Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 16:13
Static task
static1
Behavioral task
behavioral1
Sample
40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
40d35f1f6e71d5be3166dead89573bc8
-
SHA1
5f6291b39dac2622a6ea97fbad8a7d4235797178
-
SHA256
771d7a35e4e0b3fa80116af4b5e80afaefd24244e586950fd064574a997f1d72
-
SHA512
2116a68b554746ef5abc743b8f885956b2b6626b4358ffb36d069d834fd3dc1d3f0ec4c9ee455e01ee755d529cee1d83d3179130dc94fed244e3b258195df409
-
SSDEEP
12288:wOqBSe3b7MFJb7Mtx45EACL9NZ8JZi6MPNUp/musajK9I1yG88F+Nqhs:RCStUM5qjZQi6SNesajK9I1i8Frm
Malware Config
Extracted
xtremerat
youime.no-ip.info
Signatures
-
Detect XtremeRAT payload 8 IoCs
resource yara_rule behavioral2/memory/4032-5-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat behavioral2/memory/4032-6-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat behavioral2/memory/4880-10-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat behavioral2/memory/4880-13-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat behavioral2/memory/4880-19-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat behavioral2/memory/4880-24-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat behavioral2/memory/2040-32-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat behavioral2/memory/2040-33-0x0000000000C80000-0x0000000000D3B000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" explorer.exe -
Executes dropped EXE 2 IoCs
pid Process 4028 Server.exe 2040 Server.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" explorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4416 set thread context of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4028 set thread context of 2040 4028 Server.exe 94 PID 2040 set thread context of 2500 2040 Server.exe 96 -
resource yara_rule behavioral2/memory/4032-1-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4032-2-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4032-0-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4032-4-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4032-5-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4032-6-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4880-10-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4880-13-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4880-19-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/4880-24-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/2040-31-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/2040-32-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/2040-33-0x0000000000C80000-0x0000000000D3B000-memory.dmp upx behavioral2/memory/2500-39-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-41-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-40-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-43-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-44-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-45-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-47-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-46-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-49-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-50-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-53-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral2/memory/2500-54-0x0000000001610000-0x0000000001712000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\InstallDir\Server.exe 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe File opened for modification C:\Windows\InstallDir\Server.exe 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Checks SCSI registry key(s) 3 TTPs 8 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom explorer.exe -
Modifies registry class 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e803accbfb42cdb4c42b0297fe99a87c6410000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2500 explorer.exe 2500 explorer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4880 explorer.exe 2500 explorer.exe 2500 explorer.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4416 wrote to memory of 4032 4416 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 86 PID 4032 wrote to memory of 1772 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 87 PID 4032 wrote to memory of 1772 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 87 PID 4032 wrote to memory of 2404 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 88 PID 4032 wrote to memory of 2404 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 88 PID 4032 wrote to memory of 2404 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 88 PID 4032 wrote to memory of 4360 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 89 PID 4032 wrote to memory of 4360 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 89 PID 4032 wrote to memory of 2940 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 90 PID 4032 wrote to memory of 2940 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 90 PID 4032 wrote to memory of 2940 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 90 PID 4032 wrote to memory of 2928 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 91 PID 4032 wrote to memory of 2928 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 91 PID 4032 wrote to memory of 4880 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 92 PID 4032 wrote to memory of 4880 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 92 PID 4032 wrote to memory of 4880 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 92 PID 4032 wrote to memory of 4880 4032 40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe 92 PID 4880 wrote to memory of 4028 4880 explorer.exe 93 PID 4880 wrote to memory of 4028 4880 explorer.exe 93 PID 4880 wrote to memory of 4028 4880 explorer.exe 93 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 4028 wrote to memory of 2040 4028 Server.exe 94 PID 2040 wrote to memory of 4568 2040 Server.exe 95 PID 2040 wrote to memory of 4568 2040 Server.exe 95 PID 2040 wrote to memory of 2500 2040 Server.exe 96 PID 2040 wrote to memory of 2500 2040 Server.exe 96 PID 2040 wrote to memory of 2500 2040 Server.exe 96 PID 2040 wrote to memory of 2500 2040 Server.exe 96 PID 2040 wrote to memory of 2500 2040 Server.exe 96 PID 2040 wrote to memory of 2500 2040 Server.exe 96 PID 2040 wrote to memory of 2500 2040 Server.exe 96 PID 2040 wrote to memory of 2500 2040 Server.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\40d35f1f6e71d5be3166dead89573bc8_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:1772
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4360
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2928
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"6⤵PID:4568
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD507813307a77b2fecea44690e4275c83c
SHA10f9208698b614e3a4f5808939f72c3eafb3ab050
SHA256fa0f1d5480392605a594da258a56523d0a4b43b8936184c237df96ca9d0bc15d
SHA51255245d8a8fea62cce9fc8f535bb974a3a6338bf22c40db341be468a0a9d42a2ea3a581e9a65d1fe2195086a60ed2a7bd12fc08b79d96d9bb2d03de60ffd06499
-
Filesize
2B
MD584cad01fdb44ae58dbe6c3973dcd87f5
SHA14700b42849fb35be323774820bf1bc8019d26c80
SHA2568b1f194be530240c18bf0b1ee0d038e750fab8b24c6bd25c864297e5ebb41fa6
SHA5126e10d3ec4724c1aca9ff3f6a26292ba80065d18e8e9395f1474c0a298008f25e312e2f7024e7d10aab3264764e69a25553cc20afd23090f83921d20e42b989ab
-
Filesize
343KB
MD56426d400c96fb9ffef4eaa54f6647f4c
SHA170a37871aff432790b6adf7d3fc4eb929476e082
SHA25698bba0cf4c57ecd35b227f45e4aa6dd50ef7cfb1160235cc14687c96eb09fa3c
SHA5122c8b4d3ab066cbfca6cf0c8d89d5044152b5e3d7100249cbedd1c816e3a4a94efc8bc6b79c1dab4bdf96e3ce476d6caccf625cfbe0aff3bf5e7a29dfcfa948c5
-
Filesize
1.0MB
MD540d35f1f6e71d5be3166dead89573bc8
SHA15f6291b39dac2622a6ea97fbad8a7d4235797178
SHA256771d7a35e4e0b3fa80116af4b5e80afaefd24244e586950fd064574a997f1d72
SHA5122116a68b554746ef5abc743b8f885956b2b6626b4358ffb36d069d834fd3dc1d3f0ec4c9ee455e01ee755d529cee1d83d3179130dc94fed244e3b258195df409