Analysis
-
max time kernel
126s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12-09-2022 17:02
Static task
static1
Behavioral task
behavioral1
Sample
8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe
Resource
win10-20220812-en
General
-
Target
8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe
-
Size
783KB
-
MD5
68c7c2cfc6b3cf19994bfa9b5cd9ffa9
-
SHA1
74520f82229b50f46b654ee3fb317de17192fb7e
-
SHA256
8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909
-
SHA512
c49c025075c1ec0dfc0b90378547cd89f72f463e6c6d5a182d1b61b719cf96ee74a8ed5553aad4ff5a232d978592c106171e6c3a9f9b02785c5da2b88b43ddb2
-
SSDEEP
24576:nzM3m9QJjzTigBHvzFosaSeQGsSxZ8ayppIf:4H+CHvRonISj8I
Malware Config
Extracted
djvu
http://acacaca.org/test3/get.php
-
extension
.eemv
-
offline_id
5IVlpkccZlJz0AZ5atgGWVKe9CGAnXjohDf40mt1
-
payload_url
http://rgyui.top/dl/build2.exe
http://acacaca.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-0e5rCKsYCc Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0560Jhyjd
Signatures
-
Detected Djvu ransomware 9 IoCs
resource yara_rule behavioral1/memory/2648-143-0x00000000026A0000-0x00000000027BB000-memory.dmp family_djvu behavioral1/memory/5000-145-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5000-146-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/5000-152-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5000-213-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/5000-245-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4216-272-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/4216-341-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/4216-408-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 4708 build2.exe 424 build3.exe 4568 build2.exe 4940 build3.exe 2380 mstsca.exe -
Loads dropped DLL 3 IoCs
pid Process 4568 build2.exe 4568 build2.exe 4568 build2.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3792 icacls.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\bca387e9-d44a-4404-9c2c-b61cf5a0e502\\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe\" --AutoStart" 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.2ip.ua 3 api.2ip.ua 13 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2648 set thread context of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 4100 set thread context of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4708 set thread context of 4568 4708 build2.exe 73 PID 424 set thread context of 4940 424 build3.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4492 4568 WerFault.exe 73 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 build2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString build2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2140 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 4568 build2.exe 4568 build2.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 2648 wrote to memory of 5000 2648 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 66 PID 5000 wrote to memory of 3792 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 67 PID 5000 wrote to memory of 3792 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 67 PID 5000 wrote to memory of 3792 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 67 PID 5000 wrote to memory of 4100 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 68 PID 5000 wrote to memory of 4100 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 68 PID 5000 wrote to memory of 4100 5000 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 68 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4100 wrote to memory of 4216 4100 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 70 PID 4216 wrote to memory of 4708 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 71 PID 4216 wrote to memory of 4708 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 71 PID 4216 wrote to memory of 4708 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 71 PID 4216 wrote to memory of 424 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 72 PID 4216 wrote to memory of 424 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 72 PID 4216 wrote to memory of 424 4216 8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe 72 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 4708 wrote to memory of 4568 4708 build2.exe 73 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 424 wrote to memory of 4940 424 build3.exe 74 PID 4940 wrote to memory of 2140 4940 build3.exe 75 PID 4940 wrote to memory of 2140 4940 build3.exe 75 PID 4940 wrote to memory of 2140 4940 build3.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe"C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe"C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\bca387e9-d44a-4404-9c2c-b61cf5a0e502" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:3792
-
-
C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe"C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe"C:\Users\Admin\AppData\Local\Temp\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build2.exe"C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build2.exe"C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 14127⤵
- Program crash
PID:4492
-
-
-
-
C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build3.exe"C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build3.exe"C:\Users\Admin\AppData\Local\75233f2a-df63-46a0-9d0f-cd7f43f3d335\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:2140
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:2380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize2KB
MD5215064dd8b4566627489319b46e9ca43
SHA17fa698eef5f02a961b5862df135d7ebfd8a12292
SHA256390f76fdb79029603900524df2f0fbfd05bf18a3bbc74b9b05b2a6dc5938393c
SHA5122a5b12b41d728ce30f1712d23226bbefe73111b786156b97126d6497ef234e78feaf6db08c7412eaa336c869b93ab239cd46b33cc31ff2c8497214cba5927753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD5a6a0160f7dee79a316edde54d910ebaa
SHA19b374842b8954e8b27a06f22f1c0de15ea768c31
SHA256f3646358e7a0d83e1140296fb384dc20e38a165f8f086cf240ace49e27e5b7c0
SHA5121510a5ac8bb5d3f7a3be3397ef5266861df92bb72d013d8f9432dae8f4310d7d494e67f6b49b712519fb96ef085eb1e233eb8bd4e42bfee10faf0f6da64e4b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
Filesize488B
MD523dc46be7e53d856d91b6a2403f9bb5b
SHA1d7879afa4e0d82bb12f4d6655d8d55eb33369c74
SHA256558ae8d7f236e2f3ee57a2e30f639d60a046ec643a5152a2df344ec0579d941d
SHA5126793b5e6c122a2a8a79b4a9aac0d611622215255a5ffb097c4cdb175c789ef91f18df1a25ad7eb11e48fa842906d3552662720568f5b23744a665225e3881050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD530984e246929ae47ead2558af519d7c1
SHA132f19333fc44ed9b27a86dbc6f01dcc1b3a0ba3e
SHA256398fb06ddc16c3cfcd641102b4ba3ea50fbca63ccdb1ce4499466b37adce2c22
SHA512c2788a093e2c6c4a530c86498f22eb13d4207079cf95ba0453697f7df9cf2a8674775056c01328c35256821d11bb069f89ee80150127c60a6d031d2bd1499b9c
-
Filesize
383KB
MD58d7db6982df46c3b0f0cc879d892c08a
SHA164e3d7ab4793aeb05d18a82159c579e05c45fd71
SHA256116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6
SHA5120eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b
-
Filesize
383KB
MD58d7db6982df46c3b0f0cc879d892c08a
SHA164e3d7ab4793aeb05d18a82159c579e05c45fd71
SHA256116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6
SHA5120eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b
-
Filesize
383KB
MD58d7db6982df46c3b0f0cc879d892c08a
SHA164e3d7ab4793aeb05d18a82159c579e05c45fd71
SHA256116e15e94d70dde65f91f155580bd9b34ff1956b9ebe1a53b6bce912b281c1f6
SHA5120eeb242e6e1356a2a9e3183f12439ef36fac40e27ac8c0df5f591c7b3c1324145627c92c3fee15aedee2c1e8cc3b966152af73a33196166c2c1bfbbd979bdb5b
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
C:\Users\Admin\AppData\Local\bca387e9-d44a-4404-9c2c-b61cf5a0e502\8e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909.exe
Filesize783KB
MD568c7c2cfc6b3cf19994bfa9b5cd9ffa9
SHA174520f82229b50f46b654ee3fb317de17192fb7e
SHA2568e95b0179937bb0b3bfd3d66575ecd86352ee69b96bfd2cd3ed339dca4ca9909
SHA512c49c025075c1ec0dfc0b90378547cd89f72f463e6c6d5a182d1b61b719cf96ee74a8ed5553aad4ff5a232d978592c106171e6c3a9f9b02785c5da2b88b43ddb2
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.1MB
MD51f44d4d3087c2b202cf9c90ee9d04b0f
SHA1106a3ebc9e39ab6ddb3ff987efb6527c956f192d
SHA2564841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
SHA512b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45