Analysis
-
max time kernel
22s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 17:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/MalwareSamples/Malware-Feed/raw/master/2020.10.29_CISA-Ransomware_Healthcare/0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a
Resource
win7-20231215-en
General
Malware Config
Signatures
-
Detected AnchorDNS Backdoor 9 IoCs
Sample triggered yara rules associated with the AnchorDNS malware family.
resource yara_rule behavioral1/files/0x0008000000012234-89.dat family_anchor_dns behavioral1/files/0x0008000000012234-129.dat family_anchor_dns behavioral1/files/0x0008000000012234-128.dat family_anchor_dns behavioral1/files/0x0008000000012234-127.dat family_anchor_dns behavioral1/files/0x0008000000012234-126.dat family_anchor_dns behavioral1/files/0x0008000000012234-125.dat family_anchor_dns behavioral1/files/0x0008000000012234-144.dat family_anchor_dns behavioral1/files/0x0008000000012234-150.dat family_anchor_dns behavioral1/files/0x0008000000012234-149.dat family_anchor_dns -
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe Token: SeShutdownPrivilege 2076 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe 2076 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1984 2076 chrome.exe 28 PID 2076 wrote to memory of 1984 2076 chrome.exe 28 PID 2076 wrote to memory of 1984 2076 chrome.exe 28 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2856 2076 chrome.exe 34 PID 2076 wrote to memory of 2096 2076 chrome.exe 33 PID 2076 wrote to memory of 2096 2076 chrome.exe 33 PID 2076 wrote to memory of 2096 2076 chrome.exe 33 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32 PID 2076 wrote to memory of 2768 2076 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/MalwareSamples/Malware-Feed/raw/master/2020.10.29_CISA-Ransomware_Healthcare/0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7269758,0x7fef7269768,0x7fef72697782⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2144 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2140 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:12⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1448 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1356 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:82⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:22⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1916 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:22⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3564 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:82⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1468 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 --field-trial-handle=1820,i,16548439057564203301,1060276239955607190,131072 /prefetch:82⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2644
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\CompareRequest.vbs"1⤵PID:2600
-
C:\Users\Admin\Downloads\0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a.exe"C:\Users\Admin\Downloads\0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a.exe"1⤵PID:2680
-
C:\Users\Admin\Downloads\0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a.exe"C:\Users\Admin\Downloads\0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a.exe"1⤵PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5a53a956c8462f540709ca62c542d65e9
SHA1aeaa343ed909959ecaf275bbdb3ca43e0b80cec9
SHA2569dc48b389b0253e8b3e7d2c503204edd2bf8f3ee584b1c16f9905afa90e1390d
SHA512ed733ef5af8f09b4f053328bf0d2d8c8f22b6816934865f8a3cee3af1b3aef5f2090eaf085724b87f8a1e6cc95e45cc9beb1fce627536e512029715b98a9e99f
-
Filesize
5KB
MD5ca7063f8db4f55165a9fa9040d3954cf
SHA10d9b5dff743f1ca15de9ce19c4d03c25618236b6
SHA256fca62c4707bb6d5bd34102e82cff0f0bc4acace045c8545417bf67c4f9d33905
SHA5122e2df36a4ea180c20105b351a85e0c789b2108773211b3296e2fa62c4bab1ada88618b6b3e302f17515039fa2b2971a0ec13fe82f0399eb5e8f88cacfdec9a8c
-
Filesize
5KB
MD5d5cab3cad5f13efcc7babb7e73d81976
SHA13d3122beb452e95467be52d53ce4ad406f6fffa7
SHA256c09dd46a8de2ad6cfd85537eee1fca8a66d3522dbfcfbcb9cd7d1f1c1d22a1e9
SHA512c868ebb3586b27284b0b9add1ede6dcdfb6c0f53f3d935293355ee90e24b0a0ad98f151e37eacb0dbb4f1be3023fb6a919e03ba73dc9b292e580267fae0da684
-
Filesize
5KB
MD5a562d6338a6cdbc3165fe02ce045ba17
SHA177d7dba5c3d3a4d9777d2466aeb60ac18aa63bc0
SHA256b6c7ffb5eaaacda54571533017c15d85da6f067694401eaf6681bc5295e2dae7
SHA512201d4622d7be7f879a3143609c02f770e87c92f5bc3a2560efa68018faa7cfc03b5933293bda7b5896a0c2f8e5a4acee2ca23c9d6ed1be3713c34246335d03cc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\Downloads\0816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a.crdownload
Filesize666KB
MD5754b79913fde2de487e9fc2826b65d57
SHA1c8299aadf886da55cb47e5cbafe8c5a482b47fc8
SHA2560816d66320d221de576c8a9e6af1b05c7656832939876dd99bb8b40029fe694a
SHA5124a2420e2e89757cab2376932ce548f9b31b845f8c99dfd1cdd9a3b53dabed9e3cb11ecf514edeaccd932f277f65397c126ecaf42831f016554d2001034a25a1d
-
Filesize
490KB
MD5fb300c9a6408d5a9ab20d017df9a2ae5
SHA1503db84e065645757bf4339ab02e5ff98a5d36f4
SHA2563c010848c309cc4f38f3fba3be82535e5960480af5b909c5b25dbf8cb749b79f
SHA5125d84b0946f7320a4ec924541e7874d702c68f93bdda3d1092694d82c67a28a67917eabfe73eccfd825b174c6d3e0fe3aed7221d676585f308e462a893d819ec4
-
Filesize
36B
MD59ebdea64611dadbcaffec38c8ff8b1e3
SHA1dd53a2d123705d64cc27e7c83a9468ba51390281
SHA256824b056da7621dc083fb2e81ad26b826bb0f73a52c9332d6b7b90a8422dd71ff
SHA5127e25eefff9bfef482b3b17ad1668d455873ae1befffe9e6196501421b66161f67c6d17c45986a8981183f72fc9ee908580da90e3cf852cb02c678417f6cde734
-
Filesize
85KB
MD50eab3024eaf24a5c2299b0835eefb734
SHA1c6d72883915857e532133210b1612bccf0b3e855
SHA256781402954f09d0951d9186a13e3798ef48ed4b48c464df4c82af1ca1c90cc216
SHA512cad882fd3a75d3d66638d37e17a942d8d20ecb4ac1c795b5d52a3dc90b28ef39dc7743ccf02145cb250c624f5e59f94a064243758d65e65a5bd92c3b549a4355
-
Filesize
171KB
MD52ea79285ca629fb79abab3dc6e5c8ea8
SHA10617ebc56f248347423851e952578028ff395aae
SHA2562f7ec67ab571923d17a82e4c85f774c484893cb5dec5f1dc4205bd8b343aaac7
SHA51202bf203b88822096e15d757e44c0d9ed7b110ea557a5d1285c575fa8b98326784f961bda4ee946324342f9ad747fa2941b999363f009a0a250e84d15695d693a
-
Filesize
100KB
MD55ebcf16656a01b5e7dd0da133cf21bc5
SHA116c1ab0a08e81bd69a2506440d8e80b50bae684e
SHA2563671fafea7422b8a6cb7b4f94dff0283e2e8e443878f755e563adb02fa544f3c
SHA512a0529d2e6ccda29d0c40c3e80be4f84407d6d7d83c12f33f785d4d1080878c5e83254d09758739159c86e21ce8857702546c24d78a901c6d0775173a6ab99316
-
Filesize
381KB
MD5d09b6359d8c9adab794c5933b8effaec
SHA155df01f98fe4446758f9300c5bf75e012416bf9e
SHA256cbdfac668421b623078343a954f8e12fef6d45c998bb2b5edc32ffa49b8c7780
SHA5128fbabc7fca6972f24173c32d1334b1d56b1ff551efbfe3ef28380b7ab4e8e7d9d6ef8e6ef405f533de63c236c052f6b60c6581fede427bcf9e04d7ea94d21ab7
-
Filesize
92KB
MD540651c70727707e827206f3ee8e522e3
SHA11bb8924b2a7487cc24cd42233c2be63fafcbc8c1
SHA256e5913f8970e2763aa3ff524e2ccca761a5d3bad3fc75033ecd64cc5bf7145dd4
SHA512a469067898f08562c0b06b3c224bedef8fbd933d82db9fd3f2bef93080520f98692817f1a717ac55276a6193516be4171f497e2d7305ff890d3647f6136bb58b
-
Filesize
129KB
MD59ef12bec7060201051448712080b7c61
SHA12427b72488da782874b538e8c1af80acc44e884d
SHA256d0530307d2084e3dd938ef05095f295101872264bdf134919226e1f27ce06f53
SHA51294f94be6c4f4cbfdb05b14afdb0031768d218e1bf49d24fa9c5d906b8871c8c67c10a0d530a61037a7ff000d478b52a1181b2bd08caf76a0ddbdcfc701f897e5
-
Filesize
134KB
MD5a8eb5af612ba154736c3ccb9d30d4225
SHA111d8b5e66e80b489d8c3b9fca390e96049a3b16f
SHA256442239f591105b0abc2b6469befffb96a0c9f7a7fa07de40529161ea5160fe32
SHA51230718eaccdd172459330be423099a9ab5ef6e46c69ca6b68a03717ea3a33f945766e916d4071ffd55017692b2a8a90ce5666379923a8c7fbabd796a0ffec08d6