Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/09/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
.docx
Resource
win11-20240802-en
General
-
Target
.docx
-
Size
12KB
-
MD5
05ada11b53c18ab4209c1c5544aa0606
-
SHA1
1208888095fd5dfbf57bb9fe5f01cd73a600931a
-
SHA256
da15d2cae2e6e0726684b992638888f0936d9550825e6816d9845f3ea52d3a20
-
SHA512
1d007502aff2363329c6fb8d15e184ea61720fc7ad4bb7647bc11b9a02e20a3bfbb0257b0f43bb524c98636cd93d73a454f1bd26548e7f91b9ca54dc05127164
-
SSDEEP
192:CtNCdd8ONqhdI7IKtN05UkFDHhX3ZRBEU5JywZaJVaPwHaqKbHZEnWcmVWSv:aNzG11tvkFFJRPgytZEnWpVbv
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1848 WINWORD.EXE 1848 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 1044 msedge.exe 1044 msedge.exe 2104 msedge.exe 2104 msedge.exe 2304 identity_helper.exe 2304 identity_helper.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE 1848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2488 wrote to memory of 4040 2488 msedge.exe 82 PID 2488 wrote to memory of 4040 2488 msedge.exe 82 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 4460 2488 msedge.exe 83 PID 2488 wrote to memory of 1044 2488 msedge.exe 84 PID 2488 wrote to memory of 1044 2488 msedge.exe 84 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85 PID 2488 wrote to memory of 3320 2488 msedge.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd49993cb8,0x7ffd49993cc8,0x7ffd49993cd82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2552 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3408 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1940,1050475693838441854,6701325648555902995,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3804 /prefetch:82⤵PID:2544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54bf4b59c3deb1688a480f8e56aab059d
SHA1612c83e7027b3bfb0e9d2c9efad43c5318e731bb
SHA256867ab488aa793057395e9c10f237603cfb180689298871cdf0511132f9628c82
SHA5122ec6c89f9653f810e9f80f532abaff2a3c0276f6d299dce1b1eadf6a59e8072ed601a4f9835db25d4d2610482a00dd5a0852d0ef828678f5c5ed33fe64dddca9
-
Filesize
152B
MD5b4ae6009e2df12ce252d03722e8f4288
SHA144de96f65d69cbae416767040f887f68f8035928
SHA2567778069a1493fdb62e6326ba673f03d9a8f46bc0eea949aabbbbc00dcdaddf9d
SHA512bb810721e52c77793993470692bb2aab0466f13ed4576e4f4cfa6bc5fcfc59c13552299feb6dfd9642ea07b19a5513d90d0698d09ca1d15e0598133929c05fe1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5a5dd4d2ca94028bcff451641468297a1
SHA1dff33629319507f7ae4001be6f2be9b231ac0597
SHA25672be82b46cbfa7444f2a60a3da08ea2fb33fe52083df34e9f496cc32a0bdcfad
SHA512207a76947b61f15e11b200947484e2501d7ff8de709d4d165b951694ab3bd4eef90982bbe5c715812e16693a297a77931e1dd793120d402ceb09e1415b269264
-
Filesize
2KB
MD59fe3e595fba69a02f0ca2a6c9b25b88d
SHA179d8a1c868dcb41e9bbe39ff6946fd55c53ee352
SHA2564b820030d6140acbb269ea00c06338a08a2d656debdb497e544f7f04338c86f6
SHA51254b53d321bd07b68d517f1cd776bf3ec9679408feca218d699f1e1f474abc228491cbc2b5d58befd764c53e95c6f581c464e91e59a4e3fca416982ffa55f4f62
-
Filesize
5KB
MD5fec8d7c0808b536455f72894493b3af1
SHA195b0e2c3613fec5cad68e8b8c090bfdb9488c5eb
SHA2562f4e20e6a6f2e662b22adfc65ed63bfaa6b93e1ec6c71e55030c850bcc7b3665
SHA5126d091a5477afa5af8fe517cf21a97e8a0e0713c6cb715d904e0f6c5fc32cc2ca37362e8754563e27b962a281372499322e528268ae561e3b099fc4a36a38b9b0
-
Filesize
7KB
MD5e8cf9f36f5c058bbc63d773812c580e9
SHA1f1b3e262c92dca293cfc1141996399d5f2116640
SHA25609baf01bb814ecb2131188d503fcddf86b5cac0e56b6e23f85701908e9361720
SHA512df98f675355f6efaf486684a25501e434bb9ced8661c920d1cb399a346dd283bf3fb568d397504ef0cc459a7c976042a128bc5b87981387c66211fb948f0b3c7
-
Filesize
6KB
MD5d1970852723ad40b970a7e8450aef624
SHA1d5f791f6e2846717cf56614eaa6acb19756cdc39
SHA256b1990488006ffb8beccedb41231a00bd11250cfa6656dc9f533e969f77192a3e
SHA5125aefa3aa216a89bde6b44b3031d29b13088c4adad15bd1dea2163638ff02745431a629826eedfd37a14fc6c22cf4062c34e15d10fa1eccbc3fd31ef0bc13359d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e2e0f3c89b751d905f94a272bbf1708a
SHA1793198411e9f9d62b7b3dc87dee39669130826ee
SHA256eb1a190a32952547f69467d3c6dcaa8e17aa1f5db043c711337d5c7f1f361e16
SHA5121c957dabf68aef8313c5d01372760152b8e562aa4ea3799fbd76bdbcfca14665e9fa7e0a2dd03d43cd8ff7b20afb04d25c056f624f358ea710624829f55db125
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f