Overview
overview
3Static
static
3newChinaIt...ex.asp
windows7-x64
3newChinaIt...ex.asp
windows10-2004-x64
3newChinaIt...tic.js
windows7-x64
3newChinaIt...tic.js
windows10-2004-x64
3newChinaIt...��.url
windows7-x64
1newChinaIt...��.url
windows10-2004-x64
1newChinaIt...ic.dll
windows7-x64
1newChinaIt...ic.dll
windows10-2004-x64
1newChinaIt...ic.dll
windows7-x64
1newChinaIt...ic.dll
windows10-2004-x64
1newChinaIt...��.url
windows7-x64
1newChinaIt...��.url
windows10-2004-x64
1newChinaIt...ic.dll
windows7-x64
1newChinaIt...ic.dll
windows10-2004-x64
1newChinaIt...ic.dll
windows7-x64
1newChinaIt...ic.dll
windows10-2004-x64
1newChinaIt...ic.dll
windows7-x64
1newChinaIt...ic.dll
windows10-2004-x64
1newChinaIt...��.url
windows7-x64
1newChinaIt...��.url
windows10-2004-x64
1newChinaIt...��.url
windows7-x64
1newChinaIt...��.url
windows10-2004-x64
1newChinaIt...n.html
windows7-x64
3newChinaIt...n.html
windows10-2004-x64
3newChinaIt...gin.js
windows7-x64
3newChinaIt...gin.js
windows10-2004-x64
3newChinaIt...d.html
windows7-x64
3newChinaIt...d.html
windows10-2004-x64
3newChinaIt.../en.js
windows7-x64
3newChinaIt.../en.js
windows10-2004-x64
3newChinaIt.../fr.js
windows7-x64
3newChinaIt.../fr.js
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
newChinaItbbs/logic/Index.asp
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
newChinaItbbs/logic/Index.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
newChinaItbbs/logic/NewsToStatic.js
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
newChinaItbbs/logic/NewsToStatic.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
newChinaItbbs/logic/Properties/作者首页.url
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
newChinaItbbs/logic/Properties/作者首页.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
newChinaItbbs/logic/bin/Debug/logic.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
newChinaItbbs/logic/bin/Debug/logic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
newChinaItbbs/logic/bin/Release/logic.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
newChinaItbbs/logic/bin/Release/logic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
newChinaItbbs/logic/bin/作者首页.url
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
newChinaItbbs/logic/bin/作者首页.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
newChinaItbbs/logic/obj/Debug/Refactor/logic.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
newChinaItbbs/logic/obj/Debug/Refactor/logic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
newChinaItbbs/logic/obj/Debug/logic.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
newChinaItbbs/logic/obj/Debug/logic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
newChinaItbbs/logic/obj/Release/logic.dll
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
newChinaItbbs/logic/obj/Release/logic.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
newChinaItbbs/logic/作者首页.url
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
newChinaItbbs/logic/作者首页.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
newChinaItbbs/logic/说明.url
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
newChinaItbbs/logic/说明.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
newChinaItbbs/main/FCKeditor/_documentation.html
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
newChinaItbbs/main/FCKeditor/_documentation.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/fckplugin.js
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/fckplugin.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/find.html
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/find.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/lang/en.js
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/lang/en.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/lang/fr.js
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
newChinaItbbs/main/FCKeditor/_samples/_plugins/findreplace/lang/fr.js
Resource
win10v2004-20240802-en
General
-
Target
newChinaItbbs/main/FCKeditor/_documentation.html
-
Size
1KB
-
MD5
c4947fae882ec83e1a626c75c9ce803d
-
SHA1
39e18fb27e03402c17e04cecf87c85b63e51aef2
-
SHA256
4a85bb7378ee3577d592a797da3dee12dab04a9ee66b9cfc37fa92909d29306c
-
SHA512
ab72e4ae0ceb92a1aa972a9f625ccc558a6f2108cdeb22570186975caa22cb04924ba8e298001ddb2c2f2ff44db1ca4700e78182a789e118a8bddb87ef315bf5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 740 msedge.exe 740 msedge.exe 3436 msedge.exe 3436 msedge.exe 1880 identity_helper.exe 1880 identity_helper.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3128 3436 msedge.exe 85 PID 3436 wrote to memory of 3128 3436 msedge.exe 85 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 4856 3436 msedge.exe 86 PID 3436 wrote to memory of 740 3436 msedge.exe 87 PID 3436 wrote to memory of 740 3436 msedge.exe 87 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88 PID 3436 wrote to memory of 4588 3436 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\newChinaItbbs\main\FCKeditor\_documentation.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xc4,0x108,0x7ffd5dcd46f8,0x7ffd5dcd4708,0x7ffd5dcd47182⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14404404213010552133,16582489582318389080,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD51dde0ade78e9ebc94ecd6e7744eb4fa8
SHA160cde7f10c8a1fa5ba3b91359fa2d486a78e8635
SHA256c9ee8b95d7efa17f6db7c04ad438044945355b83fc8ec2d2c7a66d60a5299f0c
SHA512a548b8044347990566dcbd18dd5c5bc2e125f3f31ba4c3b4614f44b7902e47c6c1d5b090e6b3d23ba4c146ac89b6cd3a06fe4930c1dae0030509e3344af96176
-
Filesize
6KB
MD5a8b7bdfdecdacc5d2cb21bac23e8ea06
SHA1eae9e9f69a3129cbb2db8a58cf512da3e0055f83
SHA256eea223b38452291f8141426a9ee2f5fdee9b621b50a7f11a1649e95a79de8a44
SHA512a52fc49c3aafbe77992e499de2f3cda6d99023ba369b09e941e3495e4739934b453749989d5bfa56aab48c257bdac9bad35583a0c7b767ca69a541903d8e2ab5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c699033a0d9abb64daca88bc4126a1e4
SHA1aebc8bffebdd8a1a3b6af6cb4890d24239d3351b
SHA256143041264304a53ac522bf3640518e8713e081875fa915f271b5920f314fd01b
SHA512c09e21c5aba0f865ce1e6ea799a4fcb4219855560a4125e60a1bb218209f47f3257b64769898dc6d553a14d027ec9320045758c2a193c602d9d8c5d3321d0b2d