Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
Stand.Launchpad (14).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Stand.Launchpad (14).exe
Resource
win10v2004-20240221-en
General
-
Target
Stand.Launchpad (14).exe
-
Size
72KB
-
MD5
9b86bb89406cdc59a1eb586d51d659bd
-
SHA1
3c4d6fdd1ec4e41ff303042cc0f00dbc8f7004e6
-
SHA256
20807c02a31d8abd663beddcede18c65e89077a7661ad2e1552ff61aecc5efe2
-
SHA512
892681337ad5d133470b23263aa557fe8f32d9c40f77a0bb574e5a47c935c806de0105b41ed2a8026392a4c70f44419b1ad3d3782803ccf8ee1169df8b81b5a5
-
SSDEEP
768:DOPg2CdwbmyCLIizV9iKfyyu8fo0Zrgk64eeeDoc5tul5scYhb:C42FKfLfVo0Zrg8VwSl5scmb
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 524491.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 4404 msedge.exe 4404 msedge.exe 4628 msedge.exe 4628 msedge.exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 4616 identity_helper.exe 4616 identity_helper.exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe 1672 Stand.Launchpad (14).exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1672 Stand.Launchpad (14).exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4628 1672 Stand.Launchpad (14).exe 92 PID 1672 wrote to memory of 4628 1672 Stand.Launchpad (14).exe 92 PID 4628 wrote to memory of 3788 4628 msedge.exe 93 PID 4628 wrote to memory of 3788 4628 msedge.exe 93 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 1692 4628 msedge.exe 95 PID 4628 wrote to memory of 4404 4628 msedge.exe 94 PID 4628 wrote to memory of 4404 4628 msedge.exe 94 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96 PID 4628 wrote to memory of 1952 4628 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (14).exe"C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (14).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://stand.gg/launchpad_update2⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94fd546f8,0x7ff94fd54708,0x7ff94fd547183⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:83⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:13⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 /prefetch:83⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3404 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:13⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:13⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:13⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4644 /prefetch:83⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6072 /prefetch:83⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:13⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:13⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,16778507155062012154,5387409626217158777,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5836 /prefetch:23⤵PID:1368
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53782686f747f4a85739b170a3898b645
SHA181ae1c4fd3d1fddb50b3773e66439367788c219c
SHA25667ee813be3c6598a8ea02cd5bb5453fc0aa114606e3fc7ad216f205fe46dfc13
SHA51254eb860107637a611150ff18ac57856257bf650f70dce822de234aee644423080b570632208d38e45e2f0d2bf60ca2684d3c3480f9637ea4ad81f2bcfb9f24d5
-
Filesize
152B
MD558670ac03d80eb4bd1cec7ac5672d2e8
SHA1276295d2f9e58fb0b8ef03bd9567227fb94e03f7
SHA25676e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8
SHA51299fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff
-
Filesize
331B
MD5ce80d518fd2b81bf53343e1b92c47b9c
SHA1ca306e12129e173db0aae29af766c1468c681ce0
SHA256a46cd6cbcdee438987431194cb011c3fbc26d8abf54f9f28f7aada9e62608e1b
SHA512b5973e0fa27c95a62cf64de7cb9fb1df89e681737d7c513d7f0415fe749e16e20aeb814f97d3c6bebc63f172811b1f037790d77e866413b9a33873859ced0b26
-
Filesize
6KB
MD53ac39948c01bbb2a7ca6edb7a5e594ab
SHA196e53454fc1d403ca4c1523128b5ad8fe62a76d4
SHA256285c33a49f0f126ef4dbacbafac6f4c49b89ef35de0b5a60945a209395478abf
SHA512e873a6bf00f9f4eb120bc26759fb2e6c89b8b7c12da49110d206d8519a3ad8af93a6153b99e7e4f53d75b03ac061dca7d80e7f0607a600159189bec41c7133b5
-
Filesize
6KB
MD513e7246f59d1eebd3ffcd8569adee991
SHA1a17e1cd921eca1c4ca76b9ce27487632738fe6ff
SHA256c15b1c38211e2bf70838afeccd5aa17244fec6cdb59f1eef272b7d62180f8813
SHA512ce34408efbb8e8b1ec0e23521992b985ee627a038f25b1f42d1fe35475a7e7bd1077528059ca5de851225c4416ef68b6ec4897f84bc4fd4890c6541b3f3c9856
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5702c7becb7bb2cf02772636ede993759
SHA120c5f18200888f6b7a7617c88b8c12ee2b661437
SHA2567a50aeea21d97e98545bc0f6c78b4a41b41cc1683fa5e34840eee68f8a0f89f6
SHA5122c038e3cd6f47c9b2407ccfcd55050f425e94a2ca9be508b3fd55f6373ac04ae0570b8a99f4b46b321fdb06b51da6e06f18382b28b08f768dadf57c95dfb5d6b
-
Filesize
73KB
MD5f372fcbce87be20833fd4acfd293cef9
SHA156a947b3a75f2630dbf945e92a45d3bb92f10005
SHA25651c1241870f14b654b089c270af03a0176f1ab4d039de955c1cec169cb1e83a5
SHA51296e8a701fd41f7dbeb4bc625c8e1afa7398e3d838082e2ef2862911f8eebc0c3d4bcd0ddbd4130d36a7ab2b4ea53f04a95c10447291b128906b77a95c2753339