Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
WinWord.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinWord.exe
Resource
win10v2004-20250217-en
General
-
Target
WinWord.exe
-
Size
6.9MB
-
MD5
389390bf696737deedaaf10a90d407d1
-
SHA1
87758da2fe832f302032e904eb13994c70023825
-
SHA256
d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734
-
SHA512
4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0
-
SSDEEP
196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WinWord.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WinWord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WinWord.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine WinWord.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinWord.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 WinWord.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5008 WinWord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinWord.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5008 WinWord.exe 5008 WinWord.exe 3632 msedge.exe 3632 msedge.exe 1796 msedge.exe 1796 msedge.exe 2488 identity_helper.exe 2488 identity_helper.exe 5292 msedge.exe 5292 msedge.exe 5292 msedge.exe 5292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe 1796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1796 5008 WinWord.exe 93 PID 5008 wrote to memory of 1796 5008 WinWord.exe 93 PID 1796 wrote to memory of 4156 1796 msedge.exe 94 PID 1796 wrote to memory of 4156 1796 msedge.exe 94 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 2324 1796 msedge.exe 95 PID 1796 wrote to memory of 3632 1796 msedge.exe 96 PID 1796 wrote to memory of 3632 1796 msedge.exe 96 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97 PID 1796 wrote to memory of 3060 1796 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinWord.exe"C:\Users\Admin\AppData\Local\Temp\WinWord.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=applaunch2&plcid=0x409&o1=shim_noversion_found&version=(null)&processname=winword.exe&platform=0009&osver=6&isserver=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0xd8,0x104,0xfc,0x108,0x7fff544446f8,0x7fff54444708,0x7fff544447183⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:23⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:83⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:13⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:83⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:13⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:13⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:13⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:13⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:13⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:13⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,10224728310576912026,10092012535841130840,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3132 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=applaunch2&plcid=0x409&o1=shim_noversion_found&version=(null)&processname=winword.exe&platform=0009&osver=6&isserver=0&shimver=4.0.30319.02⤵PID:180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff544446f8,0x7fff54444708,0x7fff544447183⤵PID:3132
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5010f6dd77f14afcb78185650052a120d
SHA176139f0141fa930b6460f3ca6f00671b4627dc98
SHA25680321891fd7f7c02dd4be4e5be09f8e57d49e076c750f8deb300be8f600de2d7
SHA5126e6c9e348e948b946cfb97478698423e1272c4417bc8540e5daa64858e28be8fda5baf28538aee849f8bb409c17a51c60e48a3f1793e3a86cb27edeb32aa30a5
-
Filesize
152B
MD5f09c5037ff47e75546f2997642cac037
SHA163d599921be61b598ef4605a837bb8422222bef2
SHA256ba61197fff5ed487084790b869045ab41830bdf6db815503e8e064dd4e4df662
SHA512280bff6eac4b2b4fe515696223f61531f6b507c4c863ad9eef5ab0b1d65d264eba74fb7c9314b6920922142b8ab7605792211fca11a9a9ef0fc2ae995bf4f473
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD57dc911050e7c93a48733773d1a0fb67a
SHA10cb1c3f33d53e904a86a3c58f11f19a30f813fe6
SHA25686eb4b850ce6204a41b3be09f2820bfccf1b82b71ecc19b9cd290eab1d227a0f
SHA5124d5611b032e60e4933fed5a9473408c520aac66a2d1bce22e17ab095ab2929beb099e856c7ca2028098a757b4ea9a3326dcbafc97684b5c9a7e8898c4127d6f1
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD5da32c72bfee9dc23f12f071f7dd43bcf
SHA122be9352fa452a5b2e86b86ffb8a3583e86229f7
SHA256e2b444219653c7d0518d8f39d05d53345695c5ada22e99943e87ef8b66d909c9
SHA512a48394f04870285fb9a4c58e1fc8f018ea643f601ce9082d44defd902c4ece9288257383952e6802c06383d9a0a91396ca3859b476679b0dc9788d3b1ec734f4
-
Filesize
6KB
MD5b2bb4fa0802bafdefc6c1a805414db69
SHA18edae122d8654d1891985947dc643abc0a4a161d
SHA25670914637574737a44567d7ac256349a44f7672aa58f40f3df84885a1a9fcfc6e
SHA5128c73c4ae366ea9153787b0922d55a7459503aba803ced2ea0c668913e76a9ca593a9f2c167a800713b2a5025e16c6dc4a3a83be888ba82b328dc7758348bb9f8
-
Filesize
6KB
MD5b3649f8d623624322e924f82f39380a3
SHA118a741e91bf34a0e6e029ba2aadf7fbaf6910edd
SHA256303b2799644d7858b1836f9f40073b70151846420779a03e1434359da23b972c
SHA5120107727a8c0e4b01a2837a4bb43226b8d3ce80f029489bf9c07345387fb4d52d756cdf49a71d37c42e8f1dc3ce5334045cceeaa7053666690cf6ee240fee69ff
-
Filesize
371B
MD5b22fbacc2d213c05b88d65bc45ec8569
SHA1766c5cbbd4f00f6c42473c7ca1ba32acafe8a504
SHA2561f0ae6fbaae5be449eeb87fce7ba0c8a08ab611d680cf032e64ce1429ea23768
SHA512b8ceefc7bdfd888d67652b3aedf701c6da6a183aa1ab2a59c9b69760b89a2060336beaefe0a0976fa089c33d035fe7b796922b23d617c5f7387d1bfc5a5c09e7
-
Filesize
371B
MD5538ec36b650a1cc6772030369aee93fd
SHA1aa723831773f67f514bffbe12e18cb66afb4c286
SHA2564f9d59e8017b588127fb3b020296ffad75c3b07569cf17925573dd49d85b673b
SHA512dc73f819f882e54eb85f1225fec1827d712d065dc171a58b5ed2793c8c26d40e2a778c994c0ca1c59b1c30e3d9d1fd694bfbc3d81577f2bcdf7371232a85b223
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD524aeb9c89255fb627ff19d33db954872
SHA141e85640138f51256b590ab137c986ccb630e768
SHA2561190d82fe1b533037aced1ba6332f39b5dd7a1f223a4ea151475940ca6f71d54
SHA5120c1116062a258bb2b908bef2dca9de47cfac880f7c49b5dad7672410c59cb93c8ffb1e3d10e27879800b7e4a6eac32afab7c7175d04de091751a7496219fe959