Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
Resource
win10v2004-20240709-en
General
-
Target
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe
-
Size
928KB
-
MD5
2dc4adf06247b4ed9031a53ef910626c
-
SHA1
789437e946b3e8d1ccd14ee70e42c7d89ba054b2
-
SHA256
3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e
-
SHA512
9e6eaa4b27e2d6bc1306c33e74465256fab086972680d3a0014cafca8f22bbf865ffaa0f81332ffef83287252faf2ca0c7f369d11412b19ffb57e8e72ea5e0ae
-
SSDEEP
24576:oUY29aeV/XqzB+qv6w8zJx/W2nz9dPOmX:oUYMPqzFvT8/W2nznP
Malware Config
Extracted
C:\ProgramData\readme.txt
https://aazsbsgya565vlu2c6bzy6yfiebkcbtvvcytvolt33s77xypi7nypxyd.onion/
Signatures
-
Black Basta
A ransomware family targeting Windows and Linux ESXi first seen in February 2022.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (6702) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dlaksjdoiwq.jpg" 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099195.GIF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02097_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152560.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ReachFramework.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\TipRes.dll.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\pkeyconfig-office.xrm-ms 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsplk.xml 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18201_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Google\Update\Install\{1A1CC958-2235-4531-8015-5AFE1D6CBF7D}\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08808_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\reflow.api 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15273_.GIF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\PicturesToolIconImagesMask.bmp 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.services.nl_ja_4.4.0.v20140623020002.jar 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_extractor\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02233_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\ShapeCollector.exe.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationRight_ButtonGraphic.png 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Google\Update\Download\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\fr-FR\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105298.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Heart_SelectionSubpicture.png 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02166_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153305.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.nl_ja_4.4.0.v20140623020002.jar 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\J0115865.GIF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02093_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00177_.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Opulent.xml 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_cs.jar 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15056_.GIF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msadomd28.tlb 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105502.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\msinfo32.exe.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR23F.GIF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core_0.10.100.v20140424-2042.jar 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files\Java\jre7\lib\jfr\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341534.JPG 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\OFFICE10.DLL 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PS9CRNRH.POC 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-highlight.png 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File created C:\Program Files (x86)\Microsoft Office\Office14\XLSTART\readme.txt 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_INTRO_BG_PAL.wmv 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_chroma\libyuvp_plugin.dll 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\en-US\msinfo32.exe.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.alert.ja_5.5.0.165303.jar 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyReport.dotx 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\TipRes.dll.mui 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107350.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107426.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387604.JPG 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PSRETRO.WMF 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Solstice.xml 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2428 vssadmin.exe 2172 vssadmin.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.basta 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.basta\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2156 vssvc.exe Token: SeRestorePrivilege 2156 vssvc.exe Token: SeAuditPrivilege 2156 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3016 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 2980 wrote to memory of 3016 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 2980 wrote to memory of 3016 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 2980 wrote to memory of 3016 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 30 PID 3016 wrote to memory of 2428 3016 cmd.exe 32 PID 3016 wrote to memory of 2428 3016 cmd.exe 32 PID 3016 wrote to memory of 2428 3016 cmd.exe 32 PID 3016 wrote to memory of 2428 3016 cmd.exe 32 PID 2980 wrote to memory of 2832 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 2980 wrote to memory of 2832 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 2980 wrote to memory of 2832 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 2980 wrote to memory of 2832 2980 3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe 35 PID 2832 wrote to memory of 2172 2832 cmd.exe 37 PID 2832 wrote to memory of 2172 2832 cmd.exe 37 PID 2832 wrote to memory of 2172 2832 cmd.exe 37 PID 2832 wrote to memory of 2172 2832 cmd.exe 37 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe"C:\Users\Admin\AppData\Local\Temp\3d8713641264c41cd6784c5569c1447299fba88633070e40e70bb3ae2b4c5a4e.exe"1⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\vssadmin.exeC:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\vssadmin.exeC:\Windows\System32\vssadmin.exe delete shadows /all /quiet3⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2172
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394B
MD5b17425a4db71b2ef8b7decd01038e502
SHA17e761bce96cc3033dec3a1c61d2672c6fbae3718
SHA25636c359b9db03e7a6df3c37a25b16c53a71d6a866e6332faf203f19ddbfc1ed68
SHA512fbe107f9275231e2e2dbbd80475d51e641a38fd24241366c3af0ed14d0f383bd9de731f2ed8b355c40a68008a6d80dbfb4008e06fd2538483bb8388c7085f636
-
Filesize
8.0MB
MD5d99e62116efa31e342b4be26df032dba
SHA168afde0f6229ed6b944af05359c9674cd5c8d01b
SHA2563fd54aee0b842e4166bcbe2d8dc517eb7039cf9d3c8164ab744b8e39dbdecc74
SHA5127dd64829da110732b9cf8f6d61376d1422e73ec47fd185cb0859ce3dced2accf3d7d5ecd6a0471c85252dd6c933f268c2076e8558574c7770cde8ab694bb672b
-
Filesize
3.9MB
MD584b1caf533ffa8ee22599d27b9837685
SHA1e7dbba65bbc62c709649cbb9c30634187e5d03e3
SHA25615ab61bf455b6e8882bfe31556e1862731a6cec34ca8aae775bb2fc263b2bb3b
SHA512b0d9947f295f8cee91032b2c6ef06be18fd6ada5db4f5aab02c21db1105ebc344f993ca0a11c8e56bc60d18ecb1aa18edf7a7faeb2cad70d049ce0d6da3ac704
-
Filesize
4.6MB
MD5aacd17cd11545d183b76c67e191921f5
SHA129185c678752a930c56d6c0cfb6f25f9d5ff2327
SHA256983414deb7b9112cfe0c6e0547479ff10992937e255573a952b6d9bd36b6670f
SHA512b973f773e3794969896d95de71192ab4170ebd1fe2a453c152ddb3c638271ff6423f5f2e1126f606c55a85ba33e48aa928add613971080e71ce7dd0bc50e2e4d
-
Filesize
859KB
MD53526b349a038939a2f60fb32f800dfe7
SHA11252f056e153718f0a5bcaa49a0138101d3b3e98
SHA2562bc4108eeeac18889403f75f87dbdab9416c8e3e4ece2855b72dbb741f600d32
SHA512ceb4c903a8ea994b69c47f78b0bd6dbe499176d0b626a23faf41a8816363ccddc1dd2eb7b1724eb16c97f9188de2df9503814aa37933f5bb17a1405c467e5923
-
Filesize
826KB
MD5fec1460ee787349aa4efcb0de5aa6d77
SHA1ec5eb1512584bdafdccf17982b52168e99208c3e
SHA256f2bc2b985fe64523a20231829ac7882d7b8bf8bcfc47d182ae22d5931ee353b2
SHA51220b96b88a749433d19646e0b16146ab5068e521c170038c8673d794b3e31b806630a58b64048fa921cf01fecf84dfa242ab0808123bb908bb5327f0452700381
-
Filesize
581KB
MD5835e005b9902dba5191394ad81ce4da5
SHA1c922a54ccf932ce82c31955c25766899f0a51dcd
SHA25613ef42ac5b31189b887b89b867028bc63a18a33ca909d39641a9f2bc66f436cd
SHA51277a94ade965bfe46de9d6998faf2327f7fe509755e5ad9338bcb0f4272bd87739130c0c2d9a967bfe5c3bd55d3ee955c2725567611c41d77ba7ef5530ee0c344
-
Filesize
758KB
MD5f5b794f81eb1403fea0f42deeba1be7b
SHA1513b523643a6a9ad4091554f89f001f12360004f
SHA256a249c6b04c4120b4cf50a230bbfeade1d705f2edf315f8cadb3bc480f7c19c01
SHA512211a79660396efce30cc8087b83b599a32c85925803c3c5f67748695cf4199f13b5e9fb0b2d74d1e2f1ae9955dfa46734721e69b7bd443d4a60b4b00f16b4661
-
Filesize
763KB
MD5b8c726e4fdf31c3c142b490e3c8af7f4
SHA1f44f9eccbb569bbf9dcab7a0a28f02fe0603d1f2
SHA2565dad253a7e364f791e8b50b35654960b1dffcf2f22783e2ed86130d9d780186e
SHA5129c401633d223187942ffafc3c01820ed404f53bb6018ffed672bbb88c84d7f013384fd5836e17ab417af1b7f2509182fd77d73b08143dbbf1de2c155af264d70
-
Filesize
548KB
MD5fc4b8b5264f3ac28233dad5bf5b02196
SHA16d0e75571aed71881bce1065d1d8aa31d8e32d34
SHA256f192d26af87983c5006ba3ad649e7d220e95b1a0f96d32e54ebd581f204afdfd
SHA51250322620f93c74948038d0a5dacef8f923c16c7be8e2568c911d3aee5c69441198f4b7d9e6ca042938b182f81ed9bc63a983e025830574039a843f1063672f3f
-
Filesize
760KB
MD5e103cb746dd2b9ed0ff783f65f2f8de8
SHA1abc0c504d48387adf3a50ac908e32ed940783aee
SHA256d3622802356b53a6f497cf7b0e0288bbe3d8510acc5bf86b6a45ce35085cd2ec
SHA512cc61e62921336659d98e3c778afbbaf2a8833304071b9f50872cf0f303a67fbc13875e2671b1831db68775d8827a76fc5dac5a6d59dbead0e6f17ecf9b65ce80
-
Filesize
606KB
MD50d96186d566113c79eea6ee9f44a7dd2
SHA1142d99380bef9fa33a7a509e68ffd62696232dcb
SHA256446fbbd08b190819991e3e174c6151aba91973f35aa12357c329756904f61cb8
SHA512256fd884689c82daa0e2c418a09673920f79fe6ee0c6f5b214630f382bd83e8ed379be6fe7248cc641a58a8552b8d0b3ac4c9041427c658e620019d986062bca
-
Filesize
25.0MB
MD52744e01188c30b8992183277299cbdab
SHA1138c0b22bd18c06ab860ef24a5a1fa923f338f4d
SHA25652d4ee3217aef49e01a91793d2c780c7843439244db9e83703e070940b4f840f
SHA51292431cccc1c0126aa09aec1ec60b041fccfd4605d92270d178f80af555b802a53e3d1c508ea91d27b80ee614dc44f5f3ea5bd277f6223a71a9a112cbafa91f45