Resubmissions
23-07-2024 17:59
240723-wk4grs1hrl 1023-07-2024 17:56
240723-wjg75svcla 1023-07-2024 17:55
240723-whgvzsvcjg 823-07-2024 17:52
240723-wf3pns1hll 823-07-2024 17:45
240723-wbtafa1gpr 1023-07-2024 17:42
240723-v97eaavane 1023-07-2024 17:40
240723-v8625a1fpm 823-07-2024 17:39
240723-v8bafs1fll 823-07-2024 17:36
240723-v62dvs1eqq 10Analysis
-
max time kernel
40s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-07-2024 17:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win10-20240404-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
Petya.A.exepid process 4272 Petya.A.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Petya.A.exedescription ioc process File opened for modification \??\PhysicalDrive0 Petya.A.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Petya.A.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Petya.A.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133662309256425031" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 412 chrome.exe 412 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 412 chrome.exe 412 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe Token: SeShutdownPrivilege 412 chrome.exe Token: SeCreatePagefilePrivilege 412 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe 412 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Petya.A.exepid process 4272 Petya.A.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 412 wrote to memory of 4748 412 chrome.exe chrome.exe PID 412 wrote to memory of 4748 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 1464 412 chrome.exe chrome.exe PID 412 wrote to memory of 3860 412 chrome.exe chrome.exe PID 412 wrote to memory of 3860 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe PID 412 wrote to memory of 3876 412 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc364f9758,0x7ffc364f9768,0x7ffc364f97782⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:22⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1848 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2060 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:12⤵PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:12⤵PID:3192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4624 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5232 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4696 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5592 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5048 --field-trial-handle=1720,i,9831612476020985540,16323802387650637551,131072 /prefetch:82⤵PID:4100
-
-
C:\Users\Admin\Downloads\Petya.A.exe"C:\Users\Admin\Downloads\Petya.A.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5bcbcabb7d3943c865dc20aadb991573d
SHA1406c4cb9892ca06f333f2933c31446c6ac3ad1c7
SHA2560b00169e884cec55dc20a1df1511f47267655249dc8ea4f94e8f998dce2fe887
SHA512688c60d363d6e739f145915c4ce48e3605ba58df770e9b1c3069c7b183fff291d62df18e243f90c5b9fe49a54715165f2c33c01d58b55f2b076a1ab75eca380c
-
Filesize
1KB
MD5808d0801dd366d1d90882f1b9315f443
SHA1e8b25bb9720fc730e3b58ab843d1722b891d25d2
SHA256eb4c2493182d5edac0ca4244c3e13c36f966c1f72df144c594420a587cb906c2
SHA51222fb65fd854d240c84eb32193d29701310ae7d13dac8db66eb67c365797ffd7d6034b760672fdb8be508dc9732904e1055f76c9081a540b37f44dde63fb4417b
-
Filesize
1KB
MD5c3e860af5365b06d2398271a28a985a5
SHA185d714138c6183988f097e0d19197a759aa7f313
SHA256d714fcd197dce8ece1e861fae4b11ba78ce16acecb7a4bec83c566934636d6ab
SHA512cabb24fdee4cdd2bb32270e9efadc1845f86d00640a441001cb1d685b88d912c4ad3d01313eb1814553c0a8b94ba3a18067529d2945b7c8297dda98062c6c50f
-
Filesize
6KB
MD57e52145b4212aa36ef27b1cb31ade19d
SHA1ffb03b7c16db88ba06149ffd7d3b6a25be0f340d
SHA256cc3e2338e06b99e794db4c84e17b1ffac7ea39f3657b290a3ed5371d23477534
SHA512fe9a079f554919bbbff47fac99ee909b4bc35994eb76c538eee19813c4d332775db7024653bf900b71af57625fd7e6c280c8894fe3b4368a4bac8345d3709778
-
Filesize
6KB
MD5eba65ea1c08202be14115c289eee4bc9
SHA156e63256cd276c8aab9bfc374a098b5c887ae95e
SHA2569b1776e2fb316bd804e0d390f9b18ed9043101e354fce2fa55fb9a7d3c0eb44b
SHA512e57e5bbf1e992c40fd5b9bf430777cbafacbbecade04a6f880c89f3d91f226550612ee23675a4439d6e4eac5c4927a981cd92bf18645af57c597c2d8ea357ee8
-
Filesize
136KB
MD577c6ecfb7af6001149d9abadd219b000
SHA18c22f49caca8df24b8c99907230bb5386277ffee
SHA256e424bb943cf0f8f8629dff7c02f7359fcc893cea5c8bb33f303612dd65bc41e7
SHA5120227df2c652967b8fa7ab640d351d7d084308472af6f8863a246baa84ddb69209c3fb893855b83d3309da30d8a8749ce5fd2099612467ed41c9a358a835d0465
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
225KB
MD5af2379cc4d607a45ac44d62135fb7015
SHA139b6d40906c7f7f080e6befa93324dddadcbd9fa
SHA25626b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
SHA51269899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e