Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/08/2024, 05:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/raw/master/Banking-Malware/DanaBot.exe
Resource
win11-20240802-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/raw/master/Banking-Malware/DanaBot.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2404 DanaBot.exe 3484 DanaBot.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 10 raw.githubusercontent.com -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\DanaBot.exe:Zone.Identifier msedge.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 980 2404 WerFault.exe 96 1532 3484 WerFault.exe 108 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DanaBot.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3007475212-2160282277-2943627620-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\DanaBot.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 338211.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4852 msedge.exe 4852 msedge.exe 4448 msedge.exe 4448 msedge.exe 3700 msedge.exe 3700 msedge.exe 5068 identity_helper.exe 5068 identity_helper.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4616 4448 msedge.exe 81 PID 4448 wrote to memory of 4616 4448 msedge.exe 81 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 3380 4448 msedge.exe 82 PID 4448 wrote to memory of 4852 4448 msedge.exe 83 PID 4448 wrote to memory of 4852 4448 msedge.exe 83 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84 PID 4448 wrote to memory of 5008 4448 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/raw/master/Banking-Malware/DanaBot.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd4a053cb8,0x7ffd4a053cc8,0x7ffd4a053cd82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Users\Admin\Downloads\DanaBot.exe"C:\Users\Admin\Downloads\DanaBot.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2963⤵
- Program crash
PID:980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,11511181295684618890,1584331740517278849,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:1096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2404 -ip 24041⤵PID:4308
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4872
-
C:\Users\Admin\Downloads\DanaBot.exe"C:\Users\Admin\Downloads\DanaBot.exe"1⤵
- Executes dropped EXE
PID:3484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 2602⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3484 -ip 34841⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e1dbd7ff84c7c9657b22b43c18064e5e
SHA127947c49ecf5a742d93b5d7bf2b183d83558da4f
SHA2569bd81ccb426569a5f07c0faeafe7cc2b155e49b271be2ecc0e53e5c641d86895
SHA5123b557d81bba7ae2a69df66ba45d4947d4ed6405840c6b33950aa344296a5998b17edf876c7d6e12f6f2dd83077ec27891f352d63ff634b7d06403790cb268c1b
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
6KB
MD5623c1e95ba0acf858f3f00b01d8de8c1
SHA12663a719310e36fb6ca3db01d79822c2c9c55e10
SHA2569520cdfb74d64cdf8eaaf34b46cc3eab97cf2d0466f9fe6a28719614f9e44460
SHA512d402eb331083cd4c78c34d42c19f8dc92fdb3ebe9eaa83653f55749b30ac0b7fe02dd5126aee1e317f7bbb97f20c91a07a4ef71611409e72435e43d28fb221c8
-
Filesize
6KB
MD5e5f23b7d0f103c7aa866dd9c22a7cdd6
SHA154eafeb7a076294c77e805f8ae06d940cce0418f
SHA25696d15f50371bda0db1ef6840d4fe6c82ca4b2bbfede5b31cf5960b0d0b900f94
SHA5129d14d612254dffdb73e9543f3b706ba4d2aec4ca0874a18542b0b2093f407ad41b4a2878c902b8e703e5d45fb4a24245a9db7a224ca9031944e2cc6d75519498
-
Filesize
6KB
MD537afda84fda01da6d005ae2aa9ee6dc2
SHA17220662cb7cc6fea57add1dde6d97903e970d1f6
SHA2567b2852622c71436a36306adad2ae8362a24edf7cac8b82ef88ce9aa9df71f006
SHA512048bb46fa51b0631b12d70ac4cb0e4a9abae27e18cb9e7cf31088fc307a381fbc499111dc12a10575156607b27ec89cb4e87ce1073193cbbca0e3825b89d871f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b7c0fcf55eef288befaa6cbc2a954ad3
SHA1c533ccf58fd897b50cdcecbc266bf1be4623bb86
SHA2567212a0b8cdceb3e922bcec86184c9bb5dbd7102cea6580cd3891359615bc8c78
SHA5127ae75154d2cf8cc907d97e57611709d9317d1133801019f44b4a31f9ec58a35b14f95cdeea3765113a758c8352a09ef0512abe9eb19faaf49d2410dfdc425dbe
-
Filesize
11KB
MD5a22201c5bea5c6c748550312d8fa4d24
SHA1b63c143b95871439281685895c9a67efe5351a5f
SHA256eaf010138be7cc23cba040588352a86ce883f66959034693e91ad6c1a34aa01f
SHA512cad168b85f4c9b73753899cb972a977c405a1ae891845acc84b0c49dcddf3da99c2be8e8790d3ba7c33b5d6b69f0b04054b7cb929cf6f0c16c196294a80ac1b0
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
2.7MB
MD548d8f7bbb500af66baa765279ce58045
SHA12cdb5fdeee4e9c7bd2e5f744150521963487eb71
SHA256db0d72bc7d10209f7fa354ec100d57abbb9fe2e57ce72789f5f88257c5d3ebd1
SHA512aef8aa8e0d16aab35b5cc19487e53583691e4471064bc556a2ee13e94a0546b54a33995739f0fa3c4de6ff4c6abf02014aef3efb0d93ca6847bad2220c3302bd