Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe
Resource
win7-20240903-en
General
-
Target
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe
-
Size
1.8MB
-
MD5
a9128d13f8593188944a57eeff9e8ec8
-
SHA1
2ca5b38785c37a9e251c256673ac8f63c43303d7
-
SHA256
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95
-
SHA512
95c41fdedab33233f79f5405043232c865d6c1628ee978a8034bf2f7a075d5e3e76b7a386942590e9e124c30e6999e2887bb9088f8ff841a4ae0ce16028a0b2d
-
SSDEEP
49152:OBP7AJCDzjzQ2rsQbAO9e3yRvgoWt1ohlFD8TPI:CP7AJqjzVYKayV8iUA
Malware Config
Extracted
amadey
4.41
fed3aa
http://185.215.113.16
-
install_dir
44111dbc49
-
install_file
axplong.exe
-
strings_key
8d0ad6945b1a30a186ec2d30be6db0b5
-
url_paths
/Jo89Ku7d/index.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exeaxplong.exee234098870.exe6f6da07b92.exeaxplong.exeaxplong.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e234098870.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6f6da07b92.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6f6da07b92.exe418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exeaxplong.exee234098870.exeaxplong.exeaxplong.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6f6da07b92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e234098870.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6f6da07b92.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e234098870.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation axplong.exe -
Executes dropped EXE 11 IoCs
Processes:
axplong.exeaxplong.exeha7dur10.exeha7dur10.exee234098870.exe6f6da07b92.exeNewfts.exeNewfts.exeaxplong.exetcpvcon.exeaxplong.exepid Process 4760 axplong.exe 920 axplong.exe 3476 ha7dur10.exe 3296 ha7dur10.exe 4648 e234098870.exe 1612 6f6da07b92.exe 2784 Newfts.exe 1596 Newfts.exe 2280 axplong.exe 4324 tcpvcon.exe 3624 axplong.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
e234098870.exe6f6da07b92.exeaxplong.exeaxplong.exe418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exeaxplong.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine e234098870.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 6f6da07b92.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine axplong.exe -
Loads dropped DLL 9 IoCs
Processes:
ha7dur10.exeNewfts.exeNewfts.exepid Process 3296 ha7dur10.exe 2784 Newfts.exe 2784 Newfts.exe 2784 Newfts.exe 2784 Newfts.exe 1596 Newfts.exe 1596 Newfts.exe 1596 Newfts.exe 1596 Newfts.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
axplong.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e234098870.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002595001\\e234098870.exe" axplong.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6f6da07b92.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1002596001\\6f6da07b92.exe" axplong.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exeaxplong.exee234098870.exe6f6da07b92.exeaxplong.exeaxplong.exepid Process 2044 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe 4760 axplong.exe 920 axplong.exe 4648 e234098870.exe 1612 6f6da07b92.exe 2280 axplong.exe 3624 axplong.exe -
Drops file in Windows directory 1 IoCs
Processes:
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exedescription ioc Process File created C:\Windows\Tasks\axplong.job 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6f6da07b92.exeNewfts.exetcpvcon.exe418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exeha7dur10.exeha7dur10.exee234098870.exeNewfts.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f6da07b92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tcpvcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axplong.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ha7dur10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e234098870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Newfts.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exeaxplong.exee234098870.exe6f6da07b92.exeNewfts.exeaxplong.exeNewfts.exetcpvcon.exeaxplong.exepid Process 2044 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe 2044 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe 4760 axplong.exe 4760 axplong.exe 920 axplong.exe 920 axplong.exe 4648 e234098870.exe 4648 e234098870.exe 1612 6f6da07b92.exe 1612 6f6da07b92.exe 2784 Newfts.exe 2280 axplong.exe 2280 axplong.exe 1596 Newfts.exe 1596 Newfts.exe 4324 tcpvcon.exe 4324 tcpvcon.exe 3624 axplong.exe 3624 axplong.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
Newfts.exepid Process 1596 Newfts.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tcpvcon.exedescription pid Process Token: SeDebugPrivilege 4324 tcpvcon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exepid Process 2044 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exeaxplong.exeha7dur10.exeha7dur10.exeNewfts.exeNewfts.exedescription pid Process procid_target PID 2044 wrote to memory of 4760 2044 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe 86 PID 2044 wrote to memory of 4760 2044 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe 86 PID 2044 wrote to memory of 4760 2044 418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe 86 PID 4760 wrote to memory of 3476 4760 axplong.exe 96 PID 4760 wrote to memory of 3476 4760 axplong.exe 96 PID 4760 wrote to memory of 3476 4760 axplong.exe 96 PID 3476 wrote to memory of 3296 3476 ha7dur10.exe 99 PID 3476 wrote to memory of 3296 3476 ha7dur10.exe 99 PID 3476 wrote to memory of 3296 3476 ha7dur10.exe 99 PID 4760 wrote to memory of 4648 4760 axplong.exe 101 PID 4760 wrote to memory of 4648 4760 axplong.exe 101 PID 4760 wrote to memory of 4648 4760 axplong.exe 101 PID 4760 wrote to memory of 1612 4760 axplong.exe 102 PID 4760 wrote to memory of 1612 4760 axplong.exe 102 PID 4760 wrote to memory of 1612 4760 axplong.exe 102 PID 3296 wrote to memory of 2784 3296 ha7dur10.exe 107 PID 3296 wrote to memory of 2784 3296 ha7dur10.exe 107 PID 3296 wrote to memory of 2784 3296 ha7dur10.exe 107 PID 2784 wrote to memory of 1596 2784 Newfts.exe 108 PID 2784 wrote to memory of 1596 2784 Newfts.exe 108 PID 2784 wrote to memory of 1596 2784 Newfts.exe 108 PID 1596 wrote to memory of 4324 1596 Newfts.exe 110 PID 1596 wrote to memory of 4324 1596 Newfts.exe 110 PID 1596 wrote to memory of 4324 1596 Newfts.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe"C:\Users\Admin\AppData\Local\Temp\418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\Temp\{EDE81D49-B507-4F0D-906A-19BADF415130}\.cr\ha7dur10.exe"C:\Windows\Temp\{EDE81D49-B507-4F0D-906A-19BADF415130}\.cr\ha7dur10.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\1002552001\ha7dur10.exe" -burn.filehandle.attached=536 -burn.filehandle.self=5444⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\Temp\{E155665E-D2E6-41CE-997A-0B19230070BD}\.ba\Newfts.exe"C:\Windows\Temp\{E155665E-D2E6-41CE-997A-0B19230070BD}\.ba\Newfts.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exeC:\Users\Admin\AppData\Roaming\Fbhost_alpha\Newfts.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe"C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" "C:\Users\Admin\AppData\Roaming\Fbhost_alpha\tcpvcon.exe" /accepteula7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1002595001\e234098870.exe"C:\Users\Admin\AppData\Local\Temp\1002595001\e234098870.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\1002596001\6f6da07b92.exe"C:\Users\Admin\AppData\Local\Temp\1002596001\6f6da07b92.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:920
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exeC:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.4MB
MD52f8fd18eb8f7832baa360c7ea352fb4f
SHA1e6e35646162c50941cb04767c3efb6e877800660
SHA2566c68d28c2fd55a424a21ba96b76d383f652bbed8cb68d7fbfaafcd139a689e44
SHA5121323985d00c239059d490357ee58d6ac70a804da77a706d793774ef1c8feeec52bc1b33ae01b9b51bb8ba787ebbed11b94e7f30c482ad9a7ee89a91bd6189434
-
Filesize
1.7MB
MD580766249a1353dce4607d68a3a0f5e04
SHA159c97489f461e9eabc22d49d358261951647651b
SHA256d2a291d742034801dd35a9e6b7ca99d82f1ef59e220d4ed4bfd15d6512cc7df7
SHA5120f42183eb17f55108359fbd8bc39c67ef29aabc00d8f09daa9c2f97bfa8c32b6fe39d633f24ad93740a7c1b21f977184668b861f58d76207ccb7d8dca3cc95b7
-
Filesize
3.1MB
MD5837a10e66f1b385fcd02db815b30e1b5
SHA184e4458cf2f034ba096eb27141d05c6aa9bb33ed
SHA2566e74683374237e3e5778695ee118e48bbe96bf5faa6578af5e0950cc16260805
SHA5121381bac030ca766d5893eec5c4d25d5b4b1bfe74d4eabce2ed288983a422865621e69c48934c97b9478a0d6d8c41999cdce6f3d7d439327b34f4a70d42bec70b
-
Filesize
1.8MB
MD5a9128d13f8593188944a57eeff9e8ec8
SHA12ca5b38785c37a9e251c256673ac8f63c43303d7
SHA256418c4ba8adae0394255bf4ce095aac6e760b55766df55b94760da1fb32afae95
SHA51295c41fdedab33233f79f5405043232c865d6c1628ee978a8034bf2f7a075d5e3e76b7a386942590e9e124c30e6999e2887bb9088f8ff841a4ae0ce16028a0b2d
-
Filesize
197KB
MD51cf39530d557ce880d7f71984928384f
SHA1defeab729d8bad2fb35bfe18eb9b061dab1f2a79
SHA256198995fecc0e38a2749b7e48c54112a959b77878683b726ee36430c4bacec196
SHA5128ffd2e39e6213b6f8d2d51d424fbcb1c63a3099b4c952fce34a487a38f4d786e3f0c354eed598d20ddf176afe607292229b9b38182ad0219480e9c89f7d738de
-
Filesize
312KB
MD51a4efbc6b661d10a1a4fdbe1a7fa54f0
SHA179f665dcb75db8d711728bab172e444cae2d8133
SHA256b3baa312189da8828d8e3c2b8c20ad3df76da96908d961aa03fed98a61b9bc86
SHA5127cbb77e084f0b8c1af1c7f0451fc0bddfb6b97bb0f9a563a982be8df8effb6816c0aa992448c354d3dc1b13520d440b67bb9e33bd03739e06dee7bf80d32ee39
-
Filesize
2.1MB
MD5db7e67835fce6cf9889f0f68ca9c29a9
SHA15565afda37006a66f0e4546105be60bbe7970616
SHA256dbd3057a58fd3407c95418bc5d9c253adc8c658ee338f22d58374ed3ea37b738
SHA512bc2714bb408715e5e1cec1337b831e26dbda208183955a07ec8653a38c9c0f25f60f333a154b738927ce085e7bbff438963b941a6c2773b3e7325cd900e7651b
-
Filesize
1.1MB
MD559c15c71fd599ff745a862d0b8932919
SHA18384f88b4cac4694cf510ca0d3f867fd83cc9e18
SHA256c4ed07ad748661ce776ac6ebb4f8bef7619586bfb4443ce58c92d4b889f3d5c2
SHA512be3425d55dcaa361bc8481b87b2086454baca79a3c948de9acf9ef7d3084d6d987c328d665b45dfcd0510e2c97c980aa63d7cd669fe9fc1a67983c325593481e
-
Filesize
1.4MB
MD50014da7457565c1e458919f5d4cb82c1
SHA176aebb8db4eddd04ffb2e0cb841701e1edde925a
SHA256ab7e259f88801dc746e8877fbf4d6eb4216af7245139ca968eca19065227e2c1
SHA51274dbcf6995575360ff0ff077667bcedf856333114b0e902ec7de7e25e068a6c412e486c0100f97a3df604487697e3b5c9e5243b377d3caa8bb09d59206bdc079
-
Filesize
7KB
MD506d205c486bfa3488ad9f480573b3c2f
SHA1ea871113310da1bdc01ad1af4ca7e9975ebb3c06
SHA25629b9952c056ab61ddfe859714cf5376d3e852753022bb40fd35dc473e82e35af
SHA512cc2254033ef88ec745d27563e1205fdd87504cef096d9402961f35b8428f59f7a0aabfe4ba07154fb9be6fdcc54a2912cf86c5747adaf4f2a3f1ab8eb6713f2c
-
Filesize
5.5MB
MD51d37dc833ae7612fb6b90de413ba8792
SHA1d606b4f0bcd4c00597d78f789d3a9fc984d2aeb0
SHA2569b25e0214a5b4335545d5fcc970edcfdea11c24c4ef951bace98ddfe09680ccc
SHA51206ad8524df73f4710f642541823819dad7c519f556e1337ed244785bd46d69e7aa38d8f472d24be519ae5050c18590cd761c8079d50630deb643666fefb911fa
-
Filesize
8.1MB
MD58543de5d216f8112e80867337dec74db
SHA11cb2462e70718245cd4cb023576c74e2d4a9b213
SHA2563cc98ab01aa1fb3ab9f6147ae0d0d7f82ad965f09520511ce1456eeb9aac7d58
SHA512af285d51cf45e1b3a8caa89e0ce73d14c2ea76eb5cf72f09aa7fab97c486e349b5ebd0936f756e4ca8817f97182819aa1ede186a73c45c96f5d9ed138fdf8e12