Analysis
-
max time kernel
61s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
782.9MB
-
MD5
89203f641d704105f31c783558cd7326
-
SHA1
72f3ee9ffe95ae9a77d95e43bfdb9e0f42be5722
-
SHA256
fda1c801606fe96db059024e436e971c49adfa4e1c24590e0ab4970628944ca2
-
SHA512
d9cd00e35cb3a1c7b72d468b9aca8ac505b2dfcf6eef36acd4a5ea702d12a6f9a1da98e3111a75bd5fa785ef235679805f9e04a3fa41fb692e506ef5a5877891
-
SSDEEP
98304:JPcuuktQEMDcYc9cZcYc9cZcYc9cZcYc9cZcYc9cZcYc9cZcYc9cZcYc9cZcYc94:1PqEMT
Malware Config
Extracted
lumma
https://wickedneatr.sbs
https://invinjurhey.sbs
https://laddyirekyi.sbs
https://exilepolsiy.sbs
https://bemuzzeki.sbs
https://exemplarou.sbs
https://isoplethui.sbs
https://frizzettei.sbs
https://beerishint.sbs
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2556 created 3508 2556 Gotta.pif 56 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Setup.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ElephantFlow.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ElephantFlow.url cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2556 Gotta.pif 2932 Gotta.pif -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 1388 tasklist.exe 1536 tasklist.exe 1864 tasklist.exe 1808 tasklist.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 5024 2556 Gotta.pif 99 -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\ConventionalSearched Setup.exe File opened for modification C:\Windows\SillyTelevisions Setup.exe File opened for modification C:\Windows\OwenMidwest Setup.exe File opened for modification C:\Windows\DynamicExpedia Setup.exe File opened for modification C:\Windows\GuaranteeEase Setup.exe File opened for modification C:\Windows\DynamicExpedia Setup.exe File opened for modification C:\Windows\GuaranteeEase Setup.exe File opened for modification C:\Windows\ConventionalSearched Setup.exe File opened for modification C:\Windows\SillyTelevisions Setup.exe File opened for modification C:\Windows\OwenMidwest Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1320 5024 WerFault.exe 99 764 5024 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gotta.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gotta.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 916 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1388 tasklist.exe Token: SeDebugPrivilege 1536 tasklist.exe Token: SeDebugPrivilege 1864 tasklist.exe Token: SeDebugPrivilege 1808 tasklist.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2556 Gotta.pif 2556 Gotta.pif 2556 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif 2932 Gotta.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 4760 116 Setup.exe 83 PID 116 wrote to memory of 4760 116 Setup.exe 83 PID 116 wrote to memory of 4760 116 Setup.exe 83 PID 4760 wrote to memory of 1388 4760 cmd.exe 85 PID 4760 wrote to memory of 1388 4760 cmd.exe 85 PID 4760 wrote to memory of 1388 4760 cmd.exe 85 PID 4760 wrote to memory of 4640 4760 cmd.exe 86 PID 4760 wrote to memory of 4640 4760 cmd.exe 86 PID 4760 wrote to memory of 4640 4760 cmd.exe 86 PID 4760 wrote to memory of 1536 4760 cmd.exe 89 PID 4760 wrote to memory of 1536 4760 cmd.exe 89 PID 4760 wrote to memory of 1536 4760 cmd.exe 89 PID 4760 wrote to memory of 2428 4760 cmd.exe 90 PID 4760 wrote to memory of 2428 4760 cmd.exe 90 PID 4760 wrote to memory of 2428 4760 cmd.exe 90 PID 4760 wrote to memory of 3612 4760 cmd.exe 91 PID 4760 wrote to memory of 3612 4760 cmd.exe 91 PID 4760 wrote to memory of 3612 4760 cmd.exe 91 PID 4760 wrote to memory of 684 4760 cmd.exe 92 PID 4760 wrote to memory of 684 4760 cmd.exe 92 PID 4760 wrote to memory of 684 4760 cmd.exe 92 PID 4760 wrote to memory of 696 4760 cmd.exe 93 PID 4760 wrote to memory of 696 4760 cmd.exe 93 PID 4760 wrote to memory of 696 4760 cmd.exe 93 PID 4760 wrote to memory of 2556 4760 cmd.exe 94 PID 4760 wrote to memory of 2556 4760 cmd.exe 94 PID 4760 wrote to memory of 2556 4760 cmd.exe 94 PID 4760 wrote to memory of 64 4760 cmd.exe 95 PID 4760 wrote to memory of 64 4760 cmd.exe 95 PID 4760 wrote to memory of 64 4760 cmd.exe 95 PID 2556 wrote to memory of 1664 2556 Gotta.pif 96 PID 2556 wrote to memory of 1664 2556 Gotta.pif 96 PID 2556 wrote to memory of 1664 2556 Gotta.pif 96 PID 2556 wrote to memory of 5024 2556 Gotta.pif 99 PID 2556 wrote to memory of 5024 2556 Gotta.pif 99 PID 2556 wrote to memory of 5024 2556 Gotta.pif 99 PID 2556 wrote to memory of 5024 2556 Gotta.pif 99 PID 2556 wrote to memory of 5024 2556 Gotta.pif 99 PID 1920 wrote to memory of 1116 1920 Setup.exe 119 PID 1920 wrote to memory of 1116 1920 Setup.exe 119 PID 1920 wrote to memory of 1116 1920 Setup.exe 119 PID 1116 wrote to memory of 1864 1116 cmd.exe 121 PID 1116 wrote to memory of 1864 1116 cmd.exe 121 PID 1116 wrote to memory of 1864 1116 cmd.exe 121 PID 1116 wrote to memory of 2448 1116 cmd.exe 122 PID 1116 wrote to memory of 2448 1116 cmd.exe 122 PID 1116 wrote to memory of 2448 1116 cmd.exe 122 PID 1116 wrote to memory of 1808 1116 cmd.exe 123 PID 1116 wrote to memory of 1808 1116 cmd.exe 123 PID 1116 wrote to memory of 1808 1116 cmd.exe 123 PID 1116 wrote to memory of 4824 1116 cmd.exe 124 PID 1116 wrote to memory of 4824 1116 cmd.exe 124 PID 1116 wrote to memory of 4824 1116 cmd.exe 124 PID 1116 wrote to memory of 1072 1116 cmd.exe 125 PID 1116 wrote to memory of 1072 1116 cmd.exe 125 PID 1116 wrote to memory of 1072 1116 cmd.exe 125 PID 1116 wrote to memory of 1148 1116 cmd.exe 126 PID 1116 wrote to memory of 1148 1116 cmd.exe 126 PID 1116 wrote to memory of 1148 1116 cmd.exe 126 PID 1116 wrote to memory of 2968 1116 cmd.exe 127 PID 1116 wrote to memory of 2968 1116 cmd.exe 127 PID 1116 wrote to memory of 2968 1116 cmd.exe 127 PID 1116 wrote to memory of 2932 1116 cmd.exe 128 PID 1116 wrote to memory of 2932 1116 cmd.exe 128
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Configure Configure.bat & Configure.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6343334⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "LegendAssetFriendlyDurham" All4⤵
- System Location Discovery: System Language Discovery
PID:684
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Cancelled + ..\Journal + ..\Expiration + ..\Korean + ..\Gratis + ..\Apparatus + ..\Concepts H4⤵
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\634333\Gotta.pifGotta.pif H4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\nslookup.exeC:\Windows\SysWOW64\nslookup.exe5⤵
- System Location Discovery: System Language Discovery
PID:5024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 12326⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 12126⤵
- Program crash
PID:764
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:64
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ElephantFlow.url" & echo URL="C:\Users\Admin\AppData\Local\NeuraMind Innovations\ElephantFlow.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ElephantFlow.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1664
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Configure.bat2⤵
- Opens file in notepad (likely ransom note)
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Configure Configure.bat & Configure.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6343334⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "LegendAssetFriendlyDurham" All4⤵
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Cancelled + ..\Journal + ..\Expiration + ..\Korean + ..\Gratis + ..\Apparatus + ..\Concepts H4⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\634333\Gotta.pifGotta.pif H4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2932
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5024 -ip 50241⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5024 -ip 50241⤵PID:3704
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
545KB
MD54bfc1ff07adc2ecd6e7b308217e5c952
SHA1720ad1678be8df72cd0357f64f48e524d8f70b36
SHA256c93a2d3016f711a074229c7c6f918526203d481e193e88d0821839563acfae3d
SHA5128068160432191a6ea7f897a9ad12723c514d9512e48d317584c5e23960b085950d64bb03d95d49d5dc55c8e799d988c4bf25ca587134baefe63a4600caafb9b2
-
Filesize
6KB
MD57923400ed79edef9a790f17496b0f436
SHA1d82930914ba5ba880713b5d91efff4181ff2e6a5
SHA25611b44d0319e9a1c0d469c84d7a7d30206647945c3b2ca5442ec662d550c04f5a
SHA512e3f3adadb8994fab749823f09e06d8e4b50085ac2eab07f0195d0ae80654d736aa7819c4d50ee95b55a2a35989d5addc996afe7823d520e1d18f0865121217fe
-
Filesize
99KB
MD5d101c6ab7b838d285d658f68e5a2b468
SHA1b27e8c42d7816108534a4fbdd8b464d56df40525
SHA25670d31a6946db5a890668802ef5ea65ee03cc059482adbc359643cd06063ea34c
SHA512e000c329d2ac3eeca817f68447e72d332191e99b25e43308b1d7c5bb18dcb5c6b40b045201887e423526b1d1d7b6b1043abd1b0f406938f94499dc7dd1ea52a8
-
Filesize
84KB
MD58bfc079d9eee3968b0765a50e0b216d9
SHA1c0beb6f9ff8637b3a6fe0d8b7e3bc9480f26eb17
SHA25610b5e576f76ecb8569be266aa3d3325f61c6d861506b7b5211428d7a0d884d4d
SHA5128e35e9f539f7d693044d83adad9ab8840ac87b81ec6a634853804190e9d4defd1715a8138b0879d6920a6d7f2cd7e5cd12fbd5e41a04a64eb058b2f81dafd1b6
-
Filesize
22KB
MD53d045df92241bb275343536b43d7ee9a
SHA19d8ec1c8a8f738fbecd9e6bdb0cfae7858e1ec54
SHA256c2a9baed3b438019bcc67ee851c162b4f2ab4f0f4faa794c987a4c45e0080a05
SHA51221fddfb1fcad7080f60b041470c582ea60a381b0b14ef4586e9f1b0712a74bddcc71f2a161cc0202dba34c2125a9d949e9954bcb63e19fb46d74cc8b12714f42
-
Filesize
7KB
MD5ba3a52bb1c1306919010e4ad2e9c2d5a
SHA1d283cb0182dd0fa3f082da33172876107dad9a13
SHA2566be4eaf84228d38b614f0cddcd1befe979fb2f7646ed6eba7116be1b8916114c
SHA51215d5920acfa52fa7dca90b6a73b8a075c4e902ee9e5e276e9ace54ed3d1fe2ca8126c84e56ad8cbd13bf5617297c63965b1abfbe139e218e17e43f4461ca2128
-
Filesize
65KB
MD546d9433e4c60f38d0cfb5e1957c73ebf
SHA10967821db25d2765f50757ae2f99cd9683a91a2a
SHA25623ef399092377747c9e6e329edc200afecac9f8ec395e0a4c199fa7d308e2d97
SHA5126ffb447dd1d8fc610a9f925fa5204da30ae617ad52f98dd5b74788abab63ce7c2a5a4ab23e0a472de0e2bdc3558160c4043cdd35d35b72e8dfe273fbe6fe022c
-
Filesize
89KB
MD528426a3a3a3020f053fa314fb9ac4abe
SHA1abe237df56b7b33206ab0b6bcd586c0cc8924a00
SHA2568127841f4fbe7862bd709da5be0a88e2a331f5f189cad13652f3fc123c9c4f9b
SHA5124f3adf58da7d6c78b94e5fbc32f44f86c317d4ee71589607a11c3d2b945caf476b70e0fae71b447f324e187da7e223442970a1adb1c2818cc1a70f778a95e781
-
Filesize
87KB
MD5f50a27e688dfe8a350ea971f9d752bb1
SHA116f8e8b39e01c07db868fd980ace99707a16c79d
SHA25601b737d5d737dcd7d1e14894ed0bd9f93a3f52b2489525339280ea45efec13ed
SHA5126d090551c5890735246743a280e35cee175edefa6bb5c87a8d4426d51b963de61a1bb43bee41aa74b72edf9d81cef13bf6098a4ad9e61ea0fee1c8c4bed8feb9
-
Filesize
99KB
MD51c884f6a09e12842911bd0eac9a8f0a7
SHA1f65c322b49b34171ca896e0bb61c74f787e6e7a9
SHA256f52df94d20a0c9a8289f04646f1d248464b10d4905609bba42285f52f736047a
SHA5125b9fb685612292e1a829d4561d56f026fa902a7ab1d1fea90ff1aa85e47eadac354861ae2b5ab1ac1979f7c6c2e11d5bb76b0677cfd40a400ceec25f62bf6bf6
-
Filesize
866KB
MD5268a68798e7980500e922521230100b4
SHA1e2186ed69d61236f4b7dfff389e5bcd71b5d6260
SHA25602f4771d6367adbd45a6c6459cb62613be22c17120e6b8406bc8f7a141992fd9
SHA5127407f488d5aa1be17109f2744cc0af289230fa3966679c24b07359c0bf01f58a7ed31edfdc84ed2acbe21058d3be1a78da80d79756ba7fc035470f64c15ad5b5