Analysis
-
max time kernel
143s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
setup_papers_please_1.2.76_(54232).exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
setup_papers_please_1.2.76_(54232).exe
Resource
win10v2004-20220812-en
General
-
Target
setup_papers_please_1.2.76_(54232).exe
-
Size
40.8MB
-
MD5
354d10586bd68448685e925e48810bed
-
SHA1
ddfbe39b92b2277f989e7597af91379d7ec2ef7e
-
SHA256
412de5f617c9115d8199d78ef93e34a9b46e021b81902feb9eef14a4b2c035f0
-
SHA512
6f4f17b5dc51b8448184ba21af9b7dda7f7c91f5c4eef609ae6699b8bead4019fdb6280bf83853cd1db98b1a621c8dfaad4bf2fb13305ba726b66aa046bdb469
-
SSDEEP
786432:pBaa+1a5dqYwSYjm9x+hvRprsSLQWvVyPf/Wj8LT3y53RZYvv/w/go1PIGvUaQvL:ma+1QqYHYSerDHuf/c8LTuT+iNu
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\is-F9AME.tmp\EULA.txt
http://ec.europa.eu/consumers/odr/
https://support.gog.com/hc/requests/new?category=info
Extracted
C:\GOG Games\PapersPlease\EULA.txt
http://ec.europa.eu/consumers/odr/
https://support.gog.com/hc/requests/new?category=info
http://www.jrsoftware.org/
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 5052 setup_papers_please_1.2.76_(54232).tmp 4352 scriptInterpreter.exe 2928 scriptInterpreter.tmp 5080 PapersPlease.exe 4360 PapersPlease.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation setup_papers_please_1.2.76_(54232).tmp -
Loads dropped DLL 10 IoCs
pid Process 5052 setup_papers_please_1.2.76_(54232).tmp 5052 setup_papers_please_1.2.76_(54232).tmp 5052 setup_papers_please_1.2.76_(54232).tmp 5052 setup_papers_please_1.2.76_(54232).tmp 5052 setup_papers_please_1.2.76_(54232).tmp 5052 setup_papers_please_1.2.76_(54232).tmp 2928 scriptInterpreter.tmp 2928 scriptInterpreter.tmp 5080 PapersPlease.exe 4360 PapersPlease.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{DD75819F-1218-4086-9A20-E0EE025F8A1F} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2891029575-1462575-1165213807-1000\{8A88B6E8-DA7E-4338-9150-D45ABF419CA8} svchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5052 setup_papers_please_1.2.76_(54232).tmp 5052 setup_papers_please_1.2.76_(54232).tmp 2928 scriptInterpreter.tmp 2928 scriptInterpreter.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1432 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4408 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4408 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5052 setup_papers_please_1.2.76_(54232).tmp 2928 scriptInterpreter.tmp -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5080 PapersPlease.exe 1432 OpenWith.exe 4360 PapersPlease.exe 1424 OpenWith.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4744 wrote to memory of 5052 4744 setup_papers_please_1.2.76_(54232).exe 82 PID 4744 wrote to memory of 5052 4744 setup_papers_please_1.2.76_(54232).exe 82 PID 4744 wrote to memory of 5052 4744 setup_papers_please_1.2.76_(54232).exe 82 PID 5052 wrote to memory of 4352 5052 setup_papers_please_1.2.76_(54232).tmp 96 PID 5052 wrote to memory of 4352 5052 setup_papers_please_1.2.76_(54232).tmp 96 PID 5052 wrote to memory of 4352 5052 setup_papers_please_1.2.76_(54232).tmp 96 PID 4352 wrote to memory of 2928 4352 scriptInterpreter.exe 97 PID 4352 wrote to memory of 2928 4352 scriptInterpreter.exe 97 PID 4352 wrote to memory of 2928 4352 scriptInterpreter.exe 97 PID 5052 wrote to memory of 5080 5052 setup_papers_please_1.2.76_(54232).tmp 99 PID 5052 wrote to memory of 5080 5052 setup_papers_please_1.2.76_(54232).tmp 99 PID 5052 wrote to memory of 5080 5052 setup_papers_please_1.2.76_(54232).tmp 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_papers_please_1.2.76_(54232).exe"C:\Users\Admin\AppData\Local\Temp\setup_papers_please_1.2.76_(54232).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\is-UI6U2.tmp\setup_papers_please_1.2.76_(54232).tmp"C:\Users\Admin\AppData\Local\Temp\is-UI6U2.tmp\setup_papers_please_1.2.76_(54232).tmp" /SL5="$90068,42151039,192512,C:\Users\Admin\AppData\Local\Temp\setup_papers_please_1.2.76_(54232).exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\GOG Games\PapersPlease\__redist\ISI\scriptInterpreter.exe"C:\GOG Games\PapersPlease\__redist\ISI\scriptInterpreter.exe" /verysilent /supportDir="C:\GOG Games\PapersPlease\__support" /SUPPRESSMSGBOXES /NORESTART /DIR="C:\GOG Games\PapersPlease" /productId="1207659209" /buildId="55257829924550446" /versionName="1.2.76" /Language="English" /LANG="english"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\is-FSOHN.tmp\scriptInterpreter.tmp"C:\Users\Admin\AppData\Local\Temp\is-FSOHN.tmp\scriptInterpreter.tmp" /SL5="$1020E,662929,192512,C:\GOG Games\PapersPlease\__redist\ISI\scriptInterpreter.exe" /verysilent /supportDir="C:\GOG Games\PapersPlease\__support" /SUPPRESSMSGBOXES /NORESTART /DIR="C:\GOG Games\PapersPlease" /productId="1207659209" /buildId="55257829924550446" /versionName="1.2.76" /Language="English" /LANG="english"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2928
-
-
-
C:\GOG Games\PapersPlease\PapersPlease.exe"C:\GOG Games\PapersPlease\PapersPlease.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5080
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x3d41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:4312
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:3164
-
C:\GOG Games\PapersPlease\PapersPlease.exe"C:\GOG Games\PapersPlease\PapersPlease.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4360
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:4940
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.5MB
MD5503bf5b8fefd351bfb23a3fc1278d183
SHA15d66f25f03b9c95e3455c1c5a113df8d35ee092d
SHA256936e5af2c7f01f7a03782bda924d912d51e7f4df69a3371a4416305375bc71b4
SHA512667221deb3306338e2cca4a533f32cb3038066eec8656263b4e5439be8bf21ca9e37f5357c3a7c29573e6b8b9a26d88f195cd2ac01be289d417aa175780a7bac
-
Filesize
11.5MB
MD5503bf5b8fefd351bfb23a3fc1278d183
SHA15d66f25f03b9c95e3455c1c5a113df8d35ee092d
SHA256936e5af2c7f01f7a03782bda924d912d51e7f4df69a3371a4416305375bc71b4
SHA512667221deb3306338e2cca4a533f32cb3038066eec8656263b4e5439be8bf21ca9e37f5357c3a7c29573e6b8b9a26d88f195cd2ac01be289d417aa175780a7bac
-
Filesize
11.5MB
MD5503bf5b8fefd351bfb23a3fc1278d183
SHA15d66f25f03b9c95e3455c1c5a113df8d35ee092d
SHA256936e5af2c7f01f7a03782bda924d912d51e7f4df69a3371a4416305375bc71b4
SHA512667221deb3306338e2cca4a533f32cb3038066eec8656263b4e5439be8bf21ca9e37f5357c3a7c29573e6b8b9a26d88f195cd2ac01be289d417aa175780a7bac
-
Filesize
1.2MB
MD50bc15db65acd786eab042566a1e1210b
SHA1629e95532563d80e714aa3ce3e40c1f605c70773
SHA256463e20f2b84d5a0d12049c6677f434ea7dd1a3035f053279e67bda8fd2dfc078
SHA512d1959c156dc9aaf5a4e4f906352422db89ae687b6947995e782ce8520bcd4af37eb910cb466071e331f346cd29e8c9070dc8150feed024e483fb1d1964790669
-
Filesize
1.2MB
MD50bc15db65acd786eab042566a1e1210b
SHA1629e95532563d80e714aa3ce3e40c1f605c70773
SHA256463e20f2b84d5a0d12049c6677f434ea7dd1a3035f053279e67bda8fd2dfc078
SHA512d1959c156dc9aaf5a4e4f906352422db89ae687b6947995e782ce8520bcd4af37eb910cb466071e331f346cd29e8c9070dc8150feed024e483fb1d1964790669
-
Filesize
2.9MB
MD57d7e5aabaebfd5d15644534e6e737ff4
SHA1b3d1bc8eaa27bf0724ff3c5e1cf7f4f86018e35e
SHA256868edcf508327ebf4eb8229e7ff3acfe9d4eb42a095050066c5d3bb142a13d54
SHA5121259ac6bd15e7bf59ec48b14eae8a3b2637f725b3c331897a2b7dcf735d45be69c5c792ce21cfa87b5f5c1c596cd1fee59a3947bcd37e76b750e5e4733204672
-
Filesize
66KB
MD5819f56653a4197a7959c41ddfc8ff69b
SHA1995a8160348f586143c9b3bc3c527786066779b5
SHA256546ab1e196e94157a89af9fe42efea5149cbe346615023681461189d7a4496bf
SHA512c9bf15571366fb0d0d9cf7128e2865f31d26f40658ebce234ffd351deefcd0d30c75321a16d991efca915404786a2491af7905527c3c01c1f9cce5e5f2352412
-
Filesize
2.0MB
MD563236f4627837ca08114651fb0d062d5
SHA1a8aaa4c6ad1af1151ed096cda4483e4d23ef6430
SHA2565ffbc7ea354b5d92775952e6cf18498a740871f1dff349a308987ce0c7f2320c
SHA512bf85b1b5b474efbea7c2ab235993b7f0df78a6241bf0ff9a92aaecc970fa4764567cb63824ad19b8dbefc53c6198bfbe486b7e99b2f444ba33e766ae4bfc7e40
-
Filesize
1KB
MD5663c08216b9cf33586579477b7a50413
SHA18a1d10e3b1e998f82d6b6b4e2e9b061735bdcc2c
SHA256573962eabdbab1f83c81fe57d97627c62c766b54ba369dceade281894aa9ff45
SHA51226becbfe1b38936d0fd3cdd6c20b26e96fc9bb2a5630e307d08bb1e1ba8cff480acaddce5f1f23f232934bb32f8479272736ad91cc905ed136c2d60cf877241c
-
Filesize
821B
MD56745b5c25105be39136b920448c004bd
SHA179d521233e0ef7f90c4d9db14e3a2e690e3970c0
SHA256fad085351fcde0270d84871452607e8cea9178f9ebffc79ee4dd0baeba47682e
SHA512e5fe8ba247132e309bd9203e45ea95f3d761725fb71e5a2b68aee6b4429f079605d971d976b0f38f2f50263c3c7a0433b5e900646d53425d9eefe8f6a017f0ac
-
Filesize
7.7MB
MD5f87ea1a6892b1a02615d4efc2af42ae7
SHA11aed7c51a52b27e3fe4669a7813de83f86243ee2
SHA25665ca003dd8cf1858b1685f94379a93fb5fb70cc304e3b0dfcbbb0b8fe7ff68fb
SHA51297f7eac332045310f6babe28ca107e9755ab873aeb1610a9f3774b2858dd77e781ad89303cad7b3898fbcfcf51f6720b2dde49716215459e377dafd00462e362
-
Filesize
7.7MB
MD5f87ea1a6892b1a02615d4efc2af42ae7
SHA11aed7c51a52b27e3fe4669a7813de83f86243ee2
SHA25665ca003dd8cf1858b1685f94379a93fb5fb70cc304e3b0dfcbbb0b8fe7ff68fb
SHA51297f7eac332045310f6babe28ca107e9755ab873aeb1610a9f3774b2858dd77e781ad89303cad7b3898fbcfcf51f6720b2dde49716215459e377dafd00462e362
-
Filesize
7.7MB
MD5f87ea1a6892b1a02615d4efc2af42ae7
SHA11aed7c51a52b27e3fe4669a7813de83f86243ee2
SHA25665ca003dd8cf1858b1685f94379a93fb5fb70cc304e3b0dfcbbb0b8fe7ff68fb
SHA51297f7eac332045310f6babe28ca107e9755ab873aeb1610a9f3774b2858dd77e781ad89303cad7b3898fbcfcf51f6720b2dde49716215459e377dafd00462e362
-
Filesize
519KB
MD5ecfe16f0a9b3095de1d2730de0e487a7
SHA1f13e2ea9f9ede890f482c48aeeafc59b874bf397
SHA256afc5e696545bde3513747c4bf5de7092404fd7b72e3cf90099f948f3fc4e6d99
SHA512065734bde7728fcd962689bceda8333dea06e3b1b9ec8077a85acd57f40568baec0defc9c2d069ddac66b991f0e41b677787f4475125b848bae54ffbc8d5b031
-
Filesize
6KB
MD5fdc1e5ca44558ddbe2fe65de744b90c8
SHA178e9c9ee5e6b4ba590c773b73596cd2d90c3e537
SHA2569d190c9fef320482e665459dae90c61b3ce2c23b7f4e30df1e42ee7db0663446
SHA512dccf9254cfc59558a26bd463deb36278ea6de5c8da4488ee57efcaa8978aa500a107fa077aa5006e4c818a0928be84e9244ddfffa2ef5677038a684485b7a0cf
-
Filesize
393KB
MD5e02cae4d12bc9855e10702dec03fd82d
SHA1c45d8de7fc75e787855b77c87f0112e3a6fc1e6f
SHA256832c6acb0325e83028b85b03df73b893208dc74c8fed2028dd1dce2e1b643d03
SHA5122d793e5b0cd844a110e48c083d8ababc0cbb4d1cfecafc566b595e657b4ef5ef2a2b842f52cbc14501f2095f01f9e420f06b56ccf92a42d6c0684fc25e9fb2b6
-
Filesize
1.3MB
MD5584b93c043e09f22f0f94d90220b90d2
SHA10cc5a8f9c7f6924dc1198001db3218953ac0ad99
SHA256ca4b29bc6469a8a733431e071a360dcca48cf5d4886f455514161c9c62c44256
SHA5122039520e5b8d71984e3203d63472d2ee3d1be2d9294f3add58804f0f55fe361c7de2a82855f3a3f18c9920198eb31a9471a2987c69961c0caef74b7671114736
-
Filesize
22KB
MD5668a2187f89c993485bd46382ac682aa
SHA1abeefe05d6d6f64c0ef1f5e023f1861000aadb55
SHA256e43d06ec2b3dbe3d81bcd6b7880d28d074dac54b38646a605cfc5c809939da16
SHA5124f056b8c69c0674ba725450bb6242625389f23043a46ad95c6452893da02e1349f6067a1e19e86c8182867b08b8e78da98bedf02d2c94c3aa647b45ec6da56e0
-
Filesize
691KB
MD57db706c324cc9b6fda497d081eed6e26
SHA1ca97392e573af0cf61bfa3301801a85f2beea44c
SHA256cc685dbcf798549ad1a51c1dde45462e2a451ec59f48ee91219182a3871cd5b0
SHA5128edf1494d57d5e708faaff4170f21f435658be897a6fe0acf243ced0701a7fd574b3c973c5bc5e8d92815e966c98977e69ac1e3083ab00c11b072115527ffa19
-
Filesize
35KB
MD50177746573eed407f8dca8a9e441aa49
SHA16b462adf78059d26cbc56b3311e3b97fcb8d05f7
SHA256a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008
SHA512d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a
-
Filesize
35KB
MD50177746573eed407f8dca8a9e441aa49
SHA16b462adf78059d26cbc56b3311e3b97fcb8d05f7
SHA256a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008
SHA512d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a
-
Filesize
69KB
MD51d51fac9e2384eeb674199cfd5281d7d
SHA1861dfdc121357d605d0cc3793266713788109eb2
SHA25623e90ce5a1f2d634a7bf5d5d0522fafeea6df9e536e16f5ce91035d5197128ec
SHA512921b00adfe43b883200960e8d0958d4e6b97f6d5cfc096ee277766a3e44cc7805a20877a4edf8bd4d9102bb71a20ac218a9a512f4f76bd751d3ef14f4e0a6eda
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
691KB
MD57db706c324cc9b6fda497d081eed6e26
SHA1ca97392e573af0cf61bfa3301801a85f2beea44c
SHA256cc685dbcf798549ad1a51c1dde45462e2a451ec59f48ee91219182a3871cd5b0
SHA5128edf1494d57d5e708faaff4170f21f435658be897a6fe0acf243ced0701a7fd574b3c973c5bc5e8d92815e966c98977e69ac1e3083ab00c11b072115527ffa19
-
Filesize
691KB
MD57db706c324cc9b6fda497d081eed6e26
SHA1ca97392e573af0cf61bfa3301801a85f2beea44c
SHA256cc685dbcf798549ad1a51c1dde45462e2a451ec59f48ee91219182a3871cd5b0
SHA5128edf1494d57d5e708faaff4170f21f435658be897a6fe0acf243ced0701a7fd574b3c973c5bc5e8d92815e966c98977e69ac1e3083ab00c11b072115527ffa19
-
Filesize
1.3MB
MD55fbb8d112408800bf9cc257f8be6f580
SHA1c6319048b9af0736212bebb25979a84a74db0a06
SHA2560963b01b447c641bea6f5e9de250c1e8a0127a34440c8165594b67890026e6af
SHA512390f4a1703c867d6f9edae3b02334126565b9995989f2edc16d5749dce7b059874373a5f6e870ce742012fa8b06e1c2c0c3ed56fffb864980496d328db8cbe02
-
Filesize
1.3MB
MD55fbb8d112408800bf9cc257f8be6f580
SHA1c6319048b9af0736212bebb25979a84a74db0a06
SHA2560963b01b447c641bea6f5e9de250c1e8a0127a34440c8165594b67890026e6af
SHA512390f4a1703c867d6f9edae3b02334126565b9995989f2edc16d5749dce7b059874373a5f6e870ce742012fa8b06e1c2c0c3ed56fffb864980496d328db8cbe02
-
Filesize
232KB
MD555c310c0319260d798757557ab3bf636
SHA10892eb7ed31d8bb20a56c6835990749011a2d8de
SHA25654e7e0ad32a22b775131a6288f083ed3286a9a436941377fc20f85dd9ad983ed
SHA512e0082109737097658677d7963cbf28d412dca3fa8f5812c2567e53849336ce45ebae2c0430df74bfe16c0f3eebb46961bc1a10f32ca7947692a900162128ae57
-
Filesize
712KB
MD5f3a88277fc7e0c057c40e47a7e43f9ad
SHA178ae0052b323139a4de7a5361a40503a39339f4c
SHA256d88bcf910e7a5ce4d76ca48b263ef226911b455d3a8db80c9fa69aeb2b3898a1
SHA5123c40377600fbb814fe19423404d2fb29f6342ab2a3a6d5dc50f42086fc0f59174184a0870d7f04fb6ee5f84828e1ed282396bfcb70842084af25f5af15cc8a1f
-
Filesize
1.3MB
MD5584b93c043e09f22f0f94d90220b90d2
SHA10cc5a8f9c7f6924dc1198001db3218953ac0ad99
SHA256ca4b29bc6469a8a733431e071a360dcca48cf5d4886f455514161c9c62c44256
SHA5122039520e5b8d71984e3203d63472d2ee3d1be2d9294f3add58804f0f55fe361c7de2a82855f3a3f18c9920198eb31a9471a2987c69961c0caef74b7671114736
-
Filesize
1.3MB
MD5584b93c043e09f22f0f94d90220b90d2
SHA10cc5a8f9c7f6924dc1198001db3218953ac0ad99
SHA256ca4b29bc6469a8a733431e071a360dcca48cf5d4886f455514161c9c62c44256
SHA5122039520e5b8d71984e3203d63472d2ee3d1be2d9294f3add58804f0f55fe361c7de2a82855f3a3f18c9920198eb31a9471a2987c69961c0caef74b7671114736
-
Filesize
728B
MD590613de42bda29b3c1264329762741c0
SHA1641c5f0f597be5608e37d01e24a0ac96e6facf1d
SHA256b2ac94e961537adbd8605b4abef808f4e0cf19aac67215241b2b4dc72ddaae8d
SHA5123cc9d66dd9a3e3fb5924535f33d258eb681d215c1e63d47e95c11733f831f033e2870be569419f29fe7195dc156c011b95b87ec7c9144ccba0665d0877c77c3c