8dd8d07041effc28
SHA143b99b1c1df1935b23e18eb164868f747acd90da
SHA256304662f0c3154b423609ec78a58b6917bb2d60cffa8f35a5efdddb0ab0da3c45
SHA512a8d7e603f77edade4a58990aaba56436848471981cc64021f2ad8596db0793214b384feb570330499f739d28e78f8ce916fe6da8310c84cca37d843987f43850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e874fd5556313da52b5c64ea2d176c
SHA13ac07f699f44afb4b74fa84906038195e712d1b2
SHA2561943df17e69542bd1e50de7d888d067ee3b0802d1ffd5a86a482752fe055b6a9
SHA51293ed9f0b3dd1d461201ba372940cd7cc3eb7faee32a84234ecf9e9c78b098d2005405a17886019c086874fc8ac231a9ae3874c00653aa5becab3c9b668bcc89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b3e5c691f17a550877c5cb7a2610c5
SHA169d8fab0791f8e9b495578356db7744fa2a0a1c3
SHA256f70d31d63d7a274b25ead48b56616515727efeeaa17bfd30ac8254be9aec9507
SHA512d4f448518196c1109a61f6ee186ef28cf3ea5ba55c3aee3f0c03ca15641ff008774bebe8b2a6b1efc651d65a9427886dfe6136f6b4b820bc5aae2e2b609ef18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508dfc538fcd7f835fb4d32c4bd6313f
SHA16ec3dac5122fd8e9390209c8f59155a579fe7f23
SHA256624a831e6619b86b8605f7634d58c59743b96a38a720ee5d501102a052215d69
SHA512ba4c51cdd4357f934adb7a2e7541657641fc93462e327c758ba6931fdb62cc01da23a818a1333f4f0e0e8a9491b1aeb2d276621e8f6bf6036aba32438ef34ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55021a0ce13809b594fe72d54d11b59
SHA16ff93c0023c92d465d2b0bcb2f993e63765dfaf1
SHA25628b88650598ddf608301cdb3b61e389006516b88f531c55054f2ce8c97a47dc2
SHA512f5c7f419ea88efe3f8aea1f452519ebfaef66ef8ed3fc5d9f85b587a09bff68b332a830e7e098d2d531f75c54c3fae76dcb2ada24acbe0446b8a88dfb22b0f15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b05f8722b09db89f639bf60260fbbc7
SHA11638680b00a5619c46924621b1c44bc685e7d1ec
SHA25673862a46ec82c801ed2dd2401f031b626b129e72013150cc36b53a9c6a384571
SHA5121815ac5049312a306dd3bcc4b5e8b02c5ed4f20d6ecd3340bb62b5c7283085bd5f7be7a4c6c47d14ae4bcd888427300b6623d886644c52ba2523372660d3836b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54516baa151589ae7b0997892b8cb2b32
SHA10fd4f82d35cfbcde604f6d2826432932318b558c
SHA256df52adc7e6981f243f9fcaf9c2e59a53c4d80d796bc2e2a3784954b387bcc645
SHA512d2b2f39a3aaefcf8e5b576c408633b702cf20e4e97ca2ed4b3faf903cc59d6133c1f4c980f8cca7a782f06fceaaac07596a5b3135e32423b2339bca1a2cffe29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b37be58df8a2bdc4832726ddfbda46
SHA1bb65bfa763e5259e67403f8e4b16141a624ed19b
SHA256cac2a2730d5957b908ab415213aaa89e77bab5f87bd661aceae28433ebb3faf4
SHA512bf779083e8807dba7986bd58a70622b1759ba7db4aebb4493ee69055d57b7a62e6a2fe8e78fbdcf9d4d48818e2a370f612c9b6525eb4f8a62ab1bff720cde6b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b