Analysis
-
max time kernel
14s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
07-01-2025 06:44
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_53596b9997078f686f7c249a46ce491e
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
JaffaCakes118_53596b9997078f686f7c249a46ce491e
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
JaffaCakes118_53596b9997078f686f7c249a46ce491e
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
JaffaCakes118_53596b9997078f686f7c249a46ce491e
Resource
debian9-mipsel-20240729-en
General
-
Target
JaffaCakes118_53596b9997078f686f7c249a46ce491e
-
Size
39KB
-
MD5
53596b9997078f686f7c249a46ce491e
-
SHA1
0b9e8a5501022dece4c53718475bb32af51caa2c
-
SHA256
d4c00fe5de0fa12bdb3a698499e0d5e49f4993f5c61ddbbc1d75bc9325c66788
-
SHA512
0f49e26b00e70092d4af3ba80d938a6f027be22b51584c4d36ec364e70d4454875d527a72ab6cc54bdc61faf2ad748d3c3bfe956c7f42e9b0c9ecfaf35329ce2
-
SSDEEP
384:T7goHZuyvc02qAQQwQHDf6lpTWg3vMUhG4Qdre21jT58vKpG2Y0orcfKLUv0KZn1:T7KFNcuFkc2zq0x3UKnicZuiR/vWv8c
Malware Config
Signatures
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 653 chmod 655 chmod -
Deletes system logs 1 TTPs 1 IoCs
Deletes log file which contains global system messages. Adversaries may delete system logs to minimize their footprint.
description ioc Process File deleted /var/log/syslog rm -
Flushes firewall rules 1 TTPs 1 IoCs
Flushes/ disables firewall rules inside the Linux kernel.
pid Process 656 iptables -
Attempts to change immutable files 32 IoCs
Modifies inode attributes on the filesystem to allow changing of immutable files.
pid Process 738 xargs 714 grep 767 chattr 772 chattr 843 xargs 780 chattr 811 xargs 818 xargs 855 xargs 861 xargs 675 chattr 712 grep 774 chattr 782 chattr 837 xargs 806 xargs 745 xargs 776 chattr 783 chattr 770 chattr 777 chattr 778 chattr 831 xargs 873 xargs 671 chattr 677 chattr 766 chattr 849 xargs 867 xargs 668 chattr 768 chattr 824 xargs -
Disables AppArmor 16 IoCs
Disables AppArmor security module.
pid Process 716 systemctl 723 systemctl 724 systemctl 724 systemctl 731 systemctl 716 systemctl 716 systemctl 724 systemctl 724 systemctl 716 systemctl 724 systemctl 716 systemctl 727 systemctl 729 systemctl 724 systemctl 716 systemctl -
pid Process 715 setenforce -
Enumerates running processes
Discovers information about currently running processes on the system
-
Write file to user bin folder 6 IoCs
description ioc Process File opened for modification /usr/bin/irqbalanced JaffaCakes118_53596b9997078f686f7c249a46ce491e File opened for modification /usr/bin/rctlcli JaffaCakes118_53596b9997078f686f7c249a46ce491e File opened for modification /usr/bin/systemd-network JaffaCakes118_53596b9997078f686f7c249a46ce491e File opened for modification /usr/bin/pamdicks JaffaCakes118_53596b9997078f686f7c249a46ce491e File opened for modification /usr/bin/ip6network JaffaCakes118_53596b9997078f686f7c249a46ce491e File opened for modification /usr/bin/kswaped JaffaCakes118_53596b9997078f686f7c249a46ce491e -
Reads CPU attributes 1 TTPs 5 IoCs
description ioc Process File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online ps File opened for reading /sys/devices/system/cpu/online sysctl -
Enumerates kernel/hardware configuration 1 TTPs 8 IoCs
Reads contents of /sys virtual filesystem to enumerate system information.
description ioc Process File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl File opened for reading /sys/fs/kdbus/0-system/bus systemctl -
Process Discovery 1 TTPs 4 IoCs
Adversaries may try to discover information about running processes.
pid Process 711 ps 713 ps 734 ps 741 ps -
description ioc Process File opened for reading /proc/41/status ps File opened for reading /proc/111/stat ps File opened for reading /proc/212/cmdline ps File opened for reading /proc/603/status ps File opened for reading /proc/self/maps awk File opened for reading /proc/111/stat ps File opened for reading /proc/298/stat ps File opened for reading /proc/14/stat ps File opened for reading /proc/650/status ps File opened for reading /proc/24/stat ps File opened for reading /proc/24/cmdline ps File opened for reading /proc/113/cmdline ps File opened for reading /proc/592/cmdline ps File opened for reading /proc/13/cmdline ps File opened for reading /proc/602/cmdline ps File opened for reading /proc/10/status ps File opened for reading /proc/113/status ps File opened for reading /proc/15/status ps File opened for reading /proc/24/cmdline ps File opened for reading /proc/25/status ps File opened for reading /proc/143/cmdline ps File opened for reading /proc/1/environ systemctl File opened for reading /proc/266/cmdline ps File opened for reading /proc/282/cmdline ps File opened for reading /proc/266/stat ps File opened for reading /proc/3/cmdline ps File opened for reading /proc/sys/kernel/pid_max ps File opened for reading /proc/592/stat ps File opened for reading /proc/self/maps awk File opened for reading /proc/8/stat ps File opened for reading /proc/603/stat ps File opened for reading /proc/271/status ps File opened for reading /proc/13/stat ps File opened for reading /proc/681/cmdline ps File opened for reading /proc/743/status ps File opened for reading /proc/592/stat ps File opened for reading /proc/21/stat ps File opened for reading /proc/19/status ps File opened for reading /proc/602/stat ps File opened for reading /proc/21/status ps File opened for reading /proc/737/stat ps File opened for reading /proc/592/status ps File opened for reading /proc/self/fd xargs File opened for reading /proc/153/status ps File opened for reading /proc/652/cmdline ps File opened for reading /proc/17/cmdline ps File opened for reading /proc/212/status ps File opened for reading /proc/681/stat ps File opened for reading /proc/42/status ps File opened for reading /proc/212/status ps File opened for reading /proc/269/stat ps File opened for reading /proc/18/stat ps File opened for reading /proc/602/status ps File opened for reading /proc/21/stat ps File opened for reading /proc/25/stat ps File opened for reading /proc/13/cmdline ps File opened for reading /proc/595/stat ps File opened for reading /proc/41/status ps File opened for reading /proc/22/cmdline ps File opened for reading /proc/24/cmdline ps File opened for reading /proc/644/status ps File opened for reading /proc/filesystems systemctl File opened for reading /proc/42/cmdline ps File opened for reading /proc/81/cmdline ps -
System Network Configuration Discovery 1 TTPs 2 IoCs
Adversaries may gather information about the network configuration of a system.
pid Process 766 chattr 776 chattr
Processes
-
/tmp/JaffaCakes118_53596b9997078f686f7c249a46ce491e/tmp/JaffaCakes118_53596b9997078f686f7c249a46ce491e1⤵
- Write file to user bin folder
PID:652 -
/bin/chmodchmod 777 /usr/bin/chattr2⤵
- File and Directory Permissions Modification
PID:653
-
-
/bin/chmodchmod 777 /bin/chattr2⤵
- File and Directory Permissions Modification
PID:655
-
-
/sbin/iptablesiptables -F2⤵
- Flushes firewall rules
PID:656
-
-
/sbin/sysctlsysctl "kernel.nmi_watchdog=0"2⤵
- Reads CPU attributes
PID:663
-
-
/usr/bin/chattrchattr -iae /root/.ssh/2⤵
- Attempts to change immutable files
PID:668
-
-
/usr/bin/chattrchattr -iae /root/.ssh/authorized_keys2⤵
- Attempts to change immutable files
PID:671
-
-
/usr/bin/chattrchattr -iua /tmp/2⤵
- Attempts to change immutable files
PID:675
-
-
/usr/bin/chattrchattr -iua /var/tmp/2⤵
- Attempts to change immutable files
PID:677
-
-
/bin/rmrm -rf "/tmp/addres*"2⤵PID:679
-
-
/bin/rmrm -rf "/tmp/walle*"2⤵PID:683
-
-
/bin/rmrm -rf /tmp/keys2⤵PID:685
-
-
/bin/rmrm -rf /var/log/syslog2⤵
- Deletes system logs
PID:687
-
-
/bin/catcat /var/spool/cron/2⤵PID:689
-
-
/bin/catcat /root/.ssh/authorized_keys2⤵PID:690
-
-
/bin/mvmv /usr/bin/wgettnt /usr/bin/wd12⤵PID:691
-
-
/bin/mvmv /usr/bin/curltnt /usr/bin/cd12⤵PID:693
-
-
/bin/mvmv /usr/bin/wget1 /usr/bin/wd12⤵PID:695
-
-
/bin/mvmv /usr/bin/curl1 /usr/bin/cd12⤵PID:697
-
-
/bin/mvmv /usr/bin/cur /usr/bin/cd12⤵PID:699
-
-
/bin/mvmv /usr/bin/cdl /usr/bin/cd12⤵PID:701
-
-
/bin/mvmv /usr/bin/cdt /usr/bin/cd12⤵PID:702
-
-
/bin/mvmv /usr/bin/xget /usr/bin/wd12⤵PID:703
-
-
/bin/mvmv /usr/bin/wge /usr/bin/wd12⤵PID:705
-
-
/bin/mvmv /usr/bin/wdl /usr/bin/wd12⤵PID:706
-
-
/bin/mvmv /usr/bin/wdt /usr/bin/wd12⤵PID:707
-
-
/bin/mvmv /usr/bin/wget /usr/bin/wd12⤵PID:708
-
-
/bin/mvmv /usr/bin/curl /usr/bin/cd12⤵PID:710
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:711
-
-
/bin/grepgrep -i "[a]liyun"2⤵
- Attempts to change immutable files
PID:712
-
-
/bin/grepgrep -i "[y]unjing"2⤵
- Attempts to change immutable files
PID:714
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:713
-
-
/usr/sbin/setenforcesetenforce 02⤵
- Disables SELinux
PID:715
-
-
/usr/sbin/serviceservice apparmor stop2⤵PID:716
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:717
-
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:718
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target3⤵
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:719
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"3⤵
- Enumerates kernel/hardware configuration
PID:721
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"3⤵PID:722
-
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" stop apparmor.service2⤵
- Disables AppArmor
PID:716
-
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" stop apparmor.service2⤵
- Disables AppArmor
PID:716
-
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" stop apparmor.service2⤵
- Disables AppArmor
PID:716
-
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" stop apparmor.service2⤵
- Disables AppArmor
PID:716
-
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" stop apparmor.service2⤵
- Disables AppArmor
PID:716
-
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" stop apparmor.service2⤵
- Disables AppArmor
- Enumerates kernel/hardware configuration
PID:716
-
-
/bin/systemctlsystemctl disable apparmor2⤵
- Disables AppArmor
- Enumerates kernel/hardware configuration
PID:723
-
-
/usr/sbin/serviceservice aliyun.service stop2⤵PID:724
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:725
-
-
/usr/bin/basenamebasename /usr/sbin/service3⤵PID:726
-
-
/bin/systemctlsystemctl --quiet is-active multi-user.target3⤵
- Disables AppArmor
- Enumerates kernel/hardware configuration
PID:727
-
-
/bin/systemctlsystemctl list-unit-files --full "--type=socket"3⤵
- Disables AppArmor
- Enumerates kernel/hardware configuration
PID:729
-
-
/bin/sedsed -ne "s/\\.socket\\s*[a-z]*\\s*\$/.socket/p"3⤵PID:730
-
-
-
/usr/local/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" stop aliyun.service.service2⤵
- Disables AppArmor
PID:724
-
-
/usr/local/bin/systemctlsystemctl "--job-mode=ignore-dependencies" stop aliyun.service.service2⤵
- Disables AppArmor
PID:724
-
-
/usr/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" stop aliyun.service.service2⤵
- Disables AppArmor
PID:724
-
-
/usr/bin/systemctlsystemctl "--job-mode=ignore-dependencies" stop aliyun.service.service2⤵
- Disables AppArmor
PID:724
-
-
/sbin/systemctlsystemctl "--job-mode=ignore-dependencies" stop aliyun.service.service2⤵
- Disables AppArmor
PID:724
-
-
/bin/systemctlsystemctl "--job-mode=ignore-dependencies" stop aliyun.service.service2⤵
- Disables AppArmor
- Enumerates kernel/hardware configuration
PID:724
-
-
/bin/systemctlsystemctl disable aliyun.service2⤵
- Disables AppArmor
- Enumerates kernel/hardware configuration
- Reads runtime system information
PID:731
-
-
/bin/grepgrep aegis2⤵PID:736
-
-
/bin/grepgrep -v grep2⤵PID:735
-
-
/usr/bin/awkawk "{print \$2}"2⤵PID:737
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:734
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:738
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:745
-
-
/usr/bin/awkawk "{print \$2}"2⤵PID:744
-
-
/bin/grepgrep Yun2⤵PID:743
-
-
/bin/grepgrep -v grep2⤵PID:742
-
-
/bin/psps aux2⤵
- Reads CPU attributes
- Process Discovery
- Reads runtime system information
PID:741
-
-
/bin/rmrm -rf /usr/local/aegis2⤵PID:748
-
-
/bin/sleepsleep 12⤵PID:749
-
-
/usr/bin/chattrchattr -i /usr/bin/ip6network2⤵
- Attempts to change immutable files
- System Network Configuration Discovery
PID:766
-
-
/usr/bin/chattrchattr -i /usr/bin/kswaped2⤵
- Attempts to change immutable files
PID:767
-
-
/usr/bin/chattrchattr -i /usr/bin/irqbalanced2⤵
- Attempts to change immutable files
PID:768
-
-
/usr/bin/chattrchattr -i /usr/bin/rctlcli2⤵
- Attempts to change immutable files
PID:770
-
-
/usr/bin/chattrchattr -i /usr/bin/systemd-network2⤵
- Attempts to change immutable files
PID:772
-
-
/usr/bin/chattrchattr -i /usr/bin/pamdicks2⤵
- Attempts to change immutable files
PID:774
-
-
/usr/bin/chattrchattr +i /usr/bin/ip6network2⤵
- Attempts to change immutable files
- System Network Configuration Discovery
PID:776
-
-
/usr/bin/chattrchattr +i /usr/bin/kswaped2⤵
- Attempts to change immutable files
PID:777
-
-
/usr/bin/chattrchattr +i /usr/bin/irqbalanced2⤵
- Attempts to change immutable files
PID:778
-
-
/usr/bin/chattrchattr +i /usr/bin/rctlcli2⤵
- Attempts to change immutable files
PID:780
-
-
/usr/bin/chattrchattr +i /usr/bin/systemd-network2⤵
- Attempts to change immutable files
PID:782
-
-
/usr/bin/chattrchattr +i /usr/bin/pamdicks2⤵
- Attempts to change immutable files
PID:783
-
-
/bin/sleepsleep 12⤵PID:784
-
-
/bin/grepgrep 185.71.65.2382⤵PID:803
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:804
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:805
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:806
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:810
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:809
-
-
/bin/grepgrep 140.82.52.872⤵PID:808
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:811
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:816
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:815
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:818
-
-
/bin/grepgrep -v -2⤵PID:817
-
-
/bin/grepgrep :4432⤵PID:814
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:822
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:821
-
-
/bin/grepgrep :232⤵PID:820
-
-
/bin/grepgrep -v -2⤵PID:823
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:824
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:829
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:828
-
-
/bin/grepgrep -v -2⤵PID:830
-
-
/bin/grepgrep :4432⤵PID:827
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:831
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:835
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:834
-
-
/bin/grepgrep :1432⤵PID:833
-
-
/bin/grepgrep -v -2⤵PID:836
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:837
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:841
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:840
-
-
/bin/grepgrep -v -2⤵PID:842
-
-
/bin/grepgrep :22222⤵PID:839
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:843
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:847
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:846
-
-
/bin/grepgrep -v -2⤵PID:848
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:849
-
-
/bin/grepgrep :33332⤵PID:845
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:853
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:852
-
-
/bin/grepgrep :33892⤵PID:851
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:855
-
-
/bin/grepgrep -v -2⤵PID:854
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:859
-
-
/bin/grepgrep -v -2⤵PID:860
-
-
/bin/grepgrep :55552⤵PID:857
-
-
/usr/bin/awkawk "{print \$7}"2⤵
- Reads runtime system information
PID:858
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
- Reads runtime system information
PID:861
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵
- Reads runtime system information
PID:865
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:864
-
-
/bin/grepgrep :66662⤵PID:863
-
-
/bin/grepgrep -v -2⤵PID:866
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:867
-
-
/usr/bin/awkawk "-F[/]" "{print \$1}"2⤵PID:871
-
-
/usr/bin/awkawk "{print \$7}"2⤵PID:870
-
-
/bin/grepgrep :66652⤵PID:869
-
-
/usr/bin/xargsxargs -I "%" kill -9 "%"2⤵
- Attempts to change immutable files
PID:873
-
-
/bin/grepgrep -v -2⤵PID:872
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Indicator Removal
1Clear Linux or Mac System Logs
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5b026324c6904b2a9cb4b88d6d61c81d1
SHA1e5fa44f2b31c1fb553b6021e7360d07d5d91ff5e
SHA2564355a46b19d348dc2f57c046f8ef63d4538ebb936000f3c9ee954a27460dd865
SHA5123abb6677af34ac57c0ca5828fd94f9d886c26ce59a8ce60ecf6778079423dccff1d6f19cb655805d56098e6d38a1a710dee59523eed7511e5a9e4b8ccb3a4686
-
Filesize
2B
MD56d7fce9fee471194aa8b5b6e47267f03
SHA1a3db5c13ff90a36963278c6a39e4ee3c22e2a436
SHA2561121cfccd5913f0a63fec40a6ffd44ea64f9dc135c66634ba001d10bcf4302a2
SHA5122b59d179d9815994f687383a886ea34109889756efca5ab27318cc67ce2a21261d12fa6fee6b8c716f72214ead55ee0d789d6c35cff977d40ef5728ba9188a80
-
Filesize
2B
MD526ab0db90d72e28ad0ba1e22ee510510
SHA17448d8798a4380162d4b56f9b452e2f6f9e24e7a
SHA25653c234e5e8472b6ac51c1ae1cab3fe06fad053beb8ebfd8977b010655bfdd3c3
SHA51263e22ec2fbeebabf005e58fbfb0eee607c4aa417045a68a0cc63767b048e3559268d35e72f367d3b2dbd5dbddf12fc4397762ba149260b3795a0391713bddcd7
-
Filesize
2B
MD59ae0ea9e3c9c6e1b9b6252c8395efdc1
SHA1ccf271b7830882da1791852baeca1737fcbe4b90
SHA25606e9d52c1720fca412803e3b07c4b228ff113e303f4c7ab94665319d832bbfb7
SHA512f3d08a4bfef201adbe711e8805f96ff13909719107dcac81f4fc9185040d59d8d573344a0707e697f8b4f0212e0d79f3bdd6b86688dd8c54019b9d93c937f3ca
-
Filesize
2B
MD548a24b70a0b376535542b996af517398
SHA19c6b057a2b9d96a4067a749ee3b3b0158d390cf1
SHA2567de1555df0c2700329e815b93b32c571c3ea54dc967b89e81ab73b9972b72d1d
SHA512db545c410fd0c8ede533d5b0666cd2798ba380bd25b655619cd5fd3a33a255569b3ccc319bfdef3322d8392d894d15c2e6aa2d53346e6ac54eaf5d627bfe6a9a
-
Filesize
2B
MD51dcca23355272056f04fe8bf20edfce0
SHA15d9474c0309b7ca09a182d888f73b37a8fe1362c
SHA256f0b5c2c2211c8d67ed15e75e656c7862d086e9245420892a7de62cd9ec582a06
SHA51229b3573989378848e91465abb8bb12aaad1c40f01ddba6ce5dce4de88d61d49621cd4272bc6f889cd469e9490040b412eb0a237cf2cd49c637da1d5de5903f3d