Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 03:10
Static task
static1
Behavioral task
behavioral1
Sample
ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe
Resource
win10v2004-20220414-en
General
-
Target
ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe
-
Size
5.0MB
-
MD5
a130eb93419de9f19d0c66aeaaf184d5
-
SHA1
033f9d97a55a7ff64209cb60ba14afc50d5f707b
-
SHA256
ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb
-
SHA512
536a8e6b0d9f5cadb0a857aaf092fe73c88dedfa61ba7ff79212a1e14c8c7ba9216c08ef3afdfbfce2159cf92e39e9ad3d079fcdf0b93cd8ebfe3e3075030f53
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Windows\\System64\\1svnhost.exe, explorer.exe" ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe" 1svnhost.exe -
Executes dropped EXE 8 IoCs
pid Process 760 1svnhost.exe 1116 rfusclient.exe 900 rutserv.exe 392 rutserv.exe 1220 rutserv.exe 696 rutserv.exe 1496 rfusclient.exe 436 rfusclient.exe -
resource yara_rule behavioral1/files/0x000700000001334b-68.dat upx behavioral1/files/0x00070000000133d1-69.dat upx behavioral1/files/0x00070000000133d1-70.dat upx behavioral1/files/0x000700000001334b-74.dat upx behavioral1/files/0x000700000001334b-71.dat upx behavioral1/memory/1116-75-0x0000000000400000-0x00000000009B3000-memory.dmp upx behavioral1/files/0x00070000000133d1-76.dat upx behavioral1/memory/900-79-0x0000000000400000-0x0000000000ABA000-memory.dmp upx behavioral1/memory/900-80-0x0000000000400000-0x0000000000ABA000-memory.dmp upx behavioral1/files/0x00070000000133d1-82.dat upx behavioral1/memory/392-84-0x0000000000400000-0x0000000000ABA000-memory.dmp upx behavioral1/memory/392-85-0x0000000000400000-0x0000000000ABA000-memory.dmp upx behavioral1/files/0x00070000000133d1-87.dat upx behavioral1/files/0x00070000000133d1-89.dat upx behavioral1/files/0x000700000001334b-94.dat upx behavioral1/files/0x000700000001334b-96.dat upx behavioral1/memory/436-97-0x0000000000400000-0x00000000009B3000-memory.dmp upx behavioral1/memory/696-99-0x0000000000400000-0x0000000000ABA000-memory.dmp upx behavioral1/memory/1220-98-0x0000000000400000-0x0000000000ABA000-memory.dmp upx behavioral1/memory/696-102-0x0000000000400000-0x0000000000ABA000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 760 1svnhost.exe 2008 cmd.exe 760 1svnhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run 1svnhost.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\System64\1svnhost.exe ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe File created C:\Windows\System64\rutserv.exe 1svnhost.exe File created C:\Windows\System64\svnhost.exe cmd.exe File created C:\Windows\Zont911\hostbb.zip 1svnhost.exe File created C:\Windows\System64\rfusclient.exe 1svnhost.exe File opened for modification C:\Windows\System64\rutserv.exe 1svnhost.exe File created C:\Windows\System64\1svnhost.exe ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe File created C:\Windows\System64\vp8decoder.dll 1svnhost.exe File opened for modification C:\Windows\System64\vp8decoder.dll 1svnhost.exe File created C:\Windows\Zont911\Tupe.bat 1svnhost.exe File created C:\Windows\Zont911\Regedit.reg 1svnhost.exe File opened for modification C:\Windows\System64\rfusclient.exe 1svnhost.exe File created C:\Windows\System64\vp8encoder.dll 1svnhost.exe File opened for modification C:\Windows\System64\vp8encoder.dll 1svnhost.exe File opened for modification C:\Windows\System64\svnhost.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 1 IoCs
pid Process 1968 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe 760 1svnhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 900 rutserv.exe Token: SeDebugPrivilege 1220 rutserv.exe Token: SeTakeOwnershipPrivilege 696 rutserv.exe Token: SeTcbPrivilege 696 rutserv.exe Token: SeTcbPrivilege 696 rutserv.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 900 rutserv.exe 392 rutserv.exe 1220 rutserv.exe 696 rutserv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1704 wrote to memory of 760 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 27 PID 1704 wrote to memory of 760 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 27 PID 1704 wrote to memory of 760 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 27 PID 1704 wrote to memory of 760 1704 ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe 27 PID 760 wrote to memory of 1968 760 1svnhost.exe 28 PID 760 wrote to memory of 1968 760 1svnhost.exe 28 PID 760 wrote to memory of 1968 760 1svnhost.exe 28 PID 760 wrote to memory of 1968 760 1svnhost.exe 28 PID 760 wrote to memory of 2008 760 1svnhost.exe 29 PID 760 wrote to memory of 2008 760 1svnhost.exe 29 PID 760 wrote to memory of 2008 760 1svnhost.exe 29 PID 760 wrote to memory of 2008 760 1svnhost.exe 29 PID 2008 wrote to memory of 1228 2008 cmd.exe 31 PID 2008 wrote to memory of 1228 2008 cmd.exe 31 PID 2008 wrote to memory of 1228 2008 cmd.exe 31 PID 2008 wrote to memory of 1228 2008 cmd.exe 31 PID 2008 wrote to memory of 900 2008 cmd.exe 33 PID 2008 wrote to memory of 900 2008 cmd.exe 33 PID 2008 wrote to memory of 900 2008 cmd.exe 33 PID 2008 wrote to memory of 900 2008 cmd.exe 33 PID 760 wrote to memory of 1116 760 1svnhost.exe 32 PID 760 wrote to memory of 1116 760 1svnhost.exe 32 PID 760 wrote to memory of 1116 760 1svnhost.exe 32 PID 760 wrote to memory of 1116 760 1svnhost.exe 32 PID 2008 wrote to memory of 392 2008 cmd.exe 34 PID 2008 wrote to memory of 392 2008 cmd.exe 34 PID 2008 wrote to memory of 392 2008 cmd.exe 34 PID 2008 wrote to memory of 392 2008 cmd.exe 34 PID 2008 wrote to memory of 1220 2008 cmd.exe 35 PID 2008 wrote to memory of 1220 2008 cmd.exe 35 PID 2008 wrote to memory of 1220 2008 cmd.exe 35 PID 2008 wrote to memory of 1220 2008 cmd.exe 35 PID 696 wrote to memory of 1496 696 rutserv.exe 37 PID 696 wrote to memory of 1496 696 rutserv.exe 37 PID 696 wrote to memory of 1496 696 rutserv.exe 37 PID 696 wrote to memory of 1496 696 rutserv.exe 37 PID 696 wrote to memory of 436 696 rutserv.exe 38 PID 696 wrote to memory of 436 696 rutserv.exe 38 PID 696 wrote to memory of 436 696 rutserv.exe 38 PID 696 wrote to memory of 436 696 rutserv.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe"C:\Users\Admin\AppData\Local\Temp\ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System64\1svnhost.exe"C:\Windows\System64\1svnhost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Windows\Zont911\Regedit.reg"3⤵
- Runs .reg file with regedit
PID:1968
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\Zont911\Tupe.bat" "3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\chcp.comChcp 12514⤵PID:1228
-
-
C:\Windows\System64\rutserv.exe"C:\Windows\System64\rutserv.exe" /silentinstall4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:900
-
-
C:\Windows\System64\rutserv.exe"C:\Windows\System64\rutserv.exe" /firewall4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:392
-
-
C:\Windows\System64\rutserv.exe"C:\Windows\System64\rutserv.exe" /start4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1220
-
-
-
C:\Windows\System64\rfusclient.exe"C:\Windows\System64\rfusclient.exe"3⤵
- Executes dropped EXE
PID:1116
-
-
-
C:\Windows\System64\rutserv.exeC:\Windows\System64\rutserv.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\System64\rfusclient.exeC:\Windows\System64\rfusclient.exe2⤵
- Executes dropped EXE
PID:1496
-
-
C:\Windows\System64\rfusclient.exeC:\Windows\System64\rfusclient.exe /tray2⤵
- Executes dropped EXE
PID:436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5a130eb93419de9f19d0c66aeaaf184d5
SHA1033f9d97a55a7ff64209cb60ba14afc50d5f707b
SHA256ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb
SHA512536a8e6b0d9f5cadb0a857aaf092fe73c88dedfa61ba7ff79212a1e14c8c7ba9216c08ef3afdfbfce2159cf92e39e9ad3d079fcdf0b93cd8ebfe3e3075030f53
-
Filesize
5.0MB
MD5a130eb93419de9f19d0c66aeaaf184d5
SHA1033f9d97a55a7ff64209cb60ba14afc50d5f707b
SHA256ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb
SHA512536a8e6b0d9f5cadb0a857aaf092fe73c88dedfa61ba7ff79212a1e14c8c7ba9216c08ef3afdfbfce2159cf92e39e9ad3d079fcdf0b93cd8ebfe3e3075030f53
-
Filesize
1.5MB
MD5eac85a4a79a168cb47c0810e23e6d2fe
SHA10e053ed568dc2f07d76b0e006a9e19655797b89e
SHA25686b9593479937ca7dfe9ef6744cc321808c0585b63312cb50952f709c498096f
SHA512b424136d58d266ba045a2ad95efeb8cdc69d77a9442521bf196390b934a7752bf728daeaf2fb3df887abf9c719a2526a8179e368cb228603b9243e3c7148c8e0
-
Filesize
1.5MB
MD5eac85a4a79a168cb47c0810e23e6d2fe
SHA10e053ed568dc2f07d76b0e006a9e19655797b89e
SHA25686b9593479937ca7dfe9ef6744cc321808c0585b63312cb50952f709c498096f
SHA512b424136d58d266ba045a2ad95efeb8cdc69d77a9442521bf196390b934a7752bf728daeaf2fb3df887abf9c719a2526a8179e368cb228603b9243e3c7148c8e0
-
Filesize
1.5MB
MD5eac85a4a79a168cb47c0810e23e6d2fe
SHA10e053ed568dc2f07d76b0e006a9e19655797b89e
SHA25686b9593479937ca7dfe9ef6744cc321808c0585b63312cb50952f709c498096f
SHA512b424136d58d266ba045a2ad95efeb8cdc69d77a9442521bf196390b934a7752bf728daeaf2fb3df887abf9c719a2526a8179e368cb228603b9243e3c7148c8e0
-
Filesize
1.5MB
MD5eac85a4a79a168cb47c0810e23e6d2fe
SHA10e053ed568dc2f07d76b0e006a9e19655797b89e
SHA25686b9593479937ca7dfe9ef6744cc321808c0585b63312cb50952f709c498096f
SHA512b424136d58d266ba045a2ad95efeb8cdc69d77a9442521bf196390b934a7752bf728daeaf2fb3df887abf9c719a2526a8179e368cb228603b9243e3c7148c8e0
-
Filesize
1.8MB
MD5fa4b26c53cfb2661ba072cf8da181b1a
SHA1295f19aad28e80c5e371078989815c612110229c
SHA2563a92288781a1f411f43e59ae32ea78b89997e7a5d1b6f12771f39fb6fa345db7
SHA512f6399c683c41f518a1096c87303758d50d6419e62317bfe2d362f66e5048f81583be12b32348dc095a34c0de0a79867376fdb8fc4677080d665e001b38cbfa64
-
Filesize
1.8MB
MD5fa4b26c53cfb2661ba072cf8da181b1a
SHA1295f19aad28e80c5e371078989815c612110229c
SHA2563a92288781a1f411f43e59ae32ea78b89997e7a5d1b6f12771f39fb6fa345db7
SHA512f6399c683c41f518a1096c87303758d50d6419e62317bfe2d362f66e5048f81583be12b32348dc095a34c0de0a79867376fdb8fc4677080d665e001b38cbfa64
-
Filesize
1.8MB
MD5fa4b26c53cfb2661ba072cf8da181b1a
SHA1295f19aad28e80c5e371078989815c612110229c
SHA2563a92288781a1f411f43e59ae32ea78b89997e7a5d1b6f12771f39fb6fa345db7
SHA512f6399c683c41f518a1096c87303758d50d6419e62317bfe2d362f66e5048f81583be12b32348dc095a34c0de0a79867376fdb8fc4677080d665e001b38cbfa64
-
Filesize
1.8MB
MD5fa4b26c53cfb2661ba072cf8da181b1a
SHA1295f19aad28e80c5e371078989815c612110229c
SHA2563a92288781a1f411f43e59ae32ea78b89997e7a5d1b6f12771f39fb6fa345db7
SHA512f6399c683c41f518a1096c87303758d50d6419e62317bfe2d362f66e5048f81583be12b32348dc095a34c0de0a79867376fdb8fc4677080d665e001b38cbfa64
-
Filesize
1.8MB
MD5fa4b26c53cfb2661ba072cf8da181b1a
SHA1295f19aad28e80c5e371078989815c612110229c
SHA2563a92288781a1f411f43e59ae32ea78b89997e7a5d1b6f12771f39fb6fa345db7
SHA512f6399c683c41f518a1096c87303758d50d6419e62317bfe2d362f66e5048f81583be12b32348dc095a34c0de0a79867376fdb8fc4677080d665e001b38cbfa64
-
Filesize
378KB
MD5d43fa82fab5337ce20ad14650085c5d9
SHA1678aa092075ff65b6815ffc2d8fdc23af8425981
SHA256c022958429edd94bfe31f2eacfe24ff6b45d6f12747725c449a36116373de03b
SHA512103e61a9f58df03316676a074487e50ec518479c11068df3736df139b85c7671048c65bce0ef2c55b3c50c61fde54e9e6c7d1b795aea71263ae94c91d4874e0d
-
Filesize
1.6MB
MD5dab4646806dfca6d0e0b4d80fa9209d6
SHA18244dfe22ec2090eee89dad103e6b2002059d16a
SHA256cb6ef96d3a66ef08ec2c8640b751a52d6d4f4530cf01162a69966f0fd5153587
SHA512aa5eb93bf23a10de797d6fb52a55a95d36bc48927c76fedd81e0c48872745cb7f7d1b3f230eaae42fd4e79b6a59ca707e56bd6963b03644cbd5984f11e98d6e7
-
Filesize
11KB
MD52594fc01ac2488b8f0edbd94575bb0e7
SHA16532ca1b36bbe19ba0986124b7fff81c41152afe
SHA256915c62220b0c5c200f342ca177df76e65c5048c7b61868d32e4efc0dea4adbef
SHA5124e44d5646c752ebef7537833e0bd4fe1c1ca3b89cb11a2a1afeb15e24e74f011c742948cee54e099bcabde3dcd157a5fe25cea0597148008831f547ab5579787
-
Filesize
278B
MD52aae081f3acb9615cd58a9a05a24bc3f
SHA182386fc85643d0aedfddb39a8f628ff1f51de8be
SHA2564438fb1637120602efbe98aca834c02365b9132fe36ffd8c26d7f5c22d9ec1bd
SHA51247a68649c4f01e9d084fa2838a7b79fd9719c4bf1dfa35d6efac92423c7423cd01fb9944610b88c73a82a2968aeb956e127308a4b5cc39fd9d8e1ede1bbff958
-
Filesize
5.0MB
MD5a130eb93419de9f19d0c66aeaaf184d5
SHA1033f9d97a55a7ff64209cb60ba14afc50d5f707b
SHA256ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb
SHA512536a8e6b0d9f5cadb0a857aaf092fe73c88dedfa61ba7ff79212a1e14c8c7ba9216c08ef3afdfbfce2159cf92e39e9ad3d079fcdf0b93cd8ebfe3e3075030f53
-
Filesize
5.0MB
MD5a130eb93419de9f19d0c66aeaaf184d5
SHA1033f9d97a55a7ff64209cb60ba14afc50d5f707b
SHA256ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb
SHA512536a8e6b0d9f5cadb0a857aaf092fe73c88dedfa61ba7ff79212a1e14c8c7ba9216c08ef3afdfbfce2159cf92e39e9ad3d079fcdf0b93cd8ebfe3e3075030f53
-
Filesize
5.0MB
MD5a130eb93419de9f19d0c66aeaaf184d5
SHA1033f9d97a55a7ff64209cb60ba14afc50d5f707b
SHA256ceff28e5f3c11405d484f4da1c7ef0a89364b0e924efa16dfc89bf126edf90cb
SHA512536a8e6b0d9f5cadb0a857aaf092fe73c88dedfa61ba7ff79212a1e14c8c7ba9216c08ef3afdfbfce2159cf92e39e9ad3d079fcdf0b93cd8ebfe3e3075030f53
-
Filesize
1.5MB
MD5eac85a4a79a168cb47c0810e23e6d2fe
SHA10e053ed568dc2f07d76b0e006a9e19655797b89e
SHA25686b9593479937ca7dfe9ef6744cc321808c0585b63312cb50952f709c498096f
SHA512b424136d58d266ba045a2ad95efeb8cdc69d77a9442521bf196390b934a7752bf728daeaf2fb3df887abf9c719a2526a8179e368cb228603b9243e3c7148c8e0
-
Filesize
1.8MB
MD5fa4b26c53cfb2661ba072cf8da181b1a
SHA1295f19aad28e80c5e371078989815c612110229c
SHA2563a92288781a1f411f43e59ae32ea78b89997e7a5d1b6f12771f39fb6fa345db7
SHA512f6399c683c41f518a1096c87303758d50d6419e62317bfe2d362f66e5048f81583be12b32348dc095a34c0de0a79867376fdb8fc4677080d665e001b38cbfa64