Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1692s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
Stand.Launchpad (14).exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
Stand.Launchpad (14).exe
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral3
Sample
Stand.Launchpad (14).exe
Resource
android-x64-20240221-en
Behavioral task
behavioral4
Sample
Stand.Launchpad (14).exe
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral5
Sample
Stand.Launchpad (14).exe
Resource
ubuntu2004-amd64-20240221-en
General
-
Target
Stand.Launchpad (14).exe
-
Size
72KB
-
MD5
9b86bb89406cdc59a1eb586d51d659bd
-
SHA1
3c4d6fdd1ec4e41ff303042cc0f00dbc8f7004e6
-
SHA256
20807c02a31d8abd663beddcede18c65e89077a7661ad2e1552ff61aecc5efe2
-
SHA512
892681337ad5d133470b23263aa557fe8f32d9c40f77a0bb574e5a47c935c806de0105b41ed2a8026392a4c70f44419b1ad3d3782803ccf8ee1169df8b81b5a5
-
SSDEEP
768:DOPg2CdwbmyCLIizV9iKfyyu8fo0Zrgk64eeeDoc5tul5scYhb:C42FKfLfVo0Zrg8VwSl5scmb
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 8210.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3636 Stand.Launchpad (14).exe 2664 msedge.exe 2664 msedge.exe 2944 msedge.exe 2944 msedge.exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 5096 identity_helper.exe 5096 identity_helper.exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe 3636 Stand.Launchpad (14).exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3636 Stand.Launchpad (14).exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe 2944 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3636 wrote to memory of 2944 3636 Stand.Launchpad (14).exe 92 PID 3636 wrote to memory of 2944 3636 Stand.Launchpad (14).exe 92 PID 2944 wrote to memory of 4508 2944 msedge.exe 93 PID 2944 wrote to memory of 4508 2944 msedge.exe 93 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 4184 2944 msedge.exe 95 PID 2944 wrote to memory of 2664 2944 msedge.exe 94 PID 2944 wrote to memory of 2664 2944 msedge.exe 94 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96 PID 2944 wrote to memory of 1004 2944 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (14).exe"C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad (14).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://stand.gg/launchpad_update2⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe68e246f8,0x7ffe68e24708,0x7ffe68e247183⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:23⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:83⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:13⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:13⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:83⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:13⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:13⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4732 /prefetch:83⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:13⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6104 /prefetch:83⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:13⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:13⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14730819166018341895,17358932299937879745,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3048 /prefetch:23⤵PID:1460
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4c957a0a66b47d997435ead0940becf
SHA11aed2765dd971764b96455003851f8965e3ae07d
SHA25653fa86fbddf4cdddab1f884c7937ba334fce81ddc59e9b2522fec2d19c7fc163
SHA51219cd43e9756829911685916ce9ac8f0375f2f686bfffdf95a6259d8ee767d487151fc938e88b8aada5777364a313ad6b2af8bc1aa601c59f0163cbca7c108fbc
-
Filesize
152B
MD5343e73b39eb89ceab25618efc0cd8c8c
SHA16a5c7dcfd4cd4088793de6a3966aa914a07faf4c
SHA2566ea83db86f592a3416738a1f1de5db00cd0408b0de820256d09d9bee9e291223
SHA51254f321405b91fe397b50597b80564cff3a4b7ccb9aaf47cdf832a0932f30a82ed034ca75a422506c7b609a95b2ed97db58d517089cd85e38187112525ca499cd
-
Filesize
331B
MD5ce80d518fd2b81bf53343e1b92c47b9c
SHA1ca306e12129e173db0aae29af766c1468c681ce0
SHA256a46cd6cbcdee438987431194cb011c3fbc26d8abf54f9f28f7aada9e62608e1b
SHA512b5973e0fa27c95a62cf64de7cb9fb1df89e681737d7c513d7f0415fe749e16e20aeb814f97d3c6bebc63f172811b1f037790d77e866413b9a33873859ced0b26
-
Filesize
6KB
MD5dab91c559c7cec0f2e03b70eb3d634d4
SHA19ab9b9a0d35c862f286f0701dabd714ef54d02f6
SHA2565cc253fc33b0e5c9dfd95dd8b2c73d7d931ec740297f62c484e4fb66d46ef35c
SHA5122361f71006a220a5339080fc524a443b878c74d549442d500f23de02519581ac1bb716f21f100e7a01788e8afb8bbc0ab8fd4125670c9cc3dbc61695c7119652
-
Filesize
6KB
MD50c9f18fb16eca068e19462c527c04910
SHA15b795838c2142dc14ba6bbf211b11fc7cc01ebbe
SHA256f0f3c89d7ffc28bf071debe9f3dcb4631fc1e34bc13d2d817456320fea6bf848
SHA512e18877654b6d4a1e9dbe5dd60957cc84aa93637d68ac98069176ce3d119de667c62faf1b9998a834e4b1a7bf0273fd46bf16a3b06a964e69addd397b524d583f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD5e641a0847e05d8afde9731a5b82c85bf
SHA1be322fbef1ea0f02ebdaabd5a217ddecce506d1f
SHA2568029799ff900397f1444355984927af491049778837e7f29eab74616558b0109
SHA5128451c15fb90eb0cd34bf3c9023835d0f68dd41033eba301cb8bb774d0c785af288d8d285383f2a2e1237f025a47da8733fb85a6b9469ca1e33981a726b17a42a
-
Filesize
73KB
MD5f372fcbce87be20833fd4acfd293cef9
SHA156a947b3a75f2630dbf945e92a45d3bb92f10005
SHA25651c1241870f14b654b089c270af03a0176f1ab4d039de955c1cec169cb1e83a5
SHA51296e8a701fd41f7dbeb4bc625c8e1afa7398e3d838082e2ef2862911f8eebc0c3d4bcd0ddbd4130d36a7ab2b4ea53f04a95c10447291b128906b77a95c2753339