Analysis
-
max time kernel
84s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
Resource
win10v2004-20240709-en
General
-
Target
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
-
Size
928KB
-
MD5
2dc4adf06247b4ed9031a53ef910626c
-
SHA1
789437e946b3e8d1ccd14ee70e42c7d89ba054b2
-
SHA256
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e
-
SHA512
9e6eaa4b27e2d6bc1306c33e74465256fab086972680d3a0014cafca8f22bbf865ffaa0f81332ffef83287252faf2ca0c7f369d11412b19ffb57e8e72ea5e0ae
-
SSDEEP
24576:oUY29aeV/XqzB+qv6w8zJx/W2nz9dPOmX:oUYMPqzFvT8/W2nznP
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (2649) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EURO\MSOEURO.DLL 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00037_.GIF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382958.JPG 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Common Files\System\Ole DB\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\MahjongMCE.lnk 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\DVD Maker\OmdBase.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Internet Explorer\en-US\iedvtool.dll.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00186_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151045.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Microsoft Games\FreeCell\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Internet Explorer\IEShims.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107742.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0238927.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297229.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Common Files\System\ado\ja-JP\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00390_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0151047.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382970.JPG 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Internet Explorer\jsdbgui.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\es-ES\Solitaire.exe.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01196_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSO0127.ACL 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XOCR3.PSP 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00084_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099179.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08758_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02071_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107316.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239973.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Microsoft Games\FreeCell\de-DE\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\MSB1STAR.DLL 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382957.JPG 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107262.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\micaut.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\Microsoft.stdformat.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_extended.xml 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105384.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216600.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152602.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceoledb35.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00148_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198021.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\MP00132_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01123_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceme35.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RIPPLE\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Microsoft Games\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\javafx-mx.jar 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\PurblePlace.exe.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Microsoft Games\FreeCell\ja-JP\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Internet Explorer\images\bing.ico 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382962.JPG 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105292.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VGX\VGX.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2500 vssadmin.exe 2836 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2392 vssvc.exe Token: SeRestorePrivilege 2392 vssvc.exe Token: SeAuditPrivilege 2392 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2140 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 1940 wrote to memory of 2140 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 1940 wrote to memory of 2140 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 1940 wrote to memory of 2140 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 2140 wrote to memory of 2500 2140 cmd.exe 32 PID 2140 wrote to memory of 2500 2140 cmd.exe 32 PID 2140 wrote to memory of 2500 2140 cmd.exe 32 PID 2140 wrote to memory of 2500 2140 cmd.exe 32 PID 1940 wrote to memory of 2852 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 1940 wrote to memory of 2852 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 1940 wrote to memory of 2852 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 1940 wrote to memory of 2852 1940 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 2852 wrote to memory of 2836 2852 cmd.exe 37 PID 2852 wrote to memory of 2836 2852 cmd.exe 37 PID 2852 wrote to memory of 2836 2852 cmd.exe 37 PID 2852 wrote to memory of 2836 2852 cmd.exe 37 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe"C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe"1⤵
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2836
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394B
MD5b17425a4db71b2ef8b7decd01038e502
SHA17e761bce96cc3033dec3a1c61d2672c6fbae3718
SHA25636c359b9db03e7a6df3c37a25b16c53a71d6a866e6332faf203f19ddbfc1ed68
SHA512fbe107f9275231e2e2dbbd80475d51e641a38fd24241366c3af0ed14d0f383bd9de731f2ed8b355c40a68008a6d80dbfb4008e06fd2538483bb8388c7085f636
-
Filesize
8.0MB
MD59ce075c297fb66e9eb829df004d9f296
SHA1b8d0db4a6e5b9aeae80ef1336553dda8d0673770
SHA256dc5765daac91a333e6d43e8bce409e56e298b7f92f13d48e8a022e35134df57f
SHA5125387f76e31ebcf1e9873b5ed6920fada39b4f6858fda627691e957a1940661fe119fb462ac3aa7d46cc0287bb32fb380f61384bc1e1c2c08c69fde22b465352e
-
Filesize
3.9MB
MD51b9a49edb9768e7dc3180a615204ef92
SHA1e787c42b11aa01ed340b2f5181f444cbb3a9b84b
SHA256badf6be2fc0958336b5e3b2c228273777f468267c7c4c0a578f4356d81b74c42
SHA512e4c51d13b79df1a9ba631cca5edf0da41119c0fb8bba2397375ce9405974ba83b7242b99051806d15d4bc566331111c31a702e2325211b52ba2ff6da7e49fe13
-
Filesize
4.6MB
MD57c613861f6b20abb7c6e78b84cb3dde8
SHA189049d1884df3adaa8550d226be68a3fbad13a7f
SHA256d8aba874f9aa405b38d1df830b72a53a97a2bc5504e234e9ab1f942f890e4e75
SHA5127f62f26cae99d83ed8709e7a308600f86be58c56091a6e04dd5129d8d80e4e98fda29511b43a69aecfa8cc0f3ecbf0346f1f0bf117e65007c31f981a40ea3d0b
-
Filesize
859KB
MD5609e54493edf3bb0707d55d30caa0447
SHA1ad1536552f9a874e8053dc457efdf293c778b618
SHA2560da779abaf00bbf82591eaecf13a2ae2f8f7a656396a59f9c6d80a218f3e7de3
SHA51228de3ed5478944418c02cbb85512711c3a073e436306acc883ec657a59beb183873f10f26e02874a897df680c18794d17380577c6bb97997871ec75a94252dff
-
Filesize
826KB
MD5a6bd699aee507cdd815b41fb517c9ddb
SHA1d7154a9c367b4ad3c67963c5eb671f4c243d9959
SHA2567dc083e1ea9db52e4229d81790575c855fe815aeda45c58830eedcd89dca69ad
SHA512e3dafe8094b7b5f03448650090cb6711b278c469638e471ce3a30d51fc5ad191bfaca23fb84be60e8c88719c9ad3fc762e9c63805e2fdd8c8a55881ace42ea69
-
Filesize
581KB
MD5f45ebebb8f62034dc36af1ecfeb27485
SHA1e232931250555978db6708b792ec754a0d38635b
SHA256e7746092ed2cf0e460caee7e85a9aacad1f67296209641dc0daabaadc0a9c46e
SHA512d3299cf7a689254b646a470662932c6b5d41082b0c051f320129e0343d7f82d4ca785c57cab67b2a2cb37c3794f334e43c63439519b4d5e587d97d324f492d44
-
Filesize
758KB
MD579f8905280f53e59ba596dc9af636818
SHA1932f145ada50e93b8fb39dbcd0ccd193232a9276
SHA256f5b363c2d5b8cabb7ce532334f778d86d3a8db894a380a703ef442dedbd12348
SHA51252e9302d383376e7e687a91a0ced7f323e1454c85dba34bf0d9b026ed5b953487722b8f108e801ffb3b43b3fd7c9315d4e022e50980cd24ea0b92c6225fcb907
-
Filesize
763KB
MD544107657fef5d513583701a02c5198bd
SHA1a52ccfb916c50e96b88eb370ad8c0f0579545060
SHA25647cba0756d62a687957ee11cede96741856c5459e4656a6cd878c375fc0f74c1
SHA5121cdcbf68d8b3aad6fd33dec37f91d8e0992ba5d65d24bc0b3525d4695af64231bf2a9d9e0ec6abb5a07195e40061fe032f90892c60760136d4aae2f7bb520735
-
Filesize
548KB
MD54acd753c011908596acd1741dd4a520c
SHA1eb05e5e2bdef9c85f866d772c0df6b174b12dc20
SHA256f521f68f678c001981a70fbb9c8d4e859e1f4e6f8accc1f455bfc6d05ec2820a
SHA5122af780044551bfd2d061c428e39055e731551fb10eece584044dc19d7c47cab22ffeac8168b32b5747172954a3e43612362b119d5f24d1f055b4d3c0b5235b97
-
Filesize
760KB
MD59b0bc20a2283ef403c962e42b2add4dd
SHA1d18f386cb0cf2ac66fe7bd54de8ec769334e2878
SHA2561370d378fabe991a894ea94f4290c1874416d3e6c45f4a1f497dd7305d48c422
SHA512215c20245a485c5ed952084621c13e24f03070f4dd3d4b26cdc9f6d9b0f7336b2094ea491779d7e11a0fa095748a4f89569b72b371c750d2cfbb3896530d9873
-
Filesize
606KB
MD5ac24c929dfa821bfe7f4181726dc1292
SHA1556be186ea5cd93ab5500b552c446c3858ea3671
SHA256d2bf26d14bfec404772b5f142d078b2504ab11614823b476797039bc01b5f703
SHA5127283cd14e4e089002821a3c00dd2b00cfe56459c2ec8785d2faea9b52f85a0a4e03910aaf878769673092a6453d9b07dc3b4a5633fb5d5d89f21754e7fb016fd
-
Filesize
25.0MB
MD5795725e20f9537767af694043a0d798e
SHA1557a63b5aad4484e1038dcc55de0922881be05e7
SHA25671dfc9c35b37b37784472bdff5a9a56770b47e77adba8d6b93771b63b558324d
SHA5127b473d6654ac487191d27b091277fe110053672adb712fe32ea261863fcba73277e0b263d03578ab1936578f957ef9f64a1829a7bea2252358459df69b358631