Overview
overview
3Static
static
3YUTK1/Admi...up.asp
windows7-x64
3YUTK1/Admi...up.asp
windows10-2004-x64
3YUTK1/Admi...it.asp
windows7-x64
3YUTK1/Admi...it.asp
windows10-2004-x64
3YUTK1/Admi...nk.asp
windows7-x64
3YUTK1/Admi...nk.asp
windows10-2004-x64
3YUTK1/Admi...it.asp
windows7-x64
3YUTK1/Admi...it.asp
windows10-2004-x64
3YUTK1/Admi...gs.asp
windows7-x64
3YUTK1/Admi...gs.asp
windows10-2004-x64
3YUTK1/Admi...in.asp
windows7-x64
3YUTK1/Admi...in.asp
windows10-2004-x64
3YUTK1/Admi...ge.asp
windows7-x64
3YUTK1/Admi...ge.asp
windows10-2004-x64
3YUTK1/Admi...es.asp
windows7-x64
3YUTK1/Admi...es.asp
windows10-2004-x64
3YUTK1/Admin/Index.htm
windows7-x64
3YUTK1/Admin/Index.htm
windows10-2004-x64
3YUTK1/Admi...me.htm
windows7-x64
3YUTK1/Admi...me.htm
windows10-2004-x64
3YUTK1/Admi...me.htm
windows7-x64
3YUTK1/Admi...me.htm
windows10-2004-x64
3YUTK1/Cont...Sel.js
windows7-x64
3YUTK1/Cont...Sel.js
windows10-2004-x64
3YUTK1/Cont...Pic.js
windows7-x64
3YUTK1/Cont...Pic.js
windows10-2004-x64
3YUTK1/Edit...tor.js
windows7-x64
3YUTK1/Edit...tor.js
windows10-2004-x64
3YUTK1/Edit...rar.js
windows7-x64
3YUTK1/Edit...rar.js
windows10-2004-x64
3YUTK1/Edit...rm.htm
windows7-x64
3YUTK1/Edit...rm.htm
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
YUTK1/Admin/Admin_Group.asp
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
YUTK1/Admin/Admin_Group.asp
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
YUTK1/Admin/Admin_GroupEdit.asp
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
YUTK1/Admin/Admin_GroupEdit.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
YUTK1/Admin/Admin_Link.asp
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
YUTK1/Admin/Admin_Link.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
YUTK1/Admin/Admin_LinkEdit.asp
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
YUTK1/Admin/Admin_LinkEdit.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
YUTK1/Admin/Admin_Logs.asp
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
YUTK1/Admin/Admin_Logs.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
YUTK1/Admin/Admin_Maintain.asp
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
YUTK1/Admin/Admin_Maintain.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
YUTK1/Admin/Admin_Message.asp
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
YUTK1/Admin/Admin_Message.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
YUTK1/Admin/Admin_UpFiles.asp
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
YUTK1/Admin/Admin_UpFiles.asp
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
YUTK1/Admin/Index.htm
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
YUTK1/Admin/Index.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
YUTK1/Admin/LeftFrame.htm
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
YUTK1/Admin/LeftFrame.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
YUTK1/Admin/TopFrame.htm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
YUTK1/Admin/TopFrame.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
YUTK1/Controls/YU_News_Sel.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
YUTK1/Controls/YU_News_Sel.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
YUTK1/Controls/YU_Pic.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
YUTK1/Controls/YU_Pic.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
YUTK1/Editor/Editor.js
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
YUTK1/Editor/Editor.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
YUTK1/Editor/include/rar.js
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
YUTK1/Editor/include/rar.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
YUTK1/Editor/include/rm.htm
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
YUTK1/Editor/include/rm.htm
Resource
win10v2004-20240802-en
General
-
Target
YUTK1/Editor/include/rm.htm
-
Size
1KB
-
MD5
952a303e685294d5f2c8f6d84ffa45f1
-
SHA1
b4f0b33412693ef09ae245558d5d15f75a16acfb
-
SHA256
9d2df087a8baa35025fe06615c52af9d6479f83c9a69d566175eed421545dbea
-
SHA512
6d08b65cad23ef602605a86d17347ff3906bbd88f819021abebee3c6c4a1ce5cc523413c02fb6a7b6d9fdff0f6e20c2a20c070d8c0b916ed30271903e35eb581
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 876 msedge.exe 876 msedge.exe 3668 msedge.exe 3668 msedge.exe 3576 identity_helper.exe 3576 identity_helper.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 2792 3668 msedge.exe 88 PID 3668 wrote to memory of 2792 3668 msedge.exe 88 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 4264 3668 msedge.exe 89 PID 3668 wrote to memory of 876 3668 msedge.exe 90 PID 3668 wrote to memory of 876 3668 msedge.exe 90 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91 PID 3668 wrote to memory of 4812 3668 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\YUTK1\Editor\include\rm.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd72046f8,0x7ffbd7204708,0x7ffbd72047182⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12841553935710314319,16520610113862140812,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5784 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
Filesize
5KB
MD55cc9c610c3a541d13ca21182d1d2e86e
SHA1087a04bf3fd5ee934e185e1463d290d568316de2
SHA256c22f29b097325561bad331ebe9b15f2c111cbe4862f4bf8361ce339a592d1f5e
SHA51272fa4dd7a52c4c3c53ba1033d69d4190d44c4523fb7eaf6f56db3716ba6d54912509e846445c90712952eaf85b4ebc40b96c3e7c40d0003b449689855bb2c553
-
Filesize
5KB
MD5b37b73152204ef039c50a5b1c1b924a5
SHA12d4d82a1ed234ee633c16e6e7fdfc7fbc951ba92
SHA256d50e78e8c0f2384d36d2f42d426cd9e619ca7455d87a19823a18d7622d1bb032
SHA512553a54b55bc375ebc4cfae303bc77374543484decd2e890e519ff4b17d93a26d5c01c9a27d368edf9908af98c9fc6cdce3bbb42b2e82412cbb558bbdd74a5192
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56165560e47dc6f56b3dce0f918c0e48b
SHA1915844472fd158f1fa2d8c771b1f7dc4b0cf15c0
SHA256f6dddac0859e8f21bf8f05f77f4f221f4fd60f5e24d7503bb642fe463aceb0eb
SHA5126c0139922c5b939bb42533a5eafa6ca3ba70c3c07b11b1c9b332f7d336f2281ecba9ba5420f1003e9bf28f509657b1f70f4cad2f86248f85eab86706c32ed43e