Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe
Resource
win7-20231129-en
General
-
Target
ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe
-
Size
227KB
-
MD5
ff9c2ce33fce1585aa1ff20145555761
-
SHA1
0a69962fd393fb450a81b557af000bcc9d8b1e25
-
SHA256
8c9f417cc07060056a707d847258a7a6a98e0ef6a16cb1243222c235d79c86bf
-
SHA512
7572f57ee2ed16996df52c8c70d7e01cfdac1cca15e86334a7f78d370fc6fb5ac3efca4e082e82a5073fcbd4acf116d0e619a3a3d090129e5eeee328ddd0338a
-
SSDEEP
6144:qoEdkmu85Dq+3qM3W7tfQN5/inEaMadDKNa1aILk71:gkmDN6M3atfQunka1KNaTgJ
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 16 IoCs
Processes:
resource yara_rule behavioral2/memory/2180-296-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/3580-318-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/3580-439-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/3300-590-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/4112-597-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/60-737-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/60-871-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/924-877-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/924-1012-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/4748-1018-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/4748-1147-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/4460-1152-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/2156-1285-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/2156-1411-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/3860-1414-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 behavioral2/memory/1652-1545-0x0000000000400000-0x000000000048A000-memory.dmp family_lumma_v4 -
Modifies security service 2 TTPs 22 IoCs
Processes:
regedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
Processes:
cPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.compid process 3580 cPaner.com 3300 cPaner.com 4112 cPaner.com 60 cPaner.com 924 cPaner.com 4748 cPaner.com 4460 cPaner.com 2156 cPaner.com 3860 cPaner.com 1652 cPaner.com -
Drops file in System32 directory 32 IoCs
Processes:
ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.execPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comcPaner.comdescription ioc process File opened for modification C:\Windows\SysWOW64\cPaner.com ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe File created C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File created C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini cPaner.com File opened for modification C:\Windows\SysWOW64\cPaner.com cPaner.com -
Runs .reg file with regedit 11 IoCs
Processes:
regedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exeregedit.exepid process 4488 regedit.exe 2456 regedit.exe 4516 regedit.exe 4532 regedit.exe 4784 regedit.exe 4092 regedit.exe 1064 regedit.exe 5108 regedit.exe 3828 regedit.exe 2944 regedit.exe 488 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.execmd.execPaner.comcmd.execPaner.comcmd.execPaner.comcmd.execPaner.comcmd.execPaner.comcmd.execPaner.comcmd.execPaner.comdescription pid process target process PID 2180 wrote to memory of 1432 2180 ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe cmd.exe PID 2180 wrote to memory of 1432 2180 ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe cmd.exe PID 2180 wrote to memory of 1432 2180 ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe cmd.exe PID 1432 wrote to memory of 4488 1432 cmd.exe regedit.exe PID 1432 wrote to memory of 4488 1432 cmd.exe regedit.exe PID 1432 wrote to memory of 4488 1432 cmd.exe regedit.exe PID 2180 wrote to memory of 3580 2180 ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe cPaner.com PID 2180 wrote to memory of 3580 2180 ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe cPaner.com PID 2180 wrote to memory of 3580 2180 ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe cPaner.com PID 3580 wrote to memory of 3152 3580 cPaner.com cmd.exe PID 3580 wrote to memory of 3152 3580 cPaner.com cmd.exe PID 3580 wrote to memory of 3152 3580 cPaner.com cmd.exe PID 3152 wrote to memory of 5108 3152 cmd.exe regedit.exe PID 3152 wrote to memory of 5108 3152 cmd.exe regedit.exe PID 3152 wrote to memory of 5108 3152 cmd.exe regedit.exe PID 3580 wrote to memory of 3300 3580 cPaner.com cPaner.com PID 3580 wrote to memory of 3300 3580 cPaner.com cPaner.com PID 3580 wrote to memory of 3300 3580 cPaner.com cPaner.com PID 3300 wrote to memory of 3052 3300 cPaner.com cmd.exe PID 3300 wrote to memory of 3052 3300 cPaner.com cmd.exe PID 3300 wrote to memory of 3052 3300 cPaner.com cmd.exe PID 3052 wrote to memory of 2456 3052 cmd.exe regedit.exe PID 3052 wrote to memory of 2456 3052 cmd.exe regedit.exe PID 3052 wrote to memory of 2456 3052 cmd.exe regedit.exe PID 3300 wrote to memory of 4112 3300 cPaner.com cPaner.com PID 3300 wrote to memory of 4112 3300 cPaner.com cPaner.com PID 3300 wrote to memory of 4112 3300 cPaner.com cPaner.com PID 4112 wrote to memory of 1064 4112 cPaner.com cmd.exe PID 4112 wrote to memory of 1064 4112 cPaner.com cmd.exe PID 4112 wrote to memory of 1064 4112 cPaner.com cmd.exe PID 1064 wrote to memory of 3828 1064 cmd.exe regedit.exe PID 1064 wrote to memory of 3828 1064 cmd.exe regedit.exe PID 1064 wrote to memory of 3828 1064 cmd.exe regedit.exe PID 4112 wrote to memory of 60 4112 cPaner.com cPaner.com PID 4112 wrote to memory of 60 4112 cPaner.com cPaner.com PID 4112 wrote to memory of 60 4112 cPaner.com cPaner.com PID 60 wrote to memory of 4204 60 cPaner.com cmd.exe PID 60 wrote to memory of 4204 60 cPaner.com cmd.exe PID 60 wrote to memory of 4204 60 cPaner.com cmd.exe PID 4204 wrote to memory of 4516 4204 cmd.exe regedit.exe PID 4204 wrote to memory of 4516 4204 cmd.exe regedit.exe PID 4204 wrote to memory of 4516 4204 cmd.exe regedit.exe PID 60 wrote to memory of 924 60 cPaner.com cPaner.com PID 60 wrote to memory of 924 60 cPaner.com cPaner.com PID 60 wrote to memory of 924 60 cPaner.com cPaner.com PID 924 wrote to memory of 2896 924 cPaner.com cmd.exe PID 924 wrote to memory of 2896 924 cPaner.com cmd.exe PID 924 wrote to memory of 2896 924 cPaner.com cmd.exe PID 2896 wrote to memory of 4532 2896 cmd.exe regedit.exe PID 2896 wrote to memory of 4532 2896 cmd.exe regedit.exe PID 2896 wrote to memory of 4532 2896 cmd.exe regedit.exe PID 924 wrote to memory of 4748 924 cPaner.com cPaner.com PID 924 wrote to memory of 4748 924 cPaner.com cPaner.com PID 924 wrote to memory of 4748 924 cPaner.com cPaner.com PID 4748 wrote to memory of 3052 4748 cPaner.com cmd.exe PID 4748 wrote to memory of 3052 4748 cPaner.com cmd.exe PID 4748 wrote to memory of 3052 4748 cPaner.com cmd.exe PID 3052 wrote to memory of 4784 3052 cmd.exe regedit.exe PID 3052 wrote to memory of 4784 3052 cmd.exe regedit.exe PID 3052 wrote to memory of 4784 3052 cmd.exe regedit.exe PID 4748 wrote to memory of 4460 4748 cPaner.com cPaner.com PID 4748 wrote to memory of 4460 4748 cPaner.com cPaner.com PID 4748 wrote to memory of 4460 4748 cPaner.com cPaner.com PID 4460 wrote to memory of 4244 4460 cPaner.com cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- Runs .reg file with regedit
PID:4488
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1048 "C:\Users\Admin\AppData\Local\Temp\ff9c2ce33fce1585aa1ff20145555761_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat3⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- Runs .reg file with regedit
PID:5108
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1208 "C:\Windows\SysWOW64\cPaner.com"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat4⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- Runs .reg file with regedit
PID:2456
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1180 "C:\Windows\SysWOW64\cPaner.com"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat5⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- Runs .reg file with regedit
PID:3828
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1184 "C:\Windows\SysWOW64\cPaner.com"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat6⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- Runs .reg file with regedit
PID:4516
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1188 "C:\Windows\SysWOW64\cPaner.com"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat7⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- Runs .reg file with regedit
PID:4532
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1196 "C:\Windows\SysWOW64\cPaner.com"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat8⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- Runs .reg file with regedit
PID:4784
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1200 "C:\Windows\SysWOW64\cPaner.com"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat9⤵PID:4244
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- Runs .reg file with regedit
PID:2944
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1204 "C:\Windows\SysWOW64\cPaner.com"9⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat10⤵PID:3264
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- Runs .reg file with regedit
PID:4092
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1192 "C:\Windows\SysWOW64\cPaner.com"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat11⤵PID:3968
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- Runs .reg file with regedit
PID:488
-
-
-
C:\Windows\SysWOW64\cPaner.comC:\Windows\system32\cPaner.com 1212 "C:\Windows\SysWOW64\cPaner.com"11⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\acx.bat12⤵PID:2232
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- Runs .reg file with regedit
PID:1064
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5895301bce84d6fe707b5cfd50f1f9f97
SHA150a012f59655621768f624c4571654145663c042
SHA256b2c6435e83784b85e7f4bdd4568bd954029caac9f5795e3111ae75db0f9874d4
SHA512a75188afa7c01959bcbf7b832d92d0134072eecd3dd58d6179bc626024d4c9593cadc5cf9ab00deb3824853df003a0a73c84b60cefbdcb6944d216534ea7ffc4
-
Filesize
2KB
MD5fa83299c5a0d8714939977af6bdafa92
SHA146a4abab9b803a7361ab89d0ca000a367550e23c
SHA256f3bb35f7fc756da2c2297a100fa29506cb12371edb793061add90ee16318bf03
SHA51285e46b9f1089054e60c433459eea52bec26330f8b91879df3b48db1533a307443dd82006ac3bb86245bbd207c1d8c75c29949f755cc0dc262ede888a1d531599
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
227KB
MD5ff9c2ce33fce1585aa1ff20145555761
SHA10a69962fd393fb450a81b557af000bcc9d8b1e25
SHA2568c9f417cc07060056a707d847258a7a6a98e0ef6a16cb1243222c235d79c86bf
SHA5127572f57ee2ed16996df52c8c70d7e01cfdac1cca15e86334a7f78d370fc6fb5ac3efca4e082e82a5073fcbd4acf116d0e619a3a3d090129e5eeee328ddd0338a
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904