Overview
overview
6Static
static
3docsis_cfg...54.exe
windows7-x64
3docsis_cfg...54.exe
windows10-2004-x64
3Tality54.exe
windows7-x64
3Tality54.exe
windows10-2004-x64
3docsis_cfg...bs.url
windows7-x64
6docsis_cfg...bs.url
windows10-2004-x64
3docsis_cfg....7.dll
windows7-x64
3docsis_cfg....7.dll
windows10-2004-x64
3docsis_cfg...n1.dll
windows7-x64
3docsis_cfg...n1.dll
windows10-2004-x64
3docsis_cfg...t.html
windows7-x64
3docsis_cfg...t.html
windows10-2004-x64
3docsis_cfg...s.html
windows7-x64
3docsis_cfg...s.html
windows10-2004-x64
3docsis_cfg...x.html
windows7-x64
3docsis_cfg...x.html
windows10-2004-x64
3docsis_cfg...is.bat
windows7-x64
1docsis_cfg...is.bat
windows10-2004-x64
3docsis_cfg...is.exe
windows7-x64
1docsis_cfg...is.exe
windows10-2004-x64
3docsis_cfg...is.url
windows7-x64
6docsis_cfg...is.url
windows10-2004-x64
3docsis_cfg...fg.exe
windows7-x64
3docsis_cfg...fg.exe
windows10-2004-x64
3snmp/mibs/...mt.vbs
windows7-x64
1snmp/mibs/...mt.vbs
windows10-2004-x64
1snmp/mibs/cap.vbs
windows7-x64
1snmp/mibs/cap.vbs
windows10-2004-x64
1snmp/mibs/...IB.vbs
windows7-x64
1snmp/mibs/...IB.vbs
windows10-2004-x64
1snmp/mibs/...IB.vbs
windows7-x64
1snmp/mibs/...IB.vbs
windows10-2004-x64
1Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
docsis_cfg2.0.7/Tality54.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
docsis_cfg2.0.7/Tality54.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
Tality54.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Tality54.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
docsis_cfg2.0.7/cablelabs.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
docsis_cfg2.0.7/cablelabs.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
docsis_cfg2.0.7/cygcrypto-0.9.7.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
docsis_cfg2.0.7/cygcrypto-0.9.7.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
docsis_cfg2.0.7/cygwin1.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
docsis_cfg2.0.7/cygwin1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
docsis_cfg2.0.7/doc/config-format.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
docsis_cfg2.0.7/doc/config-format.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
docsis_cfg2.0.7/doc/config-settings.html
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
docsis_cfg2.0.7/doc/config-settings.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
docsis_cfg2.0.7/doc/index.html
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
docsis_cfg2.0.7/doc/index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
docsis_cfg2.0.7/docsis.bat
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
docsis_cfg2.0.7/docsis.bat
Resource
win10v2004-20240910-en
Behavioral task
behavioral19
Sample
docsis_cfg2.0.7/docsis.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
docsis_cfg2.0.7/docsis.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
docsis_cfg2.0.7/docsis.url
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
docsis_cfg2.0.7/docsis.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
docsis_cfg2.0.7/docsis_cfg.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
docsis_cfg2.0.7/docsis_cfg.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
snmp/mibs/brcm-80211-mgmt.vbs
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
snmp/mibs/brcm-80211-mgmt.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
snmp/mibs/cap.vbs
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
snmp/mibs/cap.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
snmp/mibs/ietf/AGGREGATE-MIB.vbs
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
snmp/mibs/ietf/AGGREGATE-MIB.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
snmp/mibs/ietf/DISMAN-EVENT-MIB.vbs
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
snmp/mibs/ietf/DISMAN-EVENT-MIB.vbs
Resource
win10v2004-20240802-en
General
-
Target
docsis_cfg2.0.7/doc/index.html
-
Size
6KB
-
MD5
e9c374514c9452d307de0d074ef95b55
-
SHA1
de5c6d0c2059b841a62d6a86abbeb23ac221b6ec
-
SHA256
2b7e353dd45a3b0f155ef904a9e6c178fcef24d95922ee960df6cd6f62299af2
-
SHA512
97237609c7d968c7a7d3251769b922e4286d415da1f25281957313570bcb6717f184b31c112231553a3ee6d34e49525d1cd503c18f9169acb9651ef10c6a2552
-
SSDEEP
96:jAwfzDRHXNJsCTSTGhricBwmupEnt0gM1kfXxQ8IUAg5w0orw8Z0p8qBNoCcqE:jtt3w9TGViUupEnt0fCfhA2rp8SRE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 4992 msedge.exe 4992 msedge.exe 5092 identity_helper.exe 5092 identity_helper.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1168 2252 msedge.exe 81 PID 2252 wrote to memory of 1168 2252 msedge.exe 81 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 2656 2252 msedge.exe 82 PID 2252 wrote to memory of 4992 2252 msedge.exe 83 PID 2252 wrote to memory of 4992 2252 msedge.exe 83 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84 PID 2252 wrote to memory of 824 2252 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\docsis_cfg2.0.7\doc\index.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28ee46f8,0x7ffc28ee4708,0x7ffc28ee47182⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2468 /prefetch:82⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,4037682575958977691,11112177363971725463,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD56076a6b262e151441f597b3a5ca661a3
SHA121c57e0235ae85ff0e8e17b65cac2dc78e4ad508
SHA2569dd45ce00908391bb5d9170396c33737400eaa6ecbafa0f09915bc9b7e7d8a3a
SHA512187c9d8af7aa9e6616a95b962f04e8b9a0c88b21a33f806fec973edc0803fc6b653e5da217a1cab7b14571e3ba4db8a75b266b6fd3652783c4b5acec5a26bfce
-
Filesize
6KB
MD5334d185b5f6e630ba876a86bb2cd22e7
SHA1f9b8822dfbd99b5d3effde4bf2a32abbe5bf8cbb
SHA256731f2a8feab107c8aaf90e593609ad9bad79f60844ebf01ceada80da9f4adc38
SHA512aa6e0ef861ea584b6b59f3ad1b75ef5ff92adec96e9a9e36ad6d5a4bea0394eda497a52d9835b6ec10ede56c760f16e03a2f87eca64e0a689ac870682d56e2d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52a51e541deda50d4cb9903e7472a1c6e
SHA1f94960583b01dad03734249d44b6e0918e3db123
SHA2563240bac301f89da168fae38f6da58f2628573f10622fee9a8166950a495a0df5
SHA512cb919cd3daab9962b6b9972aeaec7372bdf694d258c04841fe3d3ec481e83758c8c2d50fd5d8b8ffe17e6997afb2f37fa06378c024c8cc8ec3bbbc7c97fb8c8e