Analysis
-
max time kernel
191s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 05:00
Behavioral task
behavioral1
Sample
69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe
Resource
win10-20240404-en
General
-
Target
69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe
-
Size
550KB
-
MD5
e52aa8e50c0ccf883b7ab7f0c36bb878
-
SHA1
f0ae322f5067b20ee89d9826dc806abdd610fb60
-
SHA256
69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944
-
SHA512
65e6b735a88a3ab6e4dad015c5de020756d9e60c38e48f71f7fa72a66586b172dccae79e9470d2424639d4ae2307acb187f2c8ae72c782ac5acce02fd9442c78
-
SSDEEP
12288:lzymiDGnYdnieNfazSqBZg+30ki1+zB8NOUx:lBveNfazSshNi1UK
Malware Config
Extracted
C:\Program Files (x86)\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (9752) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-api-annotations-common.xml 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libripple_plugin.dll 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-Bold.otf 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD15185_.GIF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR40F.GIF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Ushuaia 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287018.WMF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NEWS.DPV 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\de-DE\msdaremr.dll.mui 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153087.WMF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\email_initiator.gif 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Juneau 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\ICELAND.TXT 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Mozilla Firefox\Accessible.tlb 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\ct.sym 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.mbeanbrowser.zh_CN_5.5.0.165303.jar 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152898.WMF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Angles.eftx 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationRight_ButtonGraphic.png 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Internet Explorer\en-US\iexplore.exe.mui 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04323_.WMF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-oql.xml 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files\Google\Chrome\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files\Internet Explorer\SIGNUP\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107490.WMF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\msinfo32.exe.mui 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\LogoBeta.png 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Porto_Velho 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_ContactLow.jpg 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files\Microsoft Games\Multiplayer\Backgammon\ja-JP\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Thatch.xml 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL103.XML 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.help_3.6.0.v20130326-1254.jar 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-spi-actions.xml 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaBrightRegular.ttf 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationProvider.resources.dll 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-javahelp.xml 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files\MSBuild\Microsoft\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02039U.BMP 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Contacts.accdt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Thimphu 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\msdaremr.dll 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0175428.JPG 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0090386.WMF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msdaprsr.dll.mui 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\whiteband.png 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluTSFrame.png 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files\DVD Maker\Shared\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File created C:\Program Files (x86)\MSBuild\Microsoft\readme.txt 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152628.WMF 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Rangoon 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CharSetTable.chr 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382962.JPG 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libi422_i420_plugin.dll 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Equity.xml 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\PassportMask_PAL.wmv 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages.properties 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Oslo 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-multiview.xml 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2036 vssadmin.exe 2556 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2100 vssvc.exe Token: SeRestorePrivilege 2100 vssvc.exe Token: SeAuditPrivilege 2100 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2032 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 29 PID 1300 wrote to memory of 2032 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 29 PID 1300 wrote to memory of 2032 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 29 PID 1300 wrote to memory of 2032 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 29 PID 2032 wrote to memory of 2036 2032 cmd.exe 31 PID 2032 wrote to memory of 2036 2032 cmd.exe 31 PID 2032 wrote to memory of 2036 2032 cmd.exe 31 PID 2032 wrote to memory of 2036 2032 cmd.exe 31 PID 1300 wrote to memory of 2688 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 34 PID 1300 wrote to memory of 2688 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 34 PID 1300 wrote to memory of 2688 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 34 PID 1300 wrote to memory of 2688 1300 69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe 34 PID 2688 wrote to memory of 2556 2688 cmd.exe 36 PID 2688 wrote to memory of 2556 2688 cmd.exe 36 PID 2688 wrote to memory of 2556 2688 cmd.exe 36 PID 2688 wrote to memory of 2556 2688 cmd.exe 36 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe"C:\Users\Admin\AppData\Local\Temp\69192821f8ce4561cf9c9cb494a133584179116cb2e7409bea3e18901a1ca944.exe"1⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2556
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
402B
MD5c3f7fe775bc1b6c8c2236647c2e8ec60
SHA105429b9ce635465a0aec1e7186970002c9c29233
SHA2563e141631db263de8f740c0073853b0c4b181a09ec2ddef796859f3150aff4672
SHA51218b275a18b842c0f9c3c776f206b35a6c3927fff00c982dc7f7da27fdca5a5cd959cbb4608e3b2b98a8f5304e9a24211f8fd75c28e8ba7d9d97bb39fdd06b308
-
Filesize
8.0MB
MD5ed9064caeeced12c16ee10bab365ecda
SHA1a52e7b2554bca15c5ad9be70a2a2ff576ea19b63
SHA256991f295cf0481de2893b72bbb3871737589d2a2dcef2995f48041d5bf444d22f
SHA5129967ae229c282fbd88c5080ac6d6a5685334c7bcc89a5ca2ba2e9c09f195338d107bc1e9d230cb9cba674bbb019c0986ea2a681dea5849dcd149e1264c50fd5a
-
Filesize
3.9MB
MD5d1ba9eb9a2dba904aab32f821371619e
SHA1e4bc9399bf5db39be9efa5918171de4b88c5ddd3
SHA2562adabe92e5f87fa91b9d2d9318c1a38b14eb5bb23d423ea353685d414fa4a696
SHA51286c5a62bfa080e744202aa68ceacfc8573da56987d6fdef0d26f44798ac4e8238927ab11120f6d92292f081df28bc428ddf2c36d640cf564446f23933eb64968
-
Filesize
4.6MB
MD5e63d0ce3551eac055ec652b126fd02e8
SHA1d89f7e35ecc134ec7c89b23acc3438d54b89b1f8
SHA256ae122a4050e9a85f3ca35bac043fe87e7a1f16ef6a57e135b7de7990ceb0bf4a
SHA512ef1ba72623602078cf1c4c211f930f93279a22e33f5f86209cf3b3346d2aef00b7d05d3259d983906cf6ee451711a9b45adba68e9a206fa844e7e32c1cc688dd
-
Filesize
859KB
MD5ae0751500583eab51dcd139fa497b7cc
SHA14054f8211bc4910f8a856d6ad36b62ad525f47a7
SHA256559d963ca62c39301d3aafec1967fbf1d5a73789c316fdd7e5e09212df3caa91
SHA512648c9d9978e6688a866da4767e90c06b30b96b9d8413a44c4dcfaadc705c115dd2b50785fe8d4a2c6ac2da10307ad97a3d664f12b6b9ff1c28be5c1d98a5acc5
-
Filesize
826KB
MD5282a0d83ad36f4ac5df6c1893697af3e
SHA15fdd41933008a4743d771918624dbec194970f8f
SHA256f9eff429f0f09e4b12f175d089dc60889f2e2c1367e8ad4e2f6252f38d2c1e03
SHA512289b3c39a44f73112655071d1d81ed14b7bdbc71e09fc06d8a92a3ad65e30c8647bf627421cf0f5c56abd4eca0e8304854cd8b1e26e9e681ba0c7024c33a6a27
-
Filesize
581KB
MD51999f555f9484268c722b335b00f985b
SHA1ef4668ad78fba10dee8e61e2257a0dafafbe3948
SHA256ecd1eb8e1b0508b3ed3662a467cc78a7c19c9e61013116cb3b12984f147f01de
SHA5124a1cb47d08559eeaf9f4adf89fa955aab0a9cf9ef3c622e5cd8f09a89a844eb18a865bbe3734888475ec3c205aba9ea0b363c437511907242b5ac8fe0e18fdf0
-
Filesize
758KB
MD59ed4bb313eda97882ba742c479b1f992
SHA1ad674d2b96afbcd46208c939f4709d945697dbeb
SHA2569dba39715c9b243e406d0e6fb885055a1741778941f3ab241ae6c4321bd67f28
SHA512a7f716bb4b980bf7ae58d5472d073eb609766909e1179066052cc0714d6938729e06c6121aebcd18ffb9dec621c96759a3f55ab22eedc361393b06cb5d733d3e
-
Filesize
763KB
MD5275042c53a39bd637c8ed13863c4df93
SHA122097ac0429ac3eb5ec0aac15e3697d6c04f51c5
SHA256b602d03316d57db339b59ad1c3c2e97f09d65fb0ae7238c9d30a0332a4b7c89b
SHA51241aa14d2851d28536c6dbd18d540545411cf5393565cb524a7a1ee8de1935cbe452072d033dc7943b3e1ddc8a2143087660bffa5708e7130fc01860657508d8f
-
Filesize
548KB
MD5c56faf013b45aaeffd81881a4a4d1d66
SHA1996c9d530d699e1691080841267d0a47e56d6f31
SHA256f140c185c78b97e5501a9e33c44ca5692a4c69cf871662304474f61be1d1d6ca
SHA51265498c97c74b2bbc657fc28cf76a82309bff06486fd9141d10738c0948562a9b674e1ca8fca9a9f29e33bdf9ca8cd4cc204d453016904abb1a2263ae9252089e
-
Filesize
760KB
MD5f409ab6a9ed60497e6ba283aace68fdb
SHA18277a92ba0ee9a0f9128628756e2452b99069010
SHA256ce5f9e25a2e074847322a66cd90d6799ab4209a481e29b3fc0fb9aae6cc1dd24
SHA512cdbf1373d356948cd96a9089baabe296cfbc14fdd3e2e5692ee807261123997f8d851a83f8e3ff548b73ea76a747f64afffea8310c833564057c7e6ac3977f0e
-
Filesize
606KB
MD5c8785ac2f9d109c4be8993798dc40685
SHA1724c77110f3bcb597a550a8c4a42024dc55a40cd
SHA25615fe0afa1923157d2877c2714960a447efda0de4b567f393cdf4b48b86e898aa
SHA512bc6cd159650fc0319cec75daf8acb9a179b3fb37fdada89743b895a6474a46fdd80aa03d72d594aa0448922cc5e90534a60ee348cbe27dceef7e732a69c940f4
-
Filesize
25.0MB
MD5ed7671e023a034d27ce8b9f96be08fb6
SHA17edf1f196f16477f24c6a5cb7353cc97852826c4
SHA25695ed64bac1d47d79073e60b035e2609faf092932cdeac7e2f55cd8ed2daefaa6
SHA512a2bc9ceda51a36f5f5f956b93ccdd95ae32cb13cfa787f89a8364635b6ac471d7c2cfdfe387ca9ec8fcfce6f21b84ee055179188db27f3b777640d126e7129dc