Resubmissions
03-01-2025 03:28
250103-d1d8psxnfz 1003-01-2025 00:59
250103-bcehfsspgt 1003-01-2025 00:10
250103-agetcatrhp 1002-01-2025 23:44
250102-3rc2qazphs 1002-01-2025 23:34
250102-3khcvstjeq 1002-01-2025 19:18
250102-xz8wgavphj 1002-01-2025 04:32
250102-e57aqawlem 1002-01-2025 04:20
250102-eybkgavrej 1002-01-2025 04:14
250102-etyt7svpgq 1002-01-2025 03:52
250102-efgnrstrgl 10Analysis
-
max time kernel
81s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 03:52
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
800.0MB
-
MD5
b4d4d19863fd8b7b64e2e8a1204aac62
-
SHA1
64d1609b82e6054af14412a92724d8605b7d015d
-
SHA256
56375ce34ece830c6770d768f1ed501a78c359a380c9576274dbbd19c9ef5aa3
-
SHA512
e00fa8b5af32b334849e499f5f0be5a23aeb37ab2b28d2bf82cee2766d85c3fb1a874cd327467ebdd57475b2b42befb7507d2d6ac923020964e23f0a3f5a7bff
-
SSDEEP
24576:KjatNrAGDrHrmxAztbD6Lf5aytZI9FmLaQWnnZp/fh+AR9wLsS9qB3Hcxx1VmLHA:PUGnHRbEau4FmUZpYARuISsV+VmLHRQl
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Setup.exe -
Executes dropped EXE 2 IoCs
pid Process 3404 Auditor.com 4344 Auditor.com -
Enumerates processes with tasklist 1 TTPs 4 IoCs
pid Process 4920 tasklist.exe 1728 tasklist.exe 2408 tasklist.exe 4068 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\PlasticHugo Setup.exe File opened for modification C:\Windows\LeastSkype Setup.exe File opened for modification C:\Windows\PlasticHugo Setup.exe File opened for modification C:\Windows\LeastSkype Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language extrac32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Auditor.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Auditor.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3404 Auditor.com 3404 Auditor.com 3404 Auditor.com 3404 Auditor.com 3404 Auditor.com 3404 Auditor.com 4344 Auditor.com 4344 Auditor.com 4344 Auditor.com 4344 Auditor.com 4344 Auditor.com 4344 Auditor.com -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4920 tasklist.exe Token: SeDebugPrivilege 1728 tasklist.exe Token: SeDebugPrivilege 2408 tasklist.exe Token: SeDebugPrivilege 4068 tasklist.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3404 Auditor.com 3404 Auditor.com 3404 Auditor.com 4344 Auditor.com 4344 Auditor.com 4344 Auditor.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3404 Auditor.com 3404 Auditor.com 3404 Auditor.com 4344 Auditor.com 4344 Auditor.com 4344 Auditor.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4128 1544 Setup.exe 83 PID 1544 wrote to memory of 4128 1544 Setup.exe 83 PID 1544 wrote to memory of 4128 1544 Setup.exe 83 PID 4128 wrote to memory of 4920 4128 cmd.exe 85 PID 4128 wrote to memory of 4920 4128 cmd.exe 85 PID 4128 wrote to memory of 4920 4128 cmd.exe 85 PID 4128 wrote to memory of 4828 4128 cmd.exe 86 PID 4128 wrote to memory of 4828 4128 cmd.exe 86 PID 4128 wrote to memory of 4828 4128 cmd.exe 86 PID 4128 wrote to memory of 1728 4128 cmd.exe 89 PID 4128 wrote to memory of 1728 4128 cmd.exe 89 PID 4128 wrote to memory of 1728 4128 cmd.exe 89 PID 4128 wrote to memory of 2808 4128 cmd.exe 90 PID 4128 wrote to memory of 2808 4128 cmd.exe 90 PID 4128 wrote to memory of 2808 4128 cmd.exe 90 PID 4128 wrote to memory of 2428 4128 cmd.exe 91 PID 4128 wrote to memory of 2428 4128 cmd.exe 91 PID 4128 wrote to memory of 2428 4128 cmd.exe 91 PID 4128 wrote to memory of 1932 4128 cmd.exe 92 PID 4128 wrote to memory of 1932 4128 cmd.exe 92 PID 4128 wrote to memory of 1932 4128 cmd.exe 92 PID 4128 wrote to memory of 4876 4128 cmd.exe 93 PID 4128 wrote to memory of 4876 4128 cmd.exe 93 PID 4128 wrote to memory of 4876 4128 cmd.exe 93 PID 4128 wrote to memory of 4040 4128 cmd.exe 94 PID 4128 wrote to memory of 4040 4128 cmd.exe 94 PID 4128 wrote to memory of 4040 4128 cmd.exe 94 PID 4128 wrote to memory of 1920 4128 cmd.exe 95 PID 4128 wrote to memory of 1920 4128 cmd.exe 95 PID 4128 wrote to memory of 1920 4128 cmd.exe 95 PID 4128 wrote to memory of 3404 4128 cmd.exe 96 PID 4128 wrote to memory of 3404 4128 cmd.exe 96 PID 4128 wrote to memory of 3404 4128 cmd.exe 96 PID 4128 wrote to memory of 4728 4128 cmd.exe 97 PID 4128 wrote to memory of 4728 4128 cmd.exe 97 PID 4128 wrote to memory of 4728 4128 cmd.exe 97 PID 2160 wrote to memory of 3372 2160 Setup.exe 119 PID 2160 wrote to memory of 3372 2160 Setup.exe 119 PID 2160 wrote to memory of 3372 2160 Setup.exe 119 PID 3372 wrote to memory of 2408 3372 cmd.exe 121 PID 3372 wrote to memory of 2408 3372 cmd.exe 121 PID 3372 wrote to memory of 2408 3372 cmd.exe 121 PID 3372 wrote to memory of 4052 3372 cmd.exe 122 PID 3372 wrote to memory of 4052 3372 cmd.exe 122 PID 3372 wrote to memory of 4052 3372 cmd.exe 122 PID 3372 wrote to memory of 4068 3372 cmd.exe 123 PID 3372 wrote to memory of 4068 3372 cmd.exe 123 PID 3372 wrote to memory of 4068 3372 cmd.exe 123 PID 3372 wrote to memory of 2472 3372 cmd.exe 124 PID 3372 wrote to memory of 2472 3372 cmd.exe 124 PID 3372 wrote to memory of 2472 3372 cmd.exe 124 PID 3372 wrote to memory of 1920 3372 cmd.exe 125 PID 3372 wrote to memory of 1920 3372 cmd.exe 125 PID 3372 wrote to memory of 1920 3372 cmd.exe 125 PID 3372 wrote to memory of 1580 3372 cmd.exe 126 PID 3372 wrote to memory of 1580 3372 cmd.exe 126 PID 3372 wrote to memory of 1580 3372 cmd.exe 126 PID 3372 wrote to memory of 4392 3372 cmd.exe 127 PID 3372 wrote to memory of 4392 3372 cmd.exe 127 PID 3372 wrote to memory of 4392 3372 cmd.exe 127 PID 3372 wrote to memory of 1724 3372 cmd.exe 128 PID 3372 wrote to memory of 1724 3372 cmd.exe 128 PID 3372 wrote to memory of 1724 3372 cmd.exe 128 PID 3372 wrote to memory of 2132 3372 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Elderly Elderly.cmd & Elderly.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 8330753⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Knights3⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "COMMUNITIES" Expiration3⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 833075\Auditor.com + Teacher + Belkin + Streams + Urls + Reunion + Le + Auctions + Suburban + Lotus + Cio 833075\Auditor.com3⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Die + ..\Folding + ..\Compete + ..\Bukkake + ..\Newer + ..\Common + ..\Relying c3⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\833075\Auditor.comAuditor.com c3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3404
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:4728
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c move Elderly Elderly.cmd & Elderly.cmd2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "opssvc wrsa"3⤵
- System Location Discovery: System Language Discovery
PID:4052
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\findstr.exefindstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"3⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 8330753⤵
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\extrac32.exeextrac32 /Y /E Knights3⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "COMMUNITIES" Expiration3⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b 833075\Auditor.com + Teacher + Belkin + Streams + Urls + Reunion + Le + Auctions + Suburban + Lotus + Cio 833075\Auditor.com3⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Die + ..\Folding + ..\Compete + ..\Bukkake + ..\Newer + ..\Common + ..\Relying c3⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\833075\Auditor.comAuditor.com c3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4344
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 53⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD595799d47b08d0a83c2315ff39e062787
SHA19ea6ed4fe71050d9ca599f9c237f4659bc2e4e44
SHA256cbe7febb2b721f7468e69f91832b2fce3fb464b6196a7fa5aea40cd3704aa8ce
SHA51221734937fcbf39c25269779f188a451a7aae1da3c116403f8c0cfa312c865937fa1df44e982e1891a5fc91af6253f259d62ca5b97db1a60752f0b9708ca48853
-
Filesize
925KB
MD562d09f076e6e0240548c2f837536a46a
SHA126bdbc63af8abae9a8fb6ec0913a307ef6614cf2
SHA2561300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49
SHA51232de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f
-
Filesize
471KB
MD5c16f1f2ddd12c58877c0403595ebc291
SHA181a9dfff63aa34b20f335cde358eec06b4d6ba42
SHA256d9f559ca6c3b4302b70851a95c3fe1bda2ab040b669f2665d6116b3f535ecd4e
SHA5127b01fd23ab0f07fa13decfe44130b02ff298c237b897db4697fc4383635e3da3deab5bbf70deec68712db29ef76f1c7af21d5ff1fceb9290c23bc6dd76930d45
-
Filesize
59KB
MD54f989fe2288df507824795891db37ad3
SHA104d1c1e8b73e7505cda1ee59ff334c9e4f90c98d
SHA2565c9fd76e22bc14be1a78ce29eaf0c7ab3dfd202c90d00af713db269215fc9705
SHA51216fa0ccd15f2c7fe41af7ca8e75b0336412e1150a12b927b1f8bc14abc3179a34a60340b530046880c63c9aa54c968bf1b9540cbe6d79248981caf7ca1a49d40
-
Filesize
87KB
MD54a74fe9a414178e272a121e0aefb4fde
SHA161cff1e2e68f659fa655353155fe8e688dcd52e2
SHA256a6f85ed9eaf661638dac027224afcc4435be462c1102eb84ad3557b362b5b027
SHA51294bd356a202d4d27a946a7131b8de9c05a7ff11f2c7ead65381ed2550f2014cda1ac27004041c5181a62ea68f67a051b1312cdfca013b93b8bda9c0295f40430
-
Filesize
62KB
MD5a853f8ba23ee9006672430226faa209d
SHA1e5819c98ab22d6821551e8ed79c094bf4abbadd3
SHA256ebcd770dd258f448ffc4ae24ef89100e8b0f320d0299e64589c91b4ed23bde73
SHA512bff70b15f1a6ae193bc85b1fe6c5e64bb24ea2136fd9f18fdc8292cba1bfb02c371593dceb80fde5708d061697c37632799ccd8c0784899cb0e8a716e805b000
-
Filesize
14KB
MD58bb1164f4f404739f54cd316c8e8b36d
SHA1655244bf3b18ce2f4fb36c0e8880fc8df91f75f1
SHA25689e6c32c015562cbbee1f2845baf10cf0050c4b0d03922b7118c14267a12d098
SHA512fda9a87c772c0fe932bb20d1e4c793e18c2412993b1948dc210bdab1a09e565fdc16887897386b46449c2b9854f9aff24610ee892b2a33ebd15ee465e2ce4929
-
Filesize
62KB
MD53343bab5952bde5f6e5f5e0aeffbfaa0
SHA1190de1b9591fdf2a6efc81d101c4cfc10357216c
SHA2563476a2a20531ed13d054a62d54edbc1082565ce9cfb97997e14a88c503ef5925
SHA5127863d4da0542994587cc248ba2fc97ac3e4d59ff6eef67b5743f2ed7499ad6440fd1976c081477222eeb99a8e1806424b6f96aa04284a6308972449485d30f4d
-
Filesize
96KB
MD5ea7349cd6b023cbcb6e7b35e7f743ca3
SHA133f60bfd3ddb6d06f52ffb6a0b500c8228815e17
SHA2563690cf2a6d0d0764d8900a68684c0681ae1a0be0fe83de235bfe330281c94849
SHA512c21f1e445cfcd19760aa7ab0ff2ad769b6a79657f88b4a280ba8cd8efc211f12a4465f9feefc4475e772f803407ddd586bf075cbc70a3bc37d1be9ccea42a38e
-
Filesize
55KB
MD5e8fd86d8f17e2f3544e3e1fa98d3099c
SHA131df18ba4beaefccc790465ea9a6977fc362a887
SHA2560986e457bd65e8bd51df4fee0d40121eab968c4695810dd9e3b185cf94e30d4a
SHA512647749daa7cc00d8abd6ff4bf176478ee998dbd0c78931d0f1ddf5e269465c0e7d00f7c7f0005be021bd1694316422a08b48991370d62bb233fd7c5e11186270
-
Filesize
21KB
MD52b346f7f697da242fbbdd4cac81832f5
SHA1c42977d8b070b85e83a432758486b1d95d26f53f
SHA2566a3af83883e8aede7285e3dec81544a800a0581e8f3200e20c5379e0318208db
SHA512d456fc01413bd33f935919ddb2c2baffc89d88a201cd035198de1cd82993473c9d6594ba489bc5a0d5ca8cd6f699101f8ba58bcf2f476b9a76602d90d9703c99
-
Filesize
1KB
MD53c2f564f0e6cf845f275c0c260d8e2d7
SHA1cd64eec775ccfcfbf40eac824776e7b916c0096b
SHA25677d4e41b168f50fd0602a36175189fb9824557dac9c8e7d8069ad350ff52a70b
SHA51229b9feaab2f140fd5fe2e3dc1b93fe0550f75d7245a02144eef320b2a56df5b2e49bbb8368d63fe9cb7a4cd4821959c3f1a5dbc172bd75dcd2551f79d1e66716
-
Filesize
74KB
MD53eb6148b77b49e7e5d666f6735c3e4e0
SHA1080bce92426eb4784ebfa7ce49740cf9e5666c06
SHA256a715dd8459669aac579b6f5dcf0eb41348d6f5f72696a51dce56e524f9cf3715
SHA512ab9476c117864d20c326cbde4398b4df7631181e5de41e266693adcad40ea7462b31376fed556feb272f4d88c63b31e0a67e708ac6b809601e4d473e7bcf1976
-
Filesize
477KB
MD5c51929f6b56df082636303912abefccc
SHA1fc9b0adc28d41c69628ca6c8d5f6faffd59bb801
SHA256c6d95cccaf4295a357fa068f16094307252c0cbaeb0e07ed77d8c22ae7021066
SHA512d05422d3c7e2b5ebfde8f906a8229d9f74c390da3dba2f692c76c49e76be3d92e8139f1227bd0b8f82a6c1da637a7f306fec47c8d98047cd813d973d72bb04a7
-
Filesize
55KB
MD554faecf50af8404b2420efc817866573
SHA199bd647c28703db2f2bc2b477bf4406de6ae4bdb
SHA2567590140370bf630a10c5efc54170d737f33c30c8934d88d0613b6a3c03949a39
SHA512e2709e435653a561794a25a17b8210ca3e383199ed9b9e016dab76cdd3bc80898bf14a76ee69b5ad2d9e71b79cefda78f20fc717c0b7afa20911847c5170dbc6
-
Filesize
129KB
MD512b3dc27d331d7fcc10fbe2b079cd7c2
SHA1b8c0ac1b928aa153f5787f096f9ba49a0ce6d3bf
SHA256c1dc610ae31e6897175be00530632ba1aa78f690f7ad4d80d92f9b97c0d613f0
SHA5123ce8054ec9c4b85e2bda8feb7b822a02c1c43736252f47916916fceb52ba675dcd2ca9cff59403a50eda1eb5d95ae87a66c591933fdb07b1b979b3365b6764c1
-
Filesize
89KB
MD5f3c461d3382ca719ed889794a105969a
SHA19f809658408b124da902b5f9ec804e63959d3115
SHA256a135bad5fd34c8daf8e37f7991d50b250c4c52fb1eb8188a022161c0f3860050
SHA5124a74f6f5d89a44b2929a5d625fa3963916f3b15a5073c98b20f5ab69422b12aeb7bec40d711e440f538812438869254ec7cf323b0c2e9331f04e47e50f92fe30
-
Filesize
33KB
MD585710221e954089fe03a7e0a36d37961
SHA14661d6e6206d5568341e42531cf425efbe260a70
SHA256672e5aab02ffd641ba59de12ab059bcb1b9d13c96497d993d1de241b8fc23911
SHA5123c348b4c455990ebc5f7cd9736f8b467245f4d8e57846d5c0ba6509615c9c1207493f1947c4a86c0beb78d4d09fad5a166fde73be42c0a3d7565aefd064c6e9a
-
Filesize
99KB
MD523f57f85b7751c2aa5e2bcf14b7a71ba
SHA1c2f1ebd04828e5283bf1f16b0a2be345fbfc9afb
SHA256c1f4c250e2ec3bca004a576fc0bb2406c6969cd987d9dbd384353536ce7c30af
SHA51238ad408585127d28eb5e77a3089f0db00cf792d30f67b7ef260093a63f36f0ffef20ef8cee6fd4961ddd8543baa738602c3a337b74ed7f2ebbbffde84bd5d799
-
Filesize
136KB
MD5c809040cbe80646e91bfd8ac5b14b5ce
SHA160f9672e2a347d9c8f544e7ffd1ff5092a09de69
SHA2565cf443b3b203b24e54693b6d8d1542573c26df58db51078e5b9f8c0bd3f11f4a
SHA51206bf7dc5d1eea9b3f75f544ee32ca21e6a9c64ea0c5b60ea355e117ab836037e557d3beefa2cd3ab9996cd20ee1d8d0459b687950c74e8a7da182707542a7110
-
Filesize
118KB
MD5d5604fd884b523a093525077b879e755
SHA19da375a5441c7387231fc4f0368858cba1922880
SHA256e251d31724ca24a174ee34b140adcf03120532931c7efe59a56283d79b58001f
SHA512d5f0d895f25d445cd6711ff6e9502af7e6ab7a08ca7bd0cb49a1bf556f14e081d42d200fe4202d9923f5b7b7abc43388f902dde9cc10f16e259652aa06c1b598
-
Filesize
96KB
MD572878bb5088e9d99d1a1595bff6bbbb1
SHA1edf4f87d2e866f86c4456f626052cb486a742bbb
SHA256f7bc585dc9221cd5bdaae306b55391c0736ffe0bae9414a1545d2d2b1663c860
SHA512793c261032a8d6f90f119de6f1bc28f6b64809b8ff66b39db704f2bfda463b90f6238b9289cfa1dcc143e21c7e13be61c205a9282ffcceaf38ffc696cc4b3103
-
Filesize
130KB
MD5d8d7e8a8e845dfd84628cfcb956161db
SHA104385cfccbacfda98a50cbc3e6d2eec3243faaa2
SHA256d56964936063f21b78a588bc18d0cd790591962bbb6017fc8044eda3acbb84ae
SHA512184516d98bfd5494bcd23940f422c13dd269646ce5398db468925d7c513639a35604cfcba135e0430383615ab93e52ad5882a56dc7649a2ea26e9ce6e2de65b9