Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
165s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/06/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
unnamed.png
Resource
win11-20240426-en
Errors
General
-
Target
unnamed.png
-
Size
19KB
-
MD5
5c0ffadb7a78d5dfeae169e5639874ca
-
SHA1
c976c074236b396fa082bc04db0cbd668597aa57
-
SHA256
44a315d194832d2701d0038989f2a33f52e6b64d0a6407f2d8174be77107ffd7
-
SHA512
e4a7a18675d45fbe446d2581c15784735a00f56f869e4accba5d9a6f5773dfc3c9bc80e8333a14fd6c1ae35db509e6d1e08f37a2a60824c8670a0e63a1d82504
-
SSDEEP
384:aZPgh67G5nwisTHK1g+ixU1/NNlsET70d/KEh1sI3ic:SNWsP+QMvgKEh/3ic
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "203" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 1936 msedge.exe 1936 msedge.exe 4764 identity_helper.exe 4764 identity_helper.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2244 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2244 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3936 MiniSearchHost.exe 5008 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 676 2656 msedge.exe 91 PID 2656 wrote to memory of 676 2656 msedge.exe 91 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 2316 2656 msedge.exe 92 PID 2656 wrote to memory of 1936 2656 msedge.exe 93 PID 2656 wrote to memory of 1936 2656 msedge.exe 93 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94 PID 2656 wrote to memory of 572 2656 msedge.exe 94
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\unnamed.png1⤵PID:1844
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3204
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004E41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:3936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc8e4b3cb8,0x7ffc8e4b3cc8,0x7ffc8e4b3cd82⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2868 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1232 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,12457556861879618157,17042073993112541984,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4816
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:1996
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a36855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58e1dd984856ef51f4512d3bf2c7aef54
SHA181cb28f2153ec7ae0cbf79c04c1a445efedd125f
SHA25634afac298a256d796d20598df006222ed6900a0dafe0f8507ed3b29bfd2027d7
SHA512d1f8dfc7fdc5d0f185de88a420f2e5b364e77904cab99d2ace154407c4936c510f3c49e27eed4e74dd2fbd850ad129eb585a64127105661d5f8066448e9f201d
-
Filesize
152B
MD5ffa07b9a59daf025c30d00d26391d66f
SHA1382cb374cf0dda03fa67bd55288eeb588b9353da
SHA2567052a8294dd24294974bb11e6f53b7bf36feeb62ce8b5be0c93fbee6bc034afb
SHA51225a29d2a3ba4af0709455a9905a619c9d9375eb4042e959562af8faa087c91afafdb2476599280bbb70960af67d5bd477330f17f7345a7df729aaee997627b3a
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD5abf0090b8abad62d8895eaa6ac516813
SHA15e9d4a520d5e2f715479cd758356902f4ed07a68
SHA256e832e8dd0229e312abef4809843ca650b7aa912e99077903b01d3e698bb6c8db
SHA51201c431e215db33b169bc377f1f3d619e86ba80b20b4a8cc94bc47f46bf2efbd098597745590ac0d34035948f58c0c5887645bea5e458eb6ffe8fc7c4ccbe6327
-
Filesize
5KB
MD588b3d2da191a821fd655d9d091511208
SHA1d15cda3d440f8c9df84d3022e878893b268933f8
SHA25665a8e896cc552071e04bcd89efb314597dc463a4e211cee8aac32cef7a088e1b
SHA512234c5680ce40d099890a1d3e93242c27e6a0ac366c4a1d0a3365ba3c876ebfed8bab5b095aad54495b1b9c5e6eca1c0dd93856d3edc6ff932b40ac535ed84476
-
Filesize
5KB
MD55e1ffe62d4054f97e3cb4f1fa70d8334
SHA183c5fd1867beee43eec78d7c8683f3e0e1082d1e
SHA2564eaa171da9f7606feb669b93d5906671f4659b08d755381ffa8644704995b9d1
SHA512d4a7aee74742c5912eceb949052af515f96acb21ab876acac9ca32272b221b12eb193b142d93201c1184142152732d0b030a02a280b86d4eaf429413a6081b38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56835e31f4cb4cc7750e8bd384e080799
SHA123ee0add5bfb9abe0a14c437077709b2069ac7a5
SHA25625dcce54461cbe0aa42aac3435d7f607c631e9eab5cf4f421e94a6bc516591bc
SHA512d66c5f2a73f41ae97676c08f1aed693b7206e54a9d96538801378a5bbb56d66ecb3ce9c7d68b2a8b484e654059c9de6468e0dc8373a2de1db0a1d8ed18abe47a
-
Filesize
11KB
MD56ef6ac4dfe68c54cfac3a08fb3c17cde
SHA1532ea3318411a6958ec01f48f0990d0e4146de88
SHA2568d17b921d304a913df9feb3a02ac80d43bb8d8ba12d4af2dd0a1a09e6e41e678
SHA5121c65f7c990d789e2377c14b37ce920e9b99126abad6982f2a7d0ae6ade471bcdc94270b94daac8b6d45c3f97f071ff8c38e0f521981b934c6277a14c0125aa80