Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
24/12/2023, 18:24
231224-w112ksffdr 1024/12/2023, 18:21
231224-wzcycsfchm 1007/11/2023, 17:16
231107-vs31jadh73 10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
Resource
win10v2004-20231215-en
General
-
Target
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
-
Size
765KB
-
MD5
52f22c2a5b2c339e75f176bf5bfcb3f3
-
SHA1
0a3b96aa59d5eda04c731bfb9c2ba7fef997d1b9
-
SHA256
95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4
-
SHA512
ec5f24367c46ff558110022ad8e1106fe5d1d9b9f94cf423b0cd1e1cd7d5ee3111e16cc12ccf3d6e65c5a5d5358691726172e33fb6338e1b7291be9566766da8
-
SSDEEP
12288:mokzmesNcOJCG4jm2E2SLZJsiXlg8XGB2P3yo1jaUPC4t56ha6DJof5:izk/QDo2SVJsylBXjVNPyvu
Malware Config
Extracted
djvu
http://zexeq.com/test1/get.php
-
extension
.jzeq
-
offline_id
4FMaMDK6uqPZOxJj64677pqiSGF54A1Dam9zfUt1
-
payload_url
http://colisumy.com/dl/build2.exe
http://zexeq.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-TAbs6oTGSU Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0821ASdw
Signatures
-
Detected Djvu ransomware 16 IoCs
resource yara_rule behavioral2/memory/3068-2-0x00000000026B0000-0x00000000027CB000-memory.dmp family_djvu behavioral2/memory/1420-4-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1420-6-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1420-5-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1420-3-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/1420-15-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-21-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-22-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-20-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-28-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-27-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-34-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-35-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-32-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-48-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/4600-51-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe -
Executes dropped EXE 5 IoCs
pid Process 3832 build3.exe 1208 build3.exe 824 mstsca.exe 1032 mstsca.exe 4128 mstsca.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 1560 icacls.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\cfa2fc67-81f3-4a67-aab0-5bdd1a553ec8\\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe\" --AutoStart" 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 api.2ip.ua 23 api.2ip.ua 31 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3068 set thread context of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 1636 set thread context of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 3832 set thread context of 1208 3832 build3.exe 109 PID 824 set thread context of 1032 824 mstsca.exe 116 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 548 schtasks.exe 2936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 4600 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 4600 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 3068 wrote to memory of 1420 3068 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 92 PID 1420 wrote to memory of 1560 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 95 PID 1420 wrote to memory of 1560 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 95 PID 1420 wrote to memory of 1560 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 95 PID 1420 wrote to memory of 1636 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 96 PID 1420 wrote to memory of 1636 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 96 PID 1420 wrote to memory of 1636 1420 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 96 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 1636 wrote to memory of 4600 1636 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 100 PID 4600 wrote to memory of 3832 4600 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 103 PID 4600 wrote to memory of 3832 4600 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 103 PID 4600 wrote to memory of 3832 4600 95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 103 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 3832 wrote to memory of 1208 3832 build3.exe 109 PID 1208 wrote to memory of 2936 1208 build3.exe 111 PID 1208 wrote to memory of 2936 1208 build3.exe 111 PID 1208 wrote to memory of 2936 1208 build3.exe 111 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 824 wrote to memory of 1032 824 mstsca.exe 116 PID 1032 wrote to memory of 548 1032 mstsca.exe 115 PID 1032 wrote to memory of 548 1032 mstsca.exe 115 PID 1032 wrote to memory of 548 1032 mstsca.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exeC:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY51⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exeC:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe 0821ASdw3sjR7F8QCGeG3mmJ8Ydub1mGOIlnllHAObOY52⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\cfa2fc67-81f3-4a67-aab0-5bdd1a553ec8" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe"C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe"C:\Users\Admin\AppData\Local\Temp\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe"C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe"C:\Users\Admin\AppData\Local\fcd14ce7-a929-44f8-8da4-1a6ca4af31db\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"7⤵
- Creates scheduled task(s)
PID:2936
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
PID:548
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ad1b831e6b39763c118dd6bf34d8641a
SHA143e23a3d91315736f59751521ade3224f45ece86
SHA256fe673f5da906667a2f5b08f086d292da711c854fce0268f8e4ed7d4d6e62d58a
SHA512cabe0d43a8bc792b9725af5bdb918a7edfe4e7542771cceb57d8686fab0c2c1a5201346f8e960ee31cfa46c1c291d59bcee04b867ff43dfea2520066c8da3fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD55bcca03cb05d354114bfe68e75761db9
SHA1f6f4586f76c4a241fc2924f906be76de66ec7bcd
SHA256bb641aca3282970ce3ffa3acaffb2139a8fd3da4320c36e70195982728cef105
SHA512db6d2493c4d7a66969ca00714eaf71e7f5c761cd650c4c3ee22917718c9ec4f65c6f7cbae30deac54137cb34f4a57bf93887d587410be19c027f315b3b1e224f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5ee514d9189e258993932e1347736a415
SHA1d07ab3b78df16d8250c29886d7e85b5de753595a
SHA25647553d903e924fc873f7bc09cb7336c0003a3eee2e0315d1d20eb097b21905ce
SHA5120421db76a1da0e45942cff68f328d727f91730515619ac8ef2d011378d90e4292c4d21eb8bc21d950b70f30901a71be7a7a17c238bd980522d6b91e18a4f0044
-
C:\Users\Admin\AppData\Local\cfa2fc67-81f3-4a67-aab0-5bdd1a553ec8\95e9cb14d98addba28afd394f68a90d4500fa5396a6b27fdbe5024bd17f972b4.exe
Filesize110KB
MD5047b48def33f10ceb9525cdeb6aa5aeb
SHA1cb1ad038da9cc5ea70eae30f3d096cbacbcb981c
SHA256c7404fe7d2295f311f1a7d10611e4c7d2ab9c663e2959f36923050ebcb435a64
SHA5123c0cfb980c8d6ff286ae1dd8ab48a735d0bf9d7817756145c3e4a2675fa259c0d2514e407bdd1fce6dcd85390558e5e4203df636d4e5f99cc7127d8669af80d6
-
Filesize
111KB
MD5e785717a3ed505b6600a31fab12469b3
SHA169457d7fd68c01003803eaf5c0e04ab375372852
SHA2565a71000177f8c78799dc5d92ed35faf3b658a95efc7340cff97ac5fe7e44ef00
SHA5124ffcd4e5671e8cf2ba4c475f10d8ebbe8cdeac44145d4f03ff3f53ce7d00c3e438ce81d435e0464fe3c6275703cffdae20341d81878165a791b273ed83e2d5c8
-
Filesize
152KB
MD560e718c8b9c32ee2fc6ba312bbcb27bc
SHA191b7ac2c63b5eed829ed71ba7957b83c86c5860e
SHA2565f8b772cbdc607d425a661b192016dce588af3b9600907a5527661a3d05603d4
SHA5125da45c5c6a9b5a98099594296aeb58bd6f3efade32dad88dbb8f72cf500cedfe9a7060f0492cf48b8fae3c653208c15558a89f511007819694a7bb3f02e03a08
-
Filesize
99KB
MD5ef06ac5172fc65adda5c64edc8be0b94
SHA1ee330bdab978fd33a30f2933be867af38c6fa083
SHA2561f0ceb4cb5312630eedf4325cf4a883ed67c5717b615be8d39d49130f55878fb
SHA512297bee1a185a2c30a7e97372b3de88163a24516cc234c6f3d07ec5cd31cefd98e78bcdcacc4e00946c31e0878570c1fab7e994f8836724c97a9353ee5cdcb219
-
Filesize
150KB
MD5e82bf5efeb233752669694a43574c882
SHA190a41db7921f072d3e649daa6695fc1cc7a2b01f
SHA25618a88c0cc9f2c650908f88f3872472e915cb03433b80ac24d38d7595ef24381a
SHA512d0772e8e94fcb738edec78fcfc4b5e196065bbca3510d83d7328715e3293bca551076c7e3dce2fe44db10edbd8e1b1441124da73e2f30fd88201d11e500bf022
-
Filesize
193KB
MD51f38596db3dd52265b5b215c43e08f33
SHA1c80f76ad68c647fda6dc9b6c786ec395b4166481
SHA256f165e1e460272fa6a96942d07ccb17ecf09d18e0d96db4b4f20aca890285c878
SHA5125262c50fc3d796e27ccb8ce1eac4dd7a5e08921a6ce6805627d4a380ba18c5554a317d0270f4226f1b9b7ba3c5835298e69c46082fc8b9bd13de217f4c552f63
-
Filesize
260KB
MD5d946a2510c611d97b6834b9d26039edd
SHA121af04d653156d59c5e97ff37a689e6dcaa963bd
SHA2568c9a7607101956762353683de56bd62bc0a08b0a303c3058ea03b8ab504d128a
SHA512ebe4969a6bb4fc53b16177aaa43262933378e3a3bc0e2756d3a4c5709bae5c8ad08d9c19a27d6994f5a475fcb8da4df1dc8eb18e0b735c2fc7c9a45ae30b920d
-
Filesize
154KB
MD59546239b2645ea9075c26110c0fc6e0e
SHA1d9fa054c16467c67e8237f8734881bc40363c5e8
SHA256699a256c566b27e0c1b020d0d50f60eebd5a7246d5948990542f98cfe22aebda
SHA51214ddfb8da7bcf2f1a0631d8e550b5cdc79e425bc4f2e20fade6823af797181a2e0ff9a011d24ac74d96389e0a63f767b2cba66ab2335f4fba7fecbd6506ae952
-
Filesize
149KB
MD57abba8174677b3c4d585cd620e6f0c6b
SHA12de166d22c395e3d8fddc964b145a10f14653e5b
SHA2565b32fbd2dde8751cc9db1e650703b8054f864b344f20bce83ecb79b9a77342a1
SHA5128bac1c3c3ee0bb25870d1b288cd5d563294795681b0942a4b89182214b48ab8ece50d445f9faac0d4776e7395567b5ca867e1008e49d6e147e7e904682ae8d18