Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 12:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://kansascitystatefair.com
Resource
win10v2004-20240704-en
General
-
Target
http://kansascitystatefair.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 4476 msedge.exe 4476 msedge.exe 2708 identity_helper.exe 2708 identity_helper.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 4496 4476 msedge.exe 83 PID 4476 wrote to memory of 4496 4476 msedge.exe 83 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 668 4476 msedge.exe 84 PID 4476 wrote to memory of 3412 4476 msedge.exe 85 PID 4476 wrote to memory of 3412 4476 msedge.exe 85 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86 PID 4476 wrote to memory of 212 4476 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://kansascitystatefair.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88a7846f8,0x7ff88a784708,0x7ff88a7847182⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3416 /prefetch:82⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6215519306353931688,11568925807358959017,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2d8 0x2dc1⤵PID:712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD56f78880f742ca37572b0a1931203a05a
SHA10bbf9cc7d001b8c926e8be27aa9bcc49f1cb7e70
SHA25618b89d777ac6e2c58d4dfb28bba8104f10885fef35c687dbec2a218aac188a98
SHA51245438896623f8a095fce8557326c1a2f81391cf8cc5bd62246a7a9906cbe75c35b2fcf6a4489ad3e3c8d26f0fcd6d394a35e699d97aeac905943fd6ffc1fd7b2
-
Filesize
1KB
MD533631341d35e1c62138dd99a5046b2f9
SHA1b1c0c1307fca77402c9777d60d88aca085f59780
SHA256ead6ceec895fa9c657ab55599ab1b94a132d6fd1a0036fdf33f02a3584f3ce6c
SHA512e6ee8b7d1371f41375007e34949d824c63765b9abada1b881126dbedd5723eeeb26e40382c831c235b7c96f1374585ed5a97a719164e340b7b138b51f1e20ec2
-
Filesize
7KB
MD55f8c713fb7e83a69c9e539a3db58e0c9
SHA147de162c5273568418d3542a3a9ca98008e4ee09
SHA25688c245284368dc372f64eaf489f35912c898b2dfa7f7e4994b52aa3d92ff6425
SHA512c102335f6c59f2561f8dbe009f15cd794b1268d78db7578b66066fab08f9ff9b2551192b0130aa318f08508c962b57b34eb53c322fc0827cab8b32d45ea3da62
-
Filesize
5KB
MD565619cb1996bbcb26a1d52ee14bdb0dd
SHA1c6960a4106b5a675b730eedc4205f3da63cbef05
SHA2565438fd15fdf140852ab3b02410e724f49ea0cd31ea913cca53b4a79f75facd02
SHA512ffe8c4df8dc37ad1d984aa8e518806828601f02e811638f3fbcdb985daefc819886fe4bf6a6b45c162d2c8e63b70a7086c2070d7e2135614bad5a41c866fbbe8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\97ba9f7f4ba5aae7c09a6b3439e740fdf42eefaa\078d2c86-890a-46ac-af5d-919a4b9075aa\index-dir\the-real-index
Filesize72B
MD53099fd99c135eea5e68201bc2b8c0f5e
SHA1aca274d175245bea5b042acaa341ffd77f059bad
SHA256ac600ccd8068ef773dfd5d392754a9b839120276505c237c02cb1a77075c62d9
SHA512e77f7f55e88872f33304eca5450e1af51cafa0d20e46b707cb7ea185d63d3fc4e7d279767e409d977696e5e8029a087a4e690673c849f043df8a79b2bcc75c87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\97ba9f7f4ba5aae7c09a6b3439e740fdf42eefaa\078d2c86-890a-46ac-af5d-919a4b9075aa\index-dir\the-real-index~RFe58002a.TMP
Filesize48B
MD5b6a78dd69eff598f13a6cd7c26625176
SHA1195ca3459c9e2eb80effe1b0277fbbafae89d19b
SHA256960d3526d789b92fb1c1672d3519e9e3cc13e552c409c48861156486cbabaf17
SHA512720738d11c570f054957af009d991f16b0610bccb9bce262f0c8925588ca4cca5cef796929b215805eeecced3c4f9a8f8aa1adaf182f8a4a6bcf825065047784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\97ba9f7f4ba5aae7c09a6b3439e740fdf42eefaa\index.txt
Filesize133B
MD5a81089081e13a7b357dd4a0fd09ac2e9
SHA173fb477292c09c87b9fc06c88437f092a2f5316e
SHA256e7fc9664b8e8e02982de3edb23cb3ea73696eb9f32d951dc06a583161f8c7d62
SHA512cd97d3c50994af0bb9bbef58b2a0f86ca304df5a8d03da81587a0a51faa9d0830a0c5585b6f3f57280e49996b4cf2ecda07df842ff77a36fd929b37c9b09874d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\97ba9f7f4ba5aae7c09a6b3439e740fdf42eefaa\index.txt
Filesize128B
MD5c2a5b3dd3749b95a3085eed1e6cedfd8
SHA1140c21e1d6fd17cdd59d0b7b8286cc3257efe759
SHA256a44ef29cd0c3703da26f8a13bb5c57a3537d18f6288dfe2c9d916a14992b56fd
SHA5125853959e40182bb8596094485f9511bc847a6f15bbb0cf919681089f5e190f3b4c6f31d147d7a431780177ba77d2333fc00477d951f992644560261360c83de7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize144B
MD5f272e0cb50199875e796bb381d834a57
SHA1e0ddbfac29f3c2559eba9607d08dea9426c76e9a
SHA2563ef0bc67f2411a797edde69ce98478075a29bb0762f51c0e3759c1247ae90999
SHA51266636462117316f42dae0c6b14dd5441673e90a54a8edb31ae3574973c34b5f0add5178c3ab1c85e6c42c57189b30f2643a933c2896caf73bf6ac11bf764cc96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ff5f.TMP
Filesize48B
MD5534acb92fd432ae6d569ed53afe17974
SHA1736154ab874e111404a3b0fd8c0c9275c0f78f22
SHA2563ec62372b140cff3383fdc78dfcfef9a2637812a2bbc5d12ae3acb661982a5a4
SHA5124ca33bac3a0f6e0c99f039a87d930b04492fe4c1d91a975e92007242eae8c455c58edea078a153ded9107dfff4b9e15b8df1f285ca2d479b900add242debc106
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59fbd2b86b3b36169c58580389eeb9ce7
SHA1178bbbf570dbbae9dc6e1632173ffa6f8a7f94de
SHA25673f910a7924c8b8cb6f37bf883d322a63eb6935c88a6cd2ef596ed6d7ce7a1f5
SHA51219438d4d7b431ddd47bbaf11f528598d1473c3579ea94e291ca8e3a5070ee75318e584eff8ff419c9343be6e4aea7fc4ce46cb3e4b6ac34ce0b9b6df425b978e