Analysis
-
max time kernel
41s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 12:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1306307977728364556/1307107076430102640/SteamtoolsSetup.rar?ex=673db713&is=673c6593&hm=964e5ddb0dfcefc75b68a8c34dfb010a3ccff52deabfe40d316b93c6469315ec&
Resource
win10v2004-20241007-en
General
-
Target
https://cdn.discordapp.com/attachments/1306307977728364556/1307107076430102640/SteamtoolsSetup.rar?ex=673db713&is=673c6593&hm=964e5ddb0dfcefc75b68a8c34dfb010a3ccff52deabfe40d316b93c6469315ec&
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5828 SteamtoolsSetup.exe 6132 SteamtoolsSetup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1964 msedge.exe 1964 msedge.exe 1664 msedge.exe 1664 msedge.exe 3004 identity_helper.exe 3004 identity_helper.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5684 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 5684 7zFM.exe Token: 35 5684 7zFM.exe Token: SeSecurityPrivilege 5684 7zFM.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 5684 7zFM.exe 5684 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe 3448 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2204 1664 msedge.exe 83 PID 1664 wrote to memory of 2204 1664 msedge.exe 83 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1648 1664 msedge.exe 84 PID 1664 wrote to memory of 1964 1664 msedge.exe 85 PID 1664 wrote to memory of 1964 1664 msedge.exe 85 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86 PID 1664 wrote to memory of 756 1664 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1306307977728364556/1307107076430102640/SteamtoolsSetup.rar?ex=673db713&is=673c6593&hm=964e5ddb0dfcefc75b68a8c34dfb010a3ccff52deabfe40d316b93c6469315ec&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc11d46f8,0x7ffcc11d4708,0x7ffcc11d47182⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7588980546295746391,9772576408086381953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3448
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5568
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\SteamtoolsSetup.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5684
-
C:\Users\Admin\Desktop\SteamtoolsSetup.exe"C:\Users\Admin\Desktop\SteamtoolsSetup.exe"1⤵
- Executes dropped EXE
PID:5828
-
C:\Users\Admin\Desktop\SteamtoolsSetup.exe"C:\Users\Admin\Desktop\SteamtoolsSetup.exe"1⤵
- Executes dropped EXE
PID:6132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
5KB
MD57a8d6fe7480975fda5f993cf5bc1d4cd
SHA1a779bfe4e856b12b625463f08a0fa8405678a0d1
SHA2566da9fd975e8bf2d530fa3047fd5902531744537658641290f454ace4a6e5aa60
SHA5124dfdb648ec8b1b55fced463bdb21211dc443888e1046789f64013bd685e06c1ffbcdbc7082bfbda076410b8e1ea7fb07906c26226ca1fa34e7923823ea7f8f62
-
Filesize
6KB
MD58ea9914510c6ee88d21ad9a1e758ee6e
SHA16d8ffe51456684cbd7d999239614d678a06546d2
SHA256fa26de0dd0629dab4b516f2b5ea761e77ff6c213fd3f54460115c21777ad0bbb
SHA51263e6d0baad518c4bdbd00f2ccbe35297269bb7a554e52cfac9f84f7698b9a5b004b497b265c1b5b4f101605fe9cc98be1bfbefe20aaeb918a6dfe5d07ec7133c
-
Filesize
6KB
MD59c41f67de69a95ddacb1603cf4c16696
SHA154d669066607de81eb5c3470fca9dfd759a4ee38
SHA25608149a455ab2f5cb8e689d3f4e58ab24cf01874951f80e71575c03ec110378e9
SHA512f18dd37aba8596900b6b826998cb8d67ed4aea104ca9949c44610fbc66bcef2bf0ffce8563c7a6ee574f0a066130d2d08a27e6c53531d19325f99efd61fb9207
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53a69f805c6ddb3505589b98d8bd26ebe
SHA1c71ec09a69af95dfa671c088b7d3968d31456bd6
SHA256736ad5a76aa20af96f7a4bff3fa26eb4631689c33ef4e16a45de9706fe572e54
SHA512949645ed6e543eb936a0815d623287ebabffea6592d69a0421622f60e8f338d7ef6e40bac7e1986b221dc9a611845060ab49cd49112ddc74e63971e74786f8fd
-
Filesize
10KB
MD52e0fb424ab3525811de3879c6e3bf517
SHA13bad3dd3a19586871995a0e09e6b974fb3493da5
SHA25614d27d83cd12c12d3fa5464b4fffb053e952e2bf4df29702f5935120ecd06660
SHA512aab7554191dcf7ed6f458809bc74f862364edc072e4d4b28f83ac7f984e5a9e4ac1452e533c8bb2ae72b24d21e1101453b1da9d433754511e9c912a01bb8402e
-
Filesize
978KB
MD5bbf15e65d4e3c3580fc54adf1be95201
SHA179091be8f7f7a6e66669b6a38e494cf7a62b5117
SHA256c9f2e2abb046ff2535537182edf9a9b748aa10a22e98a1d8c948d874f4ffb304
SHA5129bb261b4ed84af846e07ffb6352960687e59428fd497faa0a37d70b57a1a7430d48ac350fbb0c3f0f11e4231a98ebca4d6923deba0949fdd7a247a3c02737355
-
Filesize
412KB
MD5cd90e71535a930abcde93f241f94f0f2
SHA121e6030f2bb9f1831e8125da17117ee6d01fa8ce
SHA25639e277a4affb0ff8b7d5c7963c98b5cc201416dde22817df541d1fb83a2ddf04
SHA512a601a11a11ec9a4fbbdec548d2bd66b8c075ce50ec7e0dbb520dc3e15d88c1d2b3b6043e6244e2d37a37cd7fc223bdae2171e649a37a185a6d5beba911074d48