Analysis
-
max time kernel
208s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 15:18
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 3312 setup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133823783297103377" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 3312 setup.exe 3312 setup.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe 3592 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe Token: SeShutdownPrivilege 4240 chrome.exe Token: SeCreatePagefilePrivilege 4240 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 888 7zG.exe 4304 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe 4240 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4552 4240 chrome.exe 82 PID 4240 wrote to memory of 4552 4240 chrome.exe 82 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 3520 4240 chrome.exe 83 PID 4240 wrote to memory of 4044 4240 chrome.exe 84 PID 4240 wrote to memory of 4044 4240 chrome.exe 84 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85 PID 4240 wrote to memory of 3552 4240 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/16NqT6o4FBRPqGF8UbZvmPpZrPHgKhVpb/view?usp=drivesdk1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff874cacc40,0x7ff874cacc4c,0x7ff874cacc582⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1724,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1720 /prefetch:22⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1876,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:32⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5116,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3196,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4864,i,3766376057983679203,1682589586214035562,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4564
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2284
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap1071:122:7zEvent317311⤵
- Suspicious use of FindShellTrayWindow
PID:888
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap19645:110:7zEvent235791⤵
- Suspicious use of FindShellTrayWindow
PID:4304
-
C:\Users\Admin\Downloads\Satup_32--64Bit\setup.exe"C:\Users\Admin\Downloads\Satup_32--64Bit\setup.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5b4397ecbd0b02b1309c46ec1eb70c22e
SHA16da1a1a0e196c134bbdae65902f973dd2220024f
SHA256f3385c727b612082fde0e0536d07b6fc5c5f33e126b9fe4127bc37ea2a03a819
SHA512db8c4da51acd6f0566162a996dd79318858afa5a3e2c6a93290014ab31fcf11541d1da8cf78d4b519c0e032e43a3ba914f35e3662e3982a20068734211743dc6
-
Filesize
408B
MD52c42d2a5fd3988e1e6fc3c43cedf8373
SHA107c78e61123695cee7c27fd7a4688eec6c147166
SHA2566a519984c0ae9fd7137dd09d62644d419852956caf83a89d7709d7ff87bfd5ed
SHA512d1be3ef27b184575d72eeaa04682a29acac665154f998e535c36df66ff9632c8eb9639c245b79d8d0244d293e289b475b12fa151478c920db981908a97466ac2
-
Filesize
5KB
MD558105ef2e062e3695e103a55aed25baa
SHA10067bb2d5850d8d57ceecc7d11b0a5579d1d0113
SHA256b7e04b0a20523a4bf2321faa4e76375f1655ddd301d63af9629bfd7619782025
SHA5126da070882e52cd0e5c46a03760b302b91a141e9a937d10bf95f1bb6da4cc47805ff8ffc40b0f07b886677e04e7658e04276df11d4148e160bec1f8a76dd2a266
-
Filesize
6KB
MD57dda623dcc2581ec9850657f3ac8b3ea
SHA1255d651ca8b26b4096a4add71dcd20643806d46d
SHA2569ff370d218578ff725c4e61aee6f4bb8bfadb05f365a86971ec76c2b432b7f27
SHA512631018ca0a3068527905b129827c9d70cd47c0330e645689f2415effbf249bb93ee129527152abe62a1cf796efa2e238b20e0ccd0f29af2e6612c110279b7497
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5a4834ccfc0e1746cd640c280840616c3
SHA17f89d66e2d4f44e30d732120b6ed4063d6644105
SHA256477274a61e83f1aa376bc3f256367cd653d0c6a597257549ef60add4c4d8d594
SHA5120a492e0254ef27e0abb652367a214f863b390535c39060b6831485696db0a6252bf997ad9073996fb8de1fe6e82746d20a24cae6a37c1d634d9ab9cb89f1538b
-
Filesize
10KB
MD5d7919440079fc3a086a342cb76f7bf47
SHA11c5b7d0ccd1d553f030d6b5cd1b2a03cdb940866
SHA2568b4913749014bd49e384d823d92d960a09e5cb758bfb3fe02a61b5eec73d6d81
SHA5124038ee2985c9d2441615cccdd00dd8ca21b4e0f51d00102d55817164fcad53e9472638899f65d09fbaf8f871b91fbe1c213adfc5077b488181dee395f86e2f50
-
Filesize
9KB
MD56c52447b605ed7de7c7163afbc3f072b
SHA12babd757eb09d47c870d8d9e5825dcd41dc693da
SHA25639b826e25bfa91fe03033aa189b9d5235e97af9cd82df109ef26575728637d8f
SHA512c80f47ffb29878740d097106b943c7add1b8377068f3aa744eb1dc8c17d82cb1e28da752316344855692806392f8a244d6cd4ba857dc252370a1f39e9e3a64d6
-
Filesize
10KB
MD5805af7b76cb4ccdfc51aca3e4fb3ea18
SHA15d70b768026c0d2c611d53bdaa6aa7cad7541d07
SHA256c07c8d4fe58945df42984976526e40b860531f67403d79fd3910ca14d3764010
SHA5122d507e9986ee11e3c838e8d067b95df70223ba86ed8ece91eea89374d19ef6111c19e2f5dc5b6d0880e36f46544126f946bb6ec7f602744af99634314894315b
-
Filesize
9KB
MD5f606b99218e9987b76992798c5a52f41
SHA1d568bc812055cbb388d56cc4b398d1ed5bcf00e6
SHA25649db9b53656c88abd3d394cb7dac02c5f7f625ce7f815c387acebe1f13bcb4ed
SHA5127f0a6dd1e0deb4bbad0df03721fea0c94b7b433fcfc359761cd36dc91bec650c3162d26496b476ae7ed71ce88e08c14fc47d75cfebd029b80ebece9888a7c832
-
Filesize
10KB
MD5ae8a1bbc4fd1001d38321c30aed3d7f1
SHA18eb4f1090dc994ab7d41f78568d48914ad7f6c59
SHA2569982ced794f3043864cc89698aaa8471f3dac2da8e3d7e3eca9e8babc0f80b62
SHA512affdda0ed5df5a2d2652e8913674cbbacec1c4fc7d29755ae1ec695897c3b85691e3884e265c6b98373148e0e5eceac24fd842dec9010dfa7823e3af986dbfd4
-
Filesize
10KB
MD508001b3178e048050abd4afc65fa5c30
SHA1d0607aac922b204d91ed31d8965edb777932c091
SHA2568ba05171c3a5c6da87633c086a4f00201566d813dcc756cb775ca81425289140
SHA5120b5802b72941bd02f6bfbbd35b7ecd40adf2401403531e14b31dfc95590c909b1f2d80b50a24a8d0277f7c7c74a5b17479c0331aa5ebb6660b16be0f902ed578
-
Filesize
10KB
MD55155e2b9140c1c061d0ccf801c4c1797
SHA123d2b171217a2536deb105e8aae0444e40df15ba
SHA2566c80003baa46179d692af9ac1cb5296865d3cfade750b357e0d52ba62a4f3f96
SHA512dc987373b705fff481982bdedadec4cff8543a97531062a2c069645106c79d9eceaecdb3b0166d84ff8fac699a8003b2e7071a4715044839101aafc09a0753af
-
Filesize
10KB
MD51a3d08d6642b8acc1a7d1a6291ad7846
SHA149b5efcdbb8db1380ec26b0e0dc22c8a41a129c2
SHA25619dd7ebfae2c91fe807278285ffb3b850039c967883447e882329b65ba086892
SHA51207f880dddee6b2dfa172633c44d8936e4b036265838ffa3c7b1851fce687a94c66c5d5a4c012d430bb318c333c55835aa5f7c4dd52fa54be8dab256d678dece3
-
Filesize
10KB
MD57e2e924aea20290aa3818971268d7845
SHA1cbbb95ca763bfb215444975a5e952ead6b7c4cbe
SHA25697a6df2f8460869cd9297b8008aed41c72a7fe90954de4dbeb09643a2cad5172
SHA5127c83a6b1a98e7d03f7d596fbd86191ec620df9ce972ee10e7b2b4ffcbd8ed64ec380db4e48377e1f8d340183b978ae7af1918bedb2b52184151dd7f24809d3c6
-
Filesize
10KB
MD5d083ec87bc02a5ac3100d9d60b9b1db0
SHA15ed7db512f8ad2d012fda8858499d8d0a9b6d46c
SHA2568e0dda6091680c4b989700a422e2fc6fc6c226e234f376db79ca001f1cc08dd9
SHA512ea9a2636184b804926ad81abee5447ffc8a20747e4c00ac4f1b85d929068180ec07b809c04b6dde1d37d8efa2070b54904992df95c6c03b91fe1788d1073808e
-
Filesize
10KB
MD51e7d84d4084b398e213217dcb6183eff
SHA1d2fa8cef62a2fa94b86747a0e6de34c89aa4b29a
SHA25653b2638c1e16305e5420ce73faa82ca455b1b5a51a8693cd007a52862b943600
SHA5121255e2e5c8efcaab685705c76ff72939be71e10e1eb98d0e09f38175dd155dac8f9c33fcacca523c88e9dfea6bb27bc7a8c8dc3a64c3353753ffcf2f69777390
-
Filesize
10KB
MD5ddcc3f598ceb8ae3b138c549a0ac2b14
SHA1ea36193f371e68853045195f8cad8c20c23069df
SHA2564444369d4a0616bc0245a34b433cef5248975f80c2c371a53fe6912b06cf2f39
SHA5125f61f1cb6389ceecbac0e6f0b0591a758f65c953ad78c8dcbb5ecb8d4614fc1fde6c7d9c439387c5f46fbda3d78c7fe1d7fa2d44a95c4e243bb459c823e8cbeb
-
Filesize
10KB
MD506f3c3b02793ff7fc1132db2a47f3a04
SHA11871aa76646a041a24ca63a9587bcf17d66d86b0
SHA2563d681077b57e6482c70a2ce5f98034b4985a27972c685f4ea35b4989b12abe58
SHA512e2e585a4cc19bcb9fda56172f0de8269da5820904e3a33bfd3a3b6acfa46335ce2ed8de9bf6fa0439e508c5088d11a981d816fab3f39abdb1e0cf7ba1e54db06
-
Filesize
10KB
MD56097660f7d35514bce149057b3803eb6
SHA11af5bbfbde3393e4914a8f2eb3c746ad054d94c4
SHA25674bdee8330bfb9e38eb8c494d4ca1905d9126c303f8cd9b16b8b91f049e572e6
SHA5120d870bfae9e7351f23e672d2da4f69fa0945de294afb8a01a88c1cf97050cb27d9ffd559932e1227f4a0d9dc18cb768af969b225b0c2023a2f514c505cd4e41e
-
Filesize
116KB
MD5b7d8b30f6983962cf00ae9c27b2c1f52
SHA149d36ce564805e892acbc860292d0d805f7da10d
SHA256cf9386c10ff20b2583aaff2892c26a39fac6c3d66df986b7d257d890cbbd484f
SHA51222359fb84ab63a2a972feb4715c5bac46acf40b6ad32c20753ab1d3594b4490847ae8e0844c74fb4fd8ef9e5c5815d1c77d2cd9e0b303029b3a554f2116ede90
-
Filesize
116KB
MD5479cf5d691d24e9e55745010e8aecfbe
SHA1250064e1e329743c7bca9d037f052948640e61f8
SHA25691680d8ea19f22c9e34159902c6fd7524ef98444cd2769fe54345c02aa361308
SHA5124f63a0af7b992b812b3ffa52c2cd5cbd4e9e143d1b78597dd04da3beb1477fa61e20f89c9acfe3dd3e24103caa7f9449e7e48448c9bf18c8d04ff1d77f410349
-
Filesize
2.1MB
MD5035fbf44e7c8338b706d9c5f8a14ac52
SHA160aae6396b76ffcfeb7a5deb794de94dd5e8ec5d
SHA2562eb1ca64ee7fe04aa50846bc791043f4c21028a12ef1cfc1a920204af7955c38
SHA512ce4b85acc5cf401984a94d2324438337a8db595160de0a6b5bc370d2c254355a92b0634d1f7a762816064a7ac557e1cde3e86a564e63f6247d245eda0b50ae86
-
Filesize
829KB
MD5b85320d0bdf33386939897c8d74f8be2
SHA110ed0459305f425ed29312689c5608edcfbb9d2e
SHA25626abc2618cc151e22480967bbad8ff71a12216e97361dc20c892c68c5c7b26c6
SHA5129d28357f0794f2bc5ae6b39eaba025d2001e1c0665127ee7f49ecbf5148fde39586d1e27f2c093820b05aee0c0ccc088744a04544b5dfbfca35057a46d0e59c8