Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-01-2025 08:21
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
setup.exe
-
Size
71.7MB
-
MD5
6da280fb9c2da7913e9c801b4de02f47
-
SHA1
119298d4791194344e819d512638165a1517525b
-
SHA256
8e478472737ee141955d91e3c15c370ed92914eba06b21ad84fe056026b69e99
-
SHA512
78f66c181d572bd0a12b748770578bb85b8c447c3fbc686d19b61bc226f185f512b6a3176fd04f147a5531fa281804b5fb393c3d30d0e6cd4a131d1c2ab5fe86
-
SSDEEP
12288:FRjEparvru3GWf+6vk7A5oI+3qYc40Y+wyNdl3sT9xvgihDqOn0JroELnF0soYqn:/Eaq3GWZvkWoQk0y
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
https://swingybeattyz.sbs/api
Signatures
-
Lumma family
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133805390615907812" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4476 setup.exe 4476 setup.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe Token: SeShutdownPrivilege 2804 chrome.exe Token: SeCreatePagefilePrivilege 2804 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe 2804 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4476 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 5056 2804 chrome.exe 81 PID 2804 wrote to memory of 5056 2804 chrome.exe 81 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3320 2804 chrome.exe 82 PID 2804 wrote to memory of 3660 2804 chrome.exe 83 PID 2804 wrote to memory of 3660 2804 chrome.exe 83 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84 PID 2804 wrote to memory of 1388 2804 chrome.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4476
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0d1dcc40,0x7ffd0d1dcc4c,0x7ffd0d1dcc582⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1784,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1776 /prefetch:22⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2040,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2108 /prefetch:32⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2196 /prefetch:82⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3564,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4716,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4776,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4424 /prefetch:82⤵PID:3560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4752,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:2748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5056,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5052,i,5978816469429875835,5370939536329887233,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5344 /prefetch:22⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54339d9fe59b932927123aadfe414d0ff
SHA1142a1e1551d7e6d9629f843439a64bdbaed4ae0c
SHA25602b4f9b55c90246b3506a415e865e9ef2a29f4940c8d5f9599f73b2f6a7962b4
SHA5127bc3fa6229a8112d9f5b8493aff3da781df351d565a87589188799d1e7f2aa36528057c0948bd8c50f0d86a1c83b95799ea60d3569de52df9c3501c4db09a5e3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD573de9893f86496634f7509703fc527ee
SHA1af4c36b877f0ecd4e45e412af94c32bc2c82eb2f
SHA25668aeab830cb212e0948fd81b77ef66d97a491fd082797acf854464ef6f239b9a
SHA512304928098e387a4a3d714325cb8309d7300b6980ea628fe4a153d9173ce9d96fc4a4771512ee94a51aa5a7fb7b321412c7a376f099eeeef3f8e96824b48138ec
-
Filesize
9KB
MD527cdc80243a97aae5465268da23205c6
SHA1d9ffa8851bba595743e3c03e325a5431b7274a6a
SHA256b626eb2c4a35b28ba348a225e9d0de89e1256eab0bcc1cae53127cad6d29b53b
SHA512899f16177d3ac5b953a881ae5923d8280dbe482e5e50d94029639fb722d9ebb1f6223932945dfbff3ce54b1401b77b84ba9b026398415ebe75ee909015605ad7
-
Filesize
15KB
MD5b52c1b1b7fe9579358ca8d233ed84fe3
SHA1419cb0b7bd2a7ea26de53f827f03e8f306c686e2
SHA256d8ed8e096a143918934602b027b4c49aa687f8a1ef7a79bbd7e5a0d9243c4f5c
SHA512d19a448505923a79d1d17ce2471157abfb661b68bd587bed99dedd3d334664f055b214f97d22d9550e7536e19f93cd22fca6c09d8321a663087f7997f148b7cf
-
Filesize
231KB
MD5b2bce96c0222cab9857e38263d71bb64
SHA177eea127a383ab0d50c58d0bdb4ee9c5588ce490
SHA25648c787b66b9bd107a533a4aef16dcc06a01b474174df2301f6682d6474f2901a
SHA5129af64769b1e143bc6d9cfb109536fcd8b2259f8715e80617a013836fd33a445579f158f7f4cf06ccd0723e09c71f61ceaa85a42f631f89df6bbc80be8449f28b
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727