Analysis
-
max time kernel
132s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
daa42a772c78e9671c6357b7c7246c40_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
daa42a772c78e9671c6357b7c7246c40_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
daa42a772c78e9671c6357b7c7246c40_JaffaCakes118.html
-
Size
159KB
-
MD5
daa42a772c78e9671c6357b7c7246c40
-
SHA1
405af5d5f8f3f95ba2a8470bbc9094bd9193ae8c
-
SHA256
40a12027a9f669ebd9545edf94a189e3bdda61e8c151228bdfe1d3948f43c794
-
SHA512
4b812b06f00738747a61fe4d9f5c65dadf7be52a021a485ba4bdd64fb97901f78b892ca3fc61bfbf0a2f239ad5d35395d196c490d5db1634b74d57e84863eb4c
-
SSDEEP
3072:iSgOxGJvshyfkMY+BES09JXAnyrZalI+YQ:iAUEksMYod+X3oI+YQ
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 1068 svchost.exe 1388 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 IEXPLORE.EXE 1068 svchost.exe -
resource yara_rule behavioral1/files/0x002c000000004ed7-430.dat upx behavioral1/memory/1068-434-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1068-437-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1388-448-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1388-450-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1388-446-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px82A7.tmp svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439925642" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E78D151-B64F-11EF-AB2E-FEF21B3B37D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1388 DesktopLayer.exe 1388 DesktopLayer.exe 1388 DesktopLayer.exe 1388 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2640 iexplore.exe 2640 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 2640 iexplore.exe 2640 iexplore.exe 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE 880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1716 2640 iexplore.exe 30 PID 2640 wrote to memory of 1716 2640 iexplore.exe 30 PID 2640 wrote to memory of 1716 2640 iexplore.exe 30 PID 2640 wrote to memory of 1716 2640 iexplore.exe 30 PID 1716 wrote to memory of 1068 1716 IEXPLORE.EXE 35 PID 1716 wrote to memory of 1068 1716 IEXPLORE.EXE 35 PID 1716 wrote to memory of 1068 1716 IEXPLORE.EXE 35 PID 1716 wrote to memory of 1068 1716 IEXPLORE.EXE 35 PID 1068 wrote to memory of 1388 1068 svchost.exe 36 PID 1068 wrote to memory of 1388 1068 svchost.exe 36 PID 1068 wrote to memory of 1388 1068 svchost.exe 36 PID 1068 wrote to memory of 1388 1068 svchost.exe 36 PID 1388 wrote to memory of 1500 1388 DesktopLayer.exe 37 PID 1388 wrote to memory of 1500 1388 DesktopLayer.exe 37 PID 1388 wrote to memory of 1500 1388 DesktopLayer.exe 37 PID 1388 wrote to memory of 1500 1388 DesktopLayer.exe 37 PID 2640 wrote to memory of 880 2640 iexplore.exe 38 PID 2640 wrote to memory of 880 2640 iexplore.exe 38 PID 2640 wrote to memory of 880 2640 iexplore.exe 38 PID 2640 wrote to memory of 880 2640 iexplore.exe 38
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\daa42a772c78e9671c6357b7c7246c40_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1500
-
-
-
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275469 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d02b0e3d8dacdc272b2ab1c943b6e4
SHA14a9208b7db899d29f94852207de9bba281544b7f
SHA2566d05b5a8bc5394c3292bbae64c5b20b60efddc9d1e6f46e1a239a9bc93d846c8
SHA51242408b0109e04fff3a0cdb2786bb18bd7a56076205806fdde0901f9c3566169c03dadd4606a43dfffe7cc4da90a36cb3ef9c815cc3cc476fc00530dc7bdcc9e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f8c8a646e8d16523d989baa90415b2
SHA1f37ec193d88ffb229557609f074dc4a784959ba5
SHA25648f21bd87fc664240f78e04cf22866f6d282e90e26b833810f79afd0ecccd2ea
SHA51249701fff0c12a7b0033a617a83506470af3915b736fadc666be2a9656e12e27aca3cf90b493a475d4f0e980ba859257f0b6c2a18eca5136299db83bde18b15c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c40a30751ec3a302490bcbde67660b7
SHA124fc2eec3ebcc17a6567324a0b467cb9f40df981
SHA256f17ec21a585bba178b33e9532fab881ce40f41c5831e4a93c7223e298625cf90
SHA512fab59cc52c7628ce1f79bf205c3a49503ee5246c3f046862af791bab4d41c8b27a6372271defa74f95902e3c62715e3d55535f4ed3f93cc1c86131f95acf1a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd04a7727c86db2ff92b53bf95204cf3
SHA12bbc6622f971f61a2fa8ff5227d2f1a135cd72c3
SHA256491eab35250bea21d0c8d2f270d75428b798f9d60384bb5e041e321bbfe57c93
SHA51259500681e53c3247f9d2a2a51e2a9d974c7136339e0ce9b43b0635d0918ee87288a987650908190d0746f74c246ac8d712a6538588d91f84f71cbb12d3eeca84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b53a1e6d96ddc3df031d7c42bfb0e9
SHA1cea1c98ef3fbd37517da237220e14a18719bda16
SHA2569b6249b583f6dcb32ccbd7f29105600c7845adbc12c49e46910f9d4f2f8c692c
SHA512f9cd94520310bb48895ef84bd1fcd4c1aa3010b33b6d8a7758aa863b3dcd28ea357392513a5c2ae6f19caf232f86054172785f0be63e43d15d8ae6647631e892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55d3ad1c4f44b7a985e88a361ab1c4a
SHA1b5b91ab3b05c149d228c224d1a080753af6f6e69
SHA256e19a70902f1bcef5fb508368c600311a42451d133fb7dd11ce16a398d8f5571e
SHA512faef07b09580de6bf349158ecebd951adbe57aba9de6164dd3df40e46db6c62b7b9b8ad7a927cd7c605fc42563d82619230e9fc5b84b752c23167d47f6470c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d5519c9f431c7badffd78df0c49518
SHA19dedc182e67c17a97a645484ac0daf3239a83a6d
SHA2564264320e9f76068c4d26f45492450fb31fa1b90f2f270c641c60d38f721422f5
SHA512f1bddd3e5c35396e22b9a36871dafcf4d4f500486fbc8525ea62c0de34955c456f01afc56a070b5ae6f06245f656966e1fdada86837c76bd060220324f1577c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f28b164b978abbdd003601aeeeda91ee
SHA1d9d99b1f204a4735a4f1e253e0dbcf5035bc34e4
SHA2566db232299f696eb5b46a14f9864f86dc5b58e8f229cba20452a03e0c670057f6
SHA51263b7a65aa88dbd8eb04d3725fb04cafaac626c74066e8ffbb2931099d94a607002800b35b2dc385e81e4fb198d86e7110772c02bdcb0e2bd2da381aebe5eeacc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfabb55a31f2bf781a0c61fe82b400c1
SHA12bdd28c6a7eb0f86602637b655ced9f02c98fd6b
SHA256686be95b6902c03c44b0abfe5d86b41f722a598d1256f07cc30be2f99e3d735d
SHA5122fe7157e86cdb80458c3dd49eb271f7ba2860975bb969ea596cc18865c08742918cfa5fb249b91328d2c11255762a83ae5718f288d3c86b62d1d5ab9765cd416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59820c54201d74bdd778ce68d529371d5
SHA1518e908ff79fd082a6f233c9b006e2839280bdf4
SHA256e9d2822be23f722e6584f7655ce212e195c870592f56e2392204c851997ccbc8
SHA5122a86bbcb7f22fc486c848f5f7c9ba579df6a1e79d5be24b6f621d75273ab197caa6e3b1aa0ae04865c45f3241a84581b02c5bc4a28864aa27eb68316f37b3083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548e112f9143a377f18438576835a5e67
SHA17bbe12af551e2ed7f9eccb51226da1b4be3dd1af
SHA256b858dfb80c02da9bba0841d0a6fe2ae11f838a94fa1cfd85052761e8f70c68cf
SHA5120e086369032675d77a9830d97953f866fb6319e6edba954d88d5e3e9804473c5739e5751ffe14109c4484fbd0b87251c4e9c24fe7a0bb3e2c0b5d5c9e1ada254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537eeb75076d3b192260e9039b64934e9
SHA10b9a03bd98b807eab263ad8c4fe7a186b38099f0
SHA25609f8de30d8a73af20fedcda8ae6c0330d7664aa73b7442f5e263909c54d4a567
SHA512c80138893ffc4887c3ea452894a5b4c94cc3f8c346230da6f2411c68f7ffabbe69431cf569615b37584c821b626f6244f805a526fd37a93f8e92e10015a415d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46c788e3ef792093fec6286dda2f709
SHA148789861adad72d4e3a98cc922742101f322d6b1
SHA256d68c390254a96693a57e84b527b9ac233907b82b840ece9b68e017cc5e2adb7f
SHA5121a71a9ab0fd53f02b947ce6127ca372015a63ded31d0eacd4c0c90a24f910096ca4eec37e35fa5161d188708cffd00418a95b66104f4149f3b0bc069b6607b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57052f232b6ed52df6571d5e6e104f0bd
SHA1469639811d440cdff91e11e00ef21d399237c61d
SHA256b948abebf2e5e59e55bdc4678e82376af485b362f771d221f0cf5c3dad17fc41
SHA5125f3fb56333094ffbaf5ad419b4ae2495dda4855acf6dd3d6bb47fb51665521e51cfd779e7fd1f924ec4e9608a5873a7ee54f5cce878f1377e58caacdbf578a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4797c489297a28f779dd5bc2b7cb555
SHA19ba54c1c493cc6299dcce9329b967f6a5aa7cea6
SHA25658217d6c886fa483af71a980310c8be283ade8d97bec638e80e4fe9a9495ae7c
SHA5123a04b3879deb25657b47034d3206b237d9f6ec32fd46b34e44674ecdac461b684be9df1057d9bfe5ef62f29344e5077002a0eeb1b82f7558adc9296ce5b9408f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e1c28bbf64126ec9e84d127ffc8345
SHA118459b60105c1fb8a42f5a6a53082804096a251a
SHA256d669af79df9e87a0c61d35f49362227c5bd49431b1e9625d3e4f2b76271cc070
SHA512d882f40756480041645e0e3997ed7471bbf5a2abff83a563cdef72f1bf4fffa1899b45d78adeb36e3d4f9b20088131a6d50c0e0367cb8b8418c47a5da060ac34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41bbcc18278768fdb1e8d38f90001d0
SHA132ee63d4ac8221f4ef4c9abeece9434dc9c268c6
SHA256bbf7ec6fd256065601e7ea2109a0536823c369c41ddd8e03c61d072c0963cf5b
SHA512127aa54fb0f6561addb5c138a2b3569f1432b04b1452603578e02502495b4c3336a487f6da05f16b129baa7347a40e40765312042c592e029d4cd17d2fd8ab7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af7f17aab3de08448e6e1739f4f0b51
SHA1b4b6e4b0c460d5e0f18296f3c1c61f9f5183a1c1
SHA256eacb59973d5c501366a710054a3f3d4790be916485d04afb95ee6a8789b6d4ea
SHA5120df2478ea7ff4eb03473ef3d209c3ea8734e5118ace88844815597dba8d38337cc110b7cef8d5faedce39060284cf6a769d4c635effe5445d9a0eab0d9125abe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a