Analysis
-
max time kernel
300s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1265468121448185966/1266075546098466938/FovPakMaker.exe?ex=66ad0ebc&is=66abbd3c&hm=16115e47c13a7a003c4cdf58293e8d832ab5de789d42beb1ba6453952f3edde6&
Resource
win10v2004-20240730-en
General
-
Target
https://cdn.discordapp.com/attachments/1265468121448185966/1266075546098466938/FovPakMaker.exe?ex=66ad0ebc&is=66abbd3c&hm=16115e47c13a7a003c4cdf58293e8d832ab5de789d42beb1ba6453952f3edde6&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1844 FovPakMaker.exe 652 FovPakMaker.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 18215.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 976 msedge.exe 976 msedge.exe 2368 msedge.exe 2368 msedge.exe 1752 identity_helper.exe 1752 identity_helper.exe 1284 msedge.exe 1284 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1844 FovPakMaker.exe 652 FovPakMaker.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1844 FovPakMaker.exe 1844 FovPakMaker.exe 652 FovPakMaker.exe 652 FovPakMaker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3148 2368 msedge.exe 82 PID 2368 wrote to memory of 3148 2368 msedge.exe 82 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 3052 2368 msedge.exe 83 PID 2368 wrote to memory of 976 2368 msedge.exe 84 PID 2368 wrote to memory of 976 2368 msedge.exe 84 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85 PID 2368 wrote to memory of 584 2368 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1265468121448185966/1266075546098466938/FovPakMaker.exe?ex=66ad0ebc&is=66abbd3c&hm=16115e47c13a7a003c4cdf58293e8d832ab5de789d42beb1ba6453952f3edde6&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb3d2646f8,0x7ffb3d264708,0x7ffb3d2647182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
-
C:\Users\Admin\Downloads\FovPakMaker.exe"C:\Users\Admin\Downloads\FovPakMaker.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Users\Admin\Downloads\FovPakMaker.exe"C:\Users\Admin\Downloads\FovPakMaker.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6875205569557663716,14494158504035158416,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD516d2cc2d8a8347e405d36323b4e6ea99
SHA1ea695aa245d20b1e1141f4c18ee5e56f810614b4
SHA2565455c3741232efafea8e3b155a0fecb660800e2e0f19cd2d720281f7cdcbbc23
SHA51285d9d1319d4b4f8442e2fbd22951d7a2836f6456f18062508a5d22031d829a23a1a4453283f2194312ec444eef57fe09ca393c5c1536efabb7495fd301433343
-
Filesize
152B
MD5ee3b30a1359db628dcaf6b053a049740
SHA135bb7a4d99bce5d4ff9e080b6078dd8d9ca9cb1d
SHA2563d145dcba409bab26909c6090fe80bb55a0c030d226f26bb4e04b1bd495f5212
SHA5126825eef8c8fc940d1e21c31e8643f969386fc5c5f467b6ae4a6709dd09f35632bfa2b87f3bc828a8dc6d70533dc7fbfcef6772e2b73586286680f4b567d92c7c
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD58019bb04b812d51f6ee85469fa01d477
SHA194edc25c3d088b69f2735ca6afd68cba72fc1e6a
SHA256b73b3c2f40b0983eaf796ddc42ad281c6b8751e03ff7b426a87884a3972540ad
SHA512cf06e9014bcc21158f5a2f4d26a5c8547742432d4e3b03aa4d638b20fc8705454780dd2a203a9d268b065a1e88ceb15b669d33011f9f51e596a23fcfc0c2ce0b
-
Filesize
6KB
MD5530349493b41edf8ee7deb62a6b5a3bd
SHA1b30c6bcb365e36bffa940f27cfe44411b1b7b3b8
SHA256b82580095d4a7fa0ac9cd7c984f8bf31d547aec043c68e43111b426be3365ca6
SHA512ce04a07acc9d32e09c02819444f15c232a953306297fbd6c3f2a8a00c3c1704d4f55195fda18777961d3d75f356ec217d1ad18023cb1789d40c75f36064ebd15
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5387cba916216722213944a3047f74c4d
SHA1211950ce1e462b9b757352143e01b9d454f725f1
SHA25699065e869f752f0181091cdcddcbc067b9885b85aaf28a4e3e3244ddfb0e0f54
SHA51271a06c9944bf1678b5e66f25c511234880a8c83af4405e24d66573eeb20e0c17dee6c962c8de6383d6192c7a54f054bc6a65ee527e9d93c7e60231ea9ba95c84
-
Filesize
10.9MB
MD57d22b09dfd1bcabae58f5ff53d542ce5
SHA1214fdcd04b1d3d34f28a7bccfd8e1dd8181d5032
SHA2564c131524df61149737596009c3b5043667b87137a4848bcd490fd4691d5997a1
SHA512c1c2ceeed881412834de3c8ee06a96e1241da8222f9df0c64e41c3ebf2be39b35e6b0a27beb5ee52f0b2be1927683fef4acb01e6e45e840fd6bd0f643783215c