Resubmissions
19-03-2024 20:27
240319-y8vwmsfd7z 719-03-2024 20:23
240319-y6lj7afc9w 719-03-2024 20:16
240319-y2lpdsed73 7Analysis
-
max time kernel
75s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-03-2024 20:16
Behavioral task
behavioral1
Sample
TTD_TRADE_SCAM_CLIENT.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
TTD_TRADE_SCAM_CLIENT.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
CockiLoggerNEW.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
CockiLoggerNEW.pyc
Resource
win10v2004-20240226-en
General
-
Target
TTD_TRADE_SCAM_CLIENT.exe
-
Size
20.7MB
-
MD5
b6709ef840959186d7c0e02fe4c5f51e
-
SHA1
568466b9759939e6c7a4e9cea1309061a1dfd876
-
SHA256
1ddb3a19547881614e3f832f2ba23f2d8f0b18277105322734660cd41bbaa3bd
-
SHA512
f9656d61da31cfd0deb7663074354d103cbd1bb0a48aca7bb06a99f30eb9b3c0b18b60c9e1c9c2b0cf5ff73aea0b447fda38aa4c910f9685c2d0a4951f07bb91
-
SSDEEP
393216:r7DnaUQts2Y2py7ADfDrlpfaMPgFRtaHW8p2m204ezGK0diyRi:v2UQts2Y2CAbPHf9PgF4W8p2mWpAy
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 1900 TTD_TRADE_SCAM_CLIENT.exe 1900 TTD_TRADE_SCAM_CLIENT.exe 1900 TTD_TRADE_SCAM_CLIENT.exe 1900 TTD_TRADE_SCAM_CLIENT.exe 1900 TTD_TRADE_SCAM_CLIENT.exe 1900 TTD_TRADE_SCAM_CLIENT.exe 1900 TTD_TRADE_SCAM_CLIENT.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 292 chrome.exe 292 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe Token: SeShutdownPrivilege 292 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe 292 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1900 2172 TTD_TRADE_SCAM_CLIENT.exe 29 PID 2172 wrote to memory of 1900 2172 TTD_TRADE_SCAM_CLIENT.exe 29 PID 2172 wrote to memory of 1900 2172 TTD_TRADE_SCAM_CLIENT.exe 29 PID 292 wrote to memory of 2188 292 chrome.exe 33 PID 292 wrote to memory of 2188 292 chrome.exe 33 PID 292 wrote to memory of 2188 292 chrome.exe 33 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 2204 292 chrome.exe 35 PID 292 wrote to memory of 1604 292 chrome.exe 36 PID 292 wrote to memory of 1604 292 chrome.exe 36 PID 292 wrote to memory of 1604 292 chrome.exe 36 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37 PID 292 wrote to memory of 1644 292 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\TTD_TRADE_SCAM_CLIENT.exe"C:\Users\Admin\AppData\Local\Temp\TTD_TRADE_SCAM_CLIENT.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\TTD_TRADE_SCAM_CLIENT.exe"C:\Users\Admin\AppData\Local\Temp\TTD_TRADE_SCAM_CLIENT.exe"2⤵
- Loads dropped DLL
PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73d9758,0x7fef73d9768,0x7fef73d97782⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:22⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:82⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:12⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:12⤵PID:700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:22⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1328 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2768 --field-trial-handle=1288,i,16096243464388362939,10865751325377209646,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD59766f3577f397aaa7d2bc18be531f7c0
SHA111e183b09a86da0923891618c2e90bd11c8b5f10
SHA2569e8937fcf41317d1ac1786d23f38bd5b384030f745ed2acb3fdfecb18ac4e6af
SHA512ba12b50e51b322ffef38cff1814b85096dd7890523c2949103b52d4de66949cacf78052a9dd17be40ec4286db0ad529a85c653a07aa1012c941bf77d7c225720
-
Filesize
4KB
MD52aedc144eb0c67ccf4f1afb85ce09ab0
SHA1cdc007063f86ec4b03775b538c50edd65b11ac59
SHA256eb335c8d77d367e8519e339352383c721ec166f74351f12ca33ee29da7314152
SHA5120119c59e65f638b4839377c202fd89b0f5ef532bec5ff36ecfda498ec10032fbcf8a7b0de14977aa4e4f598f1ec1d2678fa149bb9ac692b8711ae2e5f9b1664b
-
Filesize
4KB
MD5e9f4da4b358febcb0e7b7c3d26496236
SHA1698dcf3636a7a47ae7c9e3a59d2632966d88e70d
SHA256b6236d53dbf9ffbbde0f4bb79c415c8c1c9c5243ed1d89467733443a45490221
SHA51279d6825e2aac20d13b6c6875da9ec4287f49ef6705041afe3f16a98c8ef64ff0ac43557add2a7e16347406d477283ddd32ca1abf40a1badb94d86bb553528267
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
21KB
MD5b6275391dfa7a36e7ad607ba66b9aca2
SHA1716696198be8c2ccaafc3a51773c84184fb783e1
SHA2569d01c6df855e8fb8ae4c07af27cbddf9dfd2c4457261622f55115ff19cfec6ba
SHA5121a39a78e5f840ba856c00eebe83c7b616e7fd69ab8fe8a6615234aa70f30654e884e5a33d00066462919dfc6bba141c0fb2474a20b98fb60ddf853147087d961
-
Filesize
21KB
MD5b655f536e30709d8e30c0242e31ce6f0
SHA18e99a8b3b3a3cae775a4e54bc89b55a8f652b289
SHA256c899ad0071e4d9d300212f070a684c4afc99a728f980a638327a204bc48427ed
SHA512e07034b3bced13a12e4f5eee663052725cbd903e969bef9410377f85b958697b4dc7a2491e205bf22ec857e8c6fdb8c0fca855e3f2af83fce64f6071bab7d306
-
Filesize
21KB
MD58fcee7008f86343b3c3457d18de46872
SHA1b4a26fd572e780d29dee5cd1bb9d55d84594ff78
SHA25672222b4a4ca744896832d9bf437d177fd0d92bc564dad4ab79e16ec51ca81187
SHA512cf114d5ec86b28b92bff9de349b7325c2744139398ad59a9f4290cc43db03f81a172f5b029678ef464478ea6e8ad1fce61d5cf73f302043f0b40b2908b73d343
-
Filesize
21KB
MD526c955d0c361a32071108199c55c30d4
SHA1104633221cd25efcb2f4edd5491b27aaffd398c8
SHA256a1ce478f22ffdd124fae31ed61aa09d42b0b62866f0a97161b5196d6d5848a89
SHA512e34f415ce90649d085d648ebdb382b3630471b5928296215a8116f8d7990e922224a55514808b64ec638b164065440c165c76789f0ee711bf65bcf0c62f6b66a
-
Filesize
3.4MB
MD563b618dd53468a980d810378803ad547
SHA159593356788986b1a020cae698c0910382c4ec6d
SHA256c6d4f2c26f3221028bca1fe8cb1c6e5daafaa2fe365736c93b69e1860eabfd4c
SHA512391f71ddfc741a407a3aa3a4fd2b33cff7cbd0320086622eb6874c169ecc6cccb687e2ec620f598bc97f3bd5148abb308d7646e3656e8610ef15120c8fab7b58
-
Filesize
1.1MB
MD507b29a42df29e2b41f241a9b9816520a
SHA1208914e161e62ea65e7cfff63cce4986e2ff7ac8
SHA256af845379ccf526abfcd611255049d4c560d17c37cfdb06341c47f615d106951f
SHA512b5f6d034dd462a7ce7d2b68e71ab64aa21aa1a74b5642470d134abc3280163e47db54dfea2564f3d399adf3dbf108dcd189d5903b5cc4b44f74a540c619e8109
-
Filesize
21KB
MD5708c2861a41de23414da002dd74539e8
SHA17f4ff50aec4375c9bd3dcadd5e8176579b5d7e78
SHA2560189b1fa2f0613581a5648ef2731a77520811cf6964d4d60d73afcb43dddf03f
SHA512a3e17eb3f57504e371b69dacacc3eed42e033e61f63ffe22e94fffb245f3b5edfd16b14421d295d208c6333f7e3402b11f496d4495c767686773e69a06d35e83
-
Filesize
560KB
MD5311b425c6d6c7ebf829a30cedd1926ca
SHA131d8d086a0fdf25f1371273318bb21e0addb0597
SHA2567f52042a200ec1c6d3c04012041c8e4c265ce95a7dd81eb644e0b53bb552fdf8
SHA51266a3ef017e417ea530ddcd6e57ae4e66d03397ce164fa878dc11b5384ac3fdfee82b02d3743361f96cec79e3772aa13931b90a05730e48dd50eb18be276cf8d9