Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
243s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 15:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ScoopInstaller/Scoop)
Resource
win10v2004-20231215-en
General
-
Target
https://github.com/ScoopInstaller/Scoop)
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 352 msedge.exe 352 msedge.exe 1888 msedge.exe 1888 msedge.exe 3608 identity_helper.exe 3608 identity_helper.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1888 wrote to memory of 568 1888 msedge.exe 86 PID 1888 wrote to memory of 568 1888 msedge.exe 86 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 1264 1888 msedge.exe 89 PID 1888 wrote to memory of 352 1888 msedge.exe 88 PID 1888 wrote to memory of 352 1888 msedge.exe 88 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90 PID 1888 wrote to memory of 3288 1888 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/ScoopInstaller/Scoop)1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeccba46f8,0x7ffeccba4708,0x7ffeccba47182⤵PID:568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5496 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,12890754950294199221,3785261567554595135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5556 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5efc9c7501d0a6db520763baad1e05ce8
SHA160b5e190124b54ff7234bb2e36071d9c8db8545f
SHA2567af7b56e2f0a84ae008785726f3404eb9001baa4b5531d0d618c6bdcb05a3a7a
SHA512bda611ddba56513a30295ea5ca8bc59e552154f860d13fed97201cdb81814dd6d1bca7deca6f8f58c9ae585d91e450f4383a365f80560f4b8e59a4c8b53c327d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5419a1c566b42b86a78816cfdbd8e4e7f
SHA1a311996f3d3e355bea1363130dc1a1412bafc712
SHA256121087022f1ec1adaae708326142233224806e2df588a504bfba1b9b2f3072e5
SHA5120c80c3f4518a81d0bdf45e0db9cdf4515a5a61f928756c0dbfe911630af646edc0d0497ef64f6f2e649ab3c44283d2ce2868bdef059895889049cb9b5ac05b30
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD50bf439df8f21bb5f077e5a0d2c533de2
SHA13462e15eab86b3551fb47614586ccd742e296431
SHA25621e84c83981c55c1a6f9c4733adb9ac5df522333fe77f8a5bd95c9f4eb14d6b8
SHA51216ea58a5a3c6d0ace049ffe41a6cbb59777b945450518480bcdc0bbef277228e383eab217271636dac19a077e26ee0c5d49c0a4779f44a3aa8b94a356baca352
-
Filesize
496B
MD5fdb3de2d34b955e094821ff3f272e29a
SHA13606d81b6dfa2cf39c98eb86c6521d25c1d17311
SHA256f41741e81519c0efa90dfc87456d1089c58fa208977951982c2f130dca1aff0c
SHA5127dcdab3b8d02c1d92b7e945bf8ba39317486c85b66cfea17893250da6645b6bde46f8c5da5d881de7e70add4966e7a067ad1d9c677e16f35bf0b9820e0e9167b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD57f78c3ab0acbf3fb459ad331f17ddfd6
SHA137963a049bd819af72baa22eef02aab79a3e0521
SHA256856e7124dbdf5e0803e88da0a9252cd30d7d395bbaa72513547b604c83c036e8
SHA512068d65772aac26fef5b92047f68ce3be75875a88536035ea7f4d93a311d647abf94c452a2d4833241ab43f336f9f89c3bf7faedff7a55bea17bd6149986807f3
-
Filesize
6KB
MD5855b5dfeb36770d8f7346e83aa3071f5
SHA141f2c29208b44f3b002d36e4129ff4ce13ac895f
SHA2560a3ba3a54eb3ad31be2a0d0be03574e375e1f2dc7ad6019f809d041df3da5e4d
SHA5122bde0272fa571e2a1b390c736612be3b004bd7b3120280aff81749621989e6d750a1bf84b16cf25936359ccfcb003e0aa557e2c0ba228ce6df865e48bc6b1e83
-
Filesize
5KB
MD54e2e5dc35f1458c5f98e5cb78721cbc9
SHA14a73c6c644da899a6e75c07b202707d3332bf4ab
SHA2565857c927fea1449aa1f54cf184d1e5714d4feb557fe0af17cafd1b7b58466166
SHA512c36c95dfcf76a4383a5517a6be9fb65fe4150629b036b480986cb4edc5d157ade6a2a89fe18f06db36f74c100ed94d99e64ce7b27b86b525f3dac3ddd3eb0b0f
-
Filesize
6KB
MD541e3811c264353eac9e609d465b428e7
SHA194cadb749f6aaa0b64bc7109fadee6086eb2a57f
SHA256df8e0c8a3412dd4c035c728854ffbd2ffbce43f0a48d441b43a3d830f79d76b6
SHA512bf9ce5dd48612df2d07c78a338dc961190c26b65baaf99bc347452318c0aed29601e4f0b482cf7a4fbaee8cb4f30f45a36008ef8c7543b3ba2f49f4eeca10321
-
Filesize
24KB
MD5121510c1483c9de9fdb590c20526ec0a
SHA196443a812fe4d3c522cfdbc9c95155e11939f4e2
SHA256cf5d26bc399d0200a32080741e12f77d784a3117e6d58e07106e913f257aa46c
SHA512b367741da9ab4e9a621ad663762bd9c459676e0fb1412e60f7068834cbd5c83b050608e33d5320e1b191be1d809fef48831e0f42b3ecabd38b24ec222576fa81
-
Filesize
1KB
MD557469b0e74c14175a4be4b536130a7c7
SHA1f783c022ce1108cf95b0a0def766c98026c06cc7
SHA2565937a67effa9867059f4f3e384dd200fe141b3b8c6070126239a1ecfe25910d4
SHA512787a22931e1c7ea90f9c5ae2e32da9fa170717b368842f46e91d3c726533800401c0c39e424e58ec8d9a25a92f5fffe1aac4a12eef969accd8a4789633d737e8
-
Filesize
1KB
MD5423792966feabe47db4ab0313a64ec12
SHA1d6c126462ec47211e91f004379a3842885095be9
SHA2563b617a47ad04eb171ef4b6a34414ebd65fdcbf57dd6d328c1a725c2e64d23c07
SHA512d293cfc63693aab34b8f3c826c25dda58303d5a915c90016421b9c16cbfc08800c5e8c77f31d88546fb91e7392b70d4bf4e146f28e52b337e5df7e429dfc6519
-
Filesize
1KB
MD531f06cc72df5d32cac32c10988691fc7
SHA192e6d06a8b68b7fe2ac1cbde63a6947dcb2990b1
SHA2561d602c1afd77a98d156b5b684a5d6c1fe11e0f07f6bf37d1563f8330d42cc58e
SHA512e6a828c5e7fda2e382cabed8158cf7568711e72549ae65729484ef7dee43afe047ac0885d27499d1393c528cef44f3692af1ab9be98dafd7ae74f3397a209fb6
-
Filesize
1KB
MD5e69e7702424e212e1e8d27b18aed9493
SHA129c0d6ab1572d574298397de982f5ad216d12324
SHA256ce0102d74fcc3be9ca9ab7c4960b453afbfbc0deb0cc5f7009f909ff263d572a
SHA51263b2b655006864dfcc00084869e80bc2fccd3ddc37eb0468848104af0859729a15032b437694412bacf0455e4bc3951bdcc487b48fc5bb3b25efeda546b83315
-
Filesize
706B
MD5e15b82e89f5530626eba4bd84e86b602
SHA15196cc327280a11d91f754f828131324c89f87f3
SHA256ecce9224a1f4b47116f25cf40eec9a8f7cd50b77514aaddb40557e043575c326
SHA51289e045ca06f96de488460e530efa909570020bfb3250323ebea3e055425962b80f137157de99d3ad46e9c3fd451506da8ebaafade0d4447a2006399811c435ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55bc2c960fb0557236810877a8d67d7ab
SHA1c257c4f008c0007768c60904136ab48e644de077
SHA256bd6e20106b7bb5e6ed8ab3ad5b864d258c45eea1ded2f07270cfe13a56da9f2c
SHA512ecde876da5f241970ed97a078b39a8f51884a9bc95d5d790f00986fe347f9feb3c6361ea79a1fc372e92c058b6b1bd5a226c86a2973456c57ee97677b3494572