Analysis
-
max time kernel
363s -
max time network
379s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 15:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/appdownloads/software/raw/main/upnp-portmapper-windows.zip
Resource
win10v2004-20231023-en
General
-
Target
https://github.com/appdownloads/software/raw/main/upnp-portmapper-windows.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 5000 msedge.exe 5000 msedge.exe 1564 identity_helper.exe 1564 identity_helper.exe 2952 msedge.exe 2952 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 4900 5000 msedge.exe 85 PID 5000 wrote to memory of 4900 5000 msedge.exe 85 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 4276 5000 msedge.exe 88 PID 5000 wrote to memory of 3740 5000 msedge.exe 87 PID 5000 wrote to memory of 3740 5000 msedge.exe 87 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89 PID 5000 wrote to memory of 2804 5000 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/appdownloads/software/raw/main/upnp-portmapper-windows.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe129b46f8,0x7ffe129b4708,0x7ffe129b47182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17794013752610480629,9517678614997639826,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\Temp1_upnp-portmapper-windows.zip\UPnP PortMapper\node.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_upnp-portmapper-windows.zip\UPnP PortMapper\node.exe"1⤵PID:1816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f4787679d96bf7263d9a34ce31dea7e4
SHA1ebbade52b0a07d888ae0221ad89081902e6e7f1b
SHA256bfcadaffd49f5351acf68b8249b32270424bc2459125818492cd3224662a9a87
SHA512de3f3d1cd602bddb664bd0d2aecb661204dd239b278b1f03d6b9dca6f3d03bd3041ac42f4382f5edf5b310b17ff9ecddff59f16729e8c095625040a364252307
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
263B
MD59c8fd72232d8177addc83e8bec76a0c8
SHA152d109dabe914a8d44d878a9dc0433a4c6533d9b
SHA256f67730883c87106de4b9cab8b405f4da52db4a5205d4aed3acf6463444bd9437
SHA51244959f18b21037561bbe2e0adcb496886847b1f9a9106a47268384c64ce74d003dd2a49d1b6e0640a6022ec3851b7af2054d52670982677a5894031a23a5b9cf
-
Filesize
5KB
MD5c151e961de5ec91037755d94e88585a1
SHA141ceac7413f22aea4cf72a3967ad2cbf18d287c3
SHA256a59be7e63951136daffc57453ed03c6c160798eaa172bb116987374225767feb
SHA5122063ffe01db0b772286393cabb391ee9c6739ada66b885fcbfdcf61d6ecef558071971dad550f6cc8b9a51dd8f3c5d9652c251de90c9087ea7946a1b2425b672
-
Filesize
5KB
MD58a0739b826e811877e3908ffeee854db
SHA1d5b763031dc76cfce30b08866603f3cb92ca5aea
SHA2564bc54e54b03227a066ba0b2ea75d638aaef79b9bf0795f0c8829a6732c5229e3
SHA512dd31efa212516e738b016119a06ab1e807279f8abf603e8ecc653d69736adedf6ad3142e16aef6042361f97d4b4adfd90e89a6584274ec31397a0ddd82db3c6b
-
Filesize
5KB
MD5810bcbbd3efb3d2a5d308589d7abecc4
SHA1c8d62c87ca03dc3499a456ef79a0b9030792bf72
SHA256f33880b92c4f4a4467fdc2ae064c7d8bd9b96d210d8f4eb349dd5f28275c7540
SHA5125f27c6d58655540235e004559245199b8fa7c314edeb45b20fe2305de8e55a06dca63358a98a3db61d345d94e1695af760464eb9fcea60c9a44f1ef4ce33c620
-
Filesize
24KB
MD53a748249c8b0e04e77ad0d6723e564ff
SHA15c4cc0e5453c13ffc91f259ccb36acfb3d3fa729
SHA256f98f5543c33c0b85b191bb85718ee7845982275130da1f09e904d220f1c6ceed
SHA51253254db3efd9c075e4f24a915e0963563ce4df26d4771925199a605cd111ae5025a65f778b4d4ed8a9b3e83b558066cd314f37b84115d4d24c58207760174af2
-
Filesize
371B
MD5d33d88156ec45fdb452b553ab682a060
SHA1c499f04a7034aafcb777a5b4c42f95b3bcfc6bfe
SHA256dd8aa9c6d6e4df6536cebc45d1ca4f33752b6b132ac12db2c709b6846cf4516c
SHA5121cc6bb8d28fb8e9ecf2b7f882344c40a75b3a3a80637d699aac854bcc5634c1565bffa0b77140f3fca33c6ef327ce20f299cc1b79955b8aea8921c17a3ede220
-
Filesize
203B
MD52b8f087bb5b70897c8b815dfcf44f0e3
SHA1161854aedea5e869f826b5bac67f57cbb464f742
SHA256c7fd3b00fcbce12210ad07b3f4eb6e6f18ef28bcb75b1ba8d75aa10d506ceb74
SHA51229d0452a500bc6b02798f1978e63ae87a7a0a9d5cb3d3ea5744373e8aacb6c6832d0d7f402a90672dadc5b6550c2f2217b108ecdcf25296ac853b3c42b6ee628
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58eca9d8f2c44cf324548af0767b02ece
SHA10c2170814c429ce4be277cc9ef747ed3aa910e5b
SHA256bb44b3e3e55fe36c598f1cd784cc94e9c11089ceb46fc5a641e63b4d208041b4
SHA51288ed5d5e03ed64d2d499dc14104b1bd7cfd271c003d218ce1d4d8af8fdb6b76f4e89d9e667b49f8f81096c745efc3178cae855b8b4b007623b293abdb6735b28
-
Filesize
405.2MB
MD5b81ae2d8ab17fa20a437c80ad85a7890
SHA1a2ef28de953a41253d92d0784991981d0b46eca6
SHA256fbce45527387c25b256153d311d0128f92bcc50993e5a325c3822da661139f48
SHA5126e093e5bad713db93c7050770769d5863e5b2ba595eb4d0acb7d79a0de92c41f55812c546db0fe6efcab68624437b6ebb73d341f8f709094fdf558f799edc395