Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe
-
Size
632KB
-
MD5
e04e60efc406faefb13b0fd319e2251f
-
SHA1
9e0f221915f81e639a52eeaf76dc96f95ab05e4d
-
SHA256
61cb3345fb32835c6be148fbcd92812c80cc168affea782936055ff62ca4dd4b
-
SHA512
07b848691b0976b40411672b98030de36b4f10f1181f248f3150600a336cf3461ba1a2af2484399d2c43faeb5c474146edb206430990ca90f36684444cb77485
-
SSDEEP
12288:0pacPt3R/dbmXv4k8OIpLaNrv/TFUVo6QyPa+DAB3YWLSiRw3K:K1KXL8hYFv/TmnibBzdp
Malware Config
Extracted
nanocore
1.2.2.0
sys2021.linkpc.net:11940
23.94.82.41:11940
de7e01ad-963b-4e14-81aa-08dfb351f0fe
-
activate_away_mode
false
-
backup_connection_host
23.94.82.41
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-04-24T08:14:59.254967636Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
11940
-
default_group
Do
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
de7e01ad-963b-4e14-81aa-08dfb351f0fe
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
sys2021.linkpc.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
asyncrat
0.5.2
sys2021.linkpc.net:6606
cd6-c2e0e3fbeef6
-
delay
0
-
install
true
-
install_file
notepad.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/files/0x000b000000023b8a-1990.dat disable_win_def behavioral2/memory/6212-1992-0x0000000000A80000-0x0000000000AA4000-memory.dmp disable_win_def -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\google\\chrome.exe\"," e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
Nanocore family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b8a-1990.dat family_asyncrat -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Edthlzkghxuafibmavvextdclient startup.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 6212 Edthlzkghxuafibmavvextdclient startup.exe 5468 notepad.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PCI Subsystem = "C:\\Program Files (x86)\\PCI Subsystem\\pciss.exe" e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\PCI Subsystem\pciss.exe e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\PCI Subsystem\pciss.exe e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings Edthlzkghxuafibmavvextdclient startup.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2972 powershell.exe 2972 powershell.exe 4148 powershell.exe 4148 powershell.exe 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 1700 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 1700 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 1700 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 6212 Edthlzkghxuafibmavvextdclient startup.exe 5468 notepad.exe 5468 notepad.exe 5468 notepad.exe 5468 notepad.exe 5468 notepad.exe 5468 notepad.exe 5468 notepad.exe 5468 notepad.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1700 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2972 powershell.exe Token: SeIncreaseQuotaPrivilege 2972 powershell.exe Token: SeSecurityPrivilege 2972 powershell.exe Token: SeTakeOwnershipPrivilege 2972 powershell.exe Token: SeLoadDriverPrivilege 2972 powershell.exe Token: SeSystemProfilePrivilege 2972 powershell.exe Token: SeSystemtimePrivilege 2972 powershell.exe Token: SeProfSingleProcessPrivilege 2972 powershell.exe Token: SeIncBasePriorityPrivilege 2972 powershell.exe Token: SeCreatePagefilePrivilege 2972 powershell.exe Token: SeBackupPrivilege 2972 powershell.exe Token: SeRestorePrivilege 2972 powershell.exe Token: SeShutdownPrivilege 2972 powershell.exe Token: SeDebugPrivilege 2972 powershell.exe Token: SeSystemEnvironmentPrivilege 2972 powershell.exe Token: SeRemoteShutdownPrivilege 2972 powershell.exe Token: SeUndockPrivilege 2972 powershell.exe Token: SeManageVolumePrivilege 2972 powershell.exe Token: 33 2972 powershell.exe Token: 34 2972 powershell.exe Token: 35 2972 powershell.exe Token: 36 2972 powershell.exe Token: SeIncreaseQuotaPrivilege 2972 powershell.exe Token: SeSecurityPrivilege 2972 powershell.exe Token: SeTakeOwnershipPrivilege 2972 powershell.exe Token: SeLoadDriverPrivilege 2972 powershell.exe Token: SeSystemProfilePrivilege 2972 powershell.exe Token: SeSystemtimePrivilege 2972 powershell.exe Token: SeProfSingleProcessPrivilege 2972 powershell.exe Token: SeIncBasePriorityPrivilege 2972 powershell.exe Token: SeCreatePagefilePrivilege 2972 powershell.exe Token: SeBackupPrivilege 2972 powershell.exe Token: SeRestorePrivilege 2972 powershell.exe Token: SeShutdownPrivilege 2972 powershell.exe Token: SeDebugPrivilege 2972 powershell.exe Token: SeSystemEnvironmentPrivilege 2972 powershell.exe Token: SeRemoteShutdownPrivilege 2972 powershell.exe Token: SeUndockPrivilege 2972 powershell.exe Token: SeManageVolumePrivilege 2972 powershell.exe Token: 33 2972 powershell.exe Token: 34 2972 powershell.exe Token: 35 2972 powershell.exe Token: 36 2972 powershell.exe Token: SeDebugPrivilege 4148 powershell.exe Token: SeIncreaseQuotaPrivilege 4148 powershell.exe Token: SeSecurityPrivilege 4148 powershell.exe Token: SeTakeOwnershipPrivilege 4148 powershell.exe Token: SeLoadDriverPrivilege 4148 powershell.exe Token: SeSystemProfilePrivilege 4148 powershell.exe Token: SeSystemtimePrivilege 4148 powershell.exe Token: SeProfSingleProcessPrivilege 4148 powershell.exe Token: SeIncBasePriorityPrivilege 4148 powershell.exe Token: SeCreatePagefilePrivilege 4148 powershell.exe Token: SeBackupPrivilege 4148 powershell.exe Token: SeRestorePrivilege 4148 powershell.exe Token: SeShutdownPrivilege 4148 powershell.exe Token: SeDebugPrivilege 4148 powershell.exe Token: SeSystemEnvironmentPrivilege 4148 powershell.exe Token: SeRemoteShutdownPrivilege 4148 powershell.exe Token: SeUndockPrivilege 4148 powershell.exe Token: SeManageVolumePrivilege 4148 powershell.exe Token: 33 4148 powershell.exe Token: 34 4148 powershell.exe Token: 35 4148 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2972 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 83 PID 2384 wrote to memory of 2972 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 83 PID 2384 wrote to memory of 2972 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 83 PID 2384 wrote to memory of 4148 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 91 PID 2384 wrote to memory of 4148 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 91 PID 2384 wrote to memory of 4148 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 91 PID 2384 wrote to memory of 5220 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 103 PID 2384 wrote to memory of 5220 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 103 PID 2384 wrote to memory of 5220 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 103 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 2384 wrote to memory of 1700 2384 e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe 104 PID 5220 wrote to memory of 6212 5220 WScript.exe 105 PID 5220 wrote to memory of 6212 5220 WScript.exe 105 PID 6212 wrote to memory of 5376 6212 Edthlzkghxuafibmavvextdclient startup.exe 114 PID 6212 wrote to memory of 5376 6212 Edthlzkghxuafibmavvextdclient startup.exe 114 PID 5376 wrote to memory of 5316 5376 WScript.exe 115 PID 5376 wrote to memory of 5316 5376 WScript.exe 115 PID 6212 wrote to memory of 5468 6212 Edthlzkghxuafibmavvextdclient startup.exe 117 PID 6212 wrote to memory of 5468 6212 Edthlzkghxuafibmavvextdclient startup.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection 8.8.8.82⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Vzvcyragywwvopuhbwi.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\Edthlzkghxuafibmavvextdclient startup.exe"C:\Users\Admin\AppData\Local\Temp\Edthlzkghxuafibmavvextdclient startup.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6212 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tmp7B36.tmp.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5376 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc onlogon /rl highest /tn notepad.exe /tr "C:\Users\Admin\AppData\Roaming\notepad.exe5⤵
- Scheduled Task/Job: Scheduled Task
PID:5316
-
-
-
C:\Users\Admin\AppData\Roaming\notepad.exe"C:\Users\Admin\AppData\Roaming\notepad.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1700
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:5784
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e04e60efc406faefb13b0fd319e2251f_JaffaCakes118.exe.log
Filesize1KB
MD57ebe314bf617dc3e48b995a6c352740c
SHA1538f643b7b30f9231a3035c448607f767527a870
SHA25648178f884b8a4dd96e330b210b0530667d9473a7629fc6b4ad12b614bf438ee8
SHA5120ba9d8f4244c15285e254d27b4bff7c49344ff845c48bc0bf0d8563072fab4d6f7a6abe6b6742e8375a08e9a3b3e5d5dc4937ab428dbe2dd8e62892fda04507e
-
Filesize
2KB
MD50774a05ce5ee4c1af7097353c9296c62
SHA1658ff96b111c21c39d7ad5f510fb72f9762114bb
SHA256d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4
SHA512104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994
-
Filesize
19KB
MD5cd56fba410186fe87b4c93c78d23d5d1
SHA1b2dfabb33a6145b34a9b8b9b702773999e5bf2fb
SHA256396351b7f9244b6bed568b31437a88b9f10ec106fc7663e30a98ec72e42fab31
SHA512dab05d18784529fb9590c59c98b58980921ffcfd6c8ab78422ad30d5046b5194d707af8d514d9a5000e343bd0d5bfc8861cb046b38c522e3a11b37606f7b0dee
-
Filesize
119KB
MD57c065aaedcccc8330d30dd098e2d080a
SHA1d8e1a9251e02062264229d2b92366b33cba3615e
SHA2568892f38077963d30d807e405177ca889e327e447473066ba7dbddacc58a5562c
SHA512a193e0f337a16965726b0481324eda249e9f53ab0d24b48d63d736be35ff7208cab29fb6a5a6fc7c31dc34ddbba5423a2d4d4c1ecaf1f50c29f336c1fcb12469
-
Filesize
125B
MD5e43caabb477eff9358b404c0658ea4b8
SHA1ff9530a0a971b26d85323abe290427a32f135fe4
SHA256796965acba70efdb0bc8d6633f5d35e745ce49d09f6600d8ff151545563c9430
SHA5127eb32002d2a08d9342020bb0f073d21772f9569b9133a0f36334f3acaaefab2aab8c52f3b27ee4fc23148bab3ebd8cbdc15f7a1656ae9bf67997e3cc891383a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
216B
MD53fd8d047dc23e8fe24f9cf58c7cd2b55
SHA157cf93639c8ed34f5bc06c4a7d795d712d3b8648
SHA2564b207de241dc5c2ae5904d574fcccfbd2a85153c7b13f667055e96d15ad9eaec
SHA5125d36a0ac43f312f8a6fc51e290aa56c687b1ff9a813f87a3f019452fc4db2a25ecb7596eda917db2748257c6d814eb14668b8ba16a1f630f0ae36723a6a35d8b