Resubmissions
22-09-2024 05:34
240922-f9g23atfrj 10Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 05:34
Behavioral task
behavioral1
Sample
kovaaks cracked(run as admin).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kovaaks cracked(run as admin).exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
General
-
Target
kovaaks cracked(run as admin).exe
-
Size
17.8MB
-
MD5
910a994f017ceb63838dc14640a808f9
-
SHA1
8a70d025f36c206ce16784a4c818f67a36f157ff
-
SHA256
d6fbe0afe56a6f804f8a9d0a3e77937a409f9c15aa04cafc3a8ac308fed7d4e4
-
SHA512
10407b9cceccdeaa4bb54097723fac28a9a93c00b093bfb4b863e8e3bc2c044665d0fe7c59874ff4d380bfe6bdecda856073f10eed82f06b71284e217c67793c
-
SSDEEP
393216:xqPnLFXlreQ+DOETgsvfG76gVKPQvEdqzIh4Um:YPLFXNeQ/EJGKBwIo
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2460 kovaaks cracked(run as admin).exe -
resource yara_rule behavioral1/files/0x000500000001c856-112.dat upx behavioral1/memory/2460-114-0x000007FEF6580000-0x000007FEF69EE000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe Token: SeShutdownPrivilege 2988 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe 2988 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2460 1260 kovaaks cracked(run as admin).exe 30 PID 1260 wrote to memory of 2460 1260 kovaaks cracked(run as admin).exe 30 PID 1260 wrote to memory of 2460 1260 kovaaks cracked(run as admin).exe 30 PID 2988 wrote to memory of 2784 2988 chrome.exe 32 PID 2988 wrote to memory of 2784 2988 chrome.exe 32 PID 2988 wrote to memory of 2784 2988 chrome.exe 32 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 592 2988 chrome.exe 34 PID 2988 wrote to memory of 1340 2988 chrome.exe 35 PID 2988 wrote to memory of 1340 2988 chrome.exe 35 PID 2988 wrote to memory of 1340 2988 chrome.exe 35 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36 PID 2988 wrote to memory of 1864 2988 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\kovaaks cracked(run as admin).exe"C:\Users\Admin\AppData\Local\Temp\kovaaks cracked(run as admin).exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\kovaaks cracked(run as admin).exe"C:\Users\Admin\AppData\Local\Temp\kovaaks cracked(run as admin).exe"2⤵
- Loads dropped DLL
PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7519758,0x7fef7519768,0x7fef75197782⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:22⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:82⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1296 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:22⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1324 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:82⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3716 --field-trial-handle=1284,i,8210401377154105450,6126067009803701764,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
Filesize
19KB
MD51d7e487a0c436b8e1225d54e694abacf
SHA1860df7669307906d2397a92ef259de70e2228d72
SHA25629545666440dbbccc94e0a2969935dd826b0b5ff6a54c24006ebe073a7592991
SHA512aa0d1723f9107b73324032e0b5904526ed916bf6aebd7255e26c2888289194647b4c946cd231fabe11a595ec79835c6631cf37d29706d6b87aaa4de58543f097
-
Filesize
280B
MD5a1df9a0a37e83b350a9cc692a2face6f
SHA15581aa5a502024e23199466a776af68b1b2e6a87
SHA256d5c61f5892138ee890632a01ea2f77fba7d417e1f8d2b6e7bb202f464da9b77d
SHA5125bb1778573e789104e777d1d0da8c86576995c9d548312eab96ffc2d97501e3c90df2e546dfb60eb274314c8bd4e38930a594ec3dfaa1101cc5477546d109499
-
Filesize
168B
MD522d4495e92847cb3813c31fc76bef945
SHA171c2f3b865196f793eb53709ab15c991d0793463
SHA2569d161fca5c88d696b8482030b999ccd4fba27cad346d8cff4c24d424d6b6175a
SHA512718c75bd1b1c9d634380c8cb2147611d4bf11fb1894ad605936cd44d2e5875a97d01786ac08e07a2c0fb5e43b1c9a1e175ba1d98e4333bf123dd9569c19d2232
-
Filesize
168B
MD5f08d59cb646d71e5cc8c152425dddb7a
SHA1b58eafa6b1339f4f398dd137aec40c98e37cd07c
SHA25614f8481d08a5c8ea11e152db4ec2f86b08421cdb6001e69469ec53465265fbee
SHA512de0a3d041db7d4c3a297676c339e3e85eca9a60e34002d033c1d8bf116c179def7b690d3e6f5edbefb2b760b35bc7b01b64ace72e76e407776b8e464ff3f6bf0
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD589e8086d7491d0355558615b3070cffc
SHA1e5bbd33dcb233bfb66c2d0e1268d7482245a791b
SHA2560d570bc8e6cb745396a17b0f35679058a0bb55a883629e7aad2fea089be292d4
SHA512bd50898bbb4d279fefeb915fbdd31e26fbaf29244f4639b45e470ebad3668dcd95b498ab5147e3262d85efe0247dceeba46ed4c9b72c9f04966184faebd22f93
-
Filesize
5KB
MD5a86cdb32cda4ca5c01484c657a90c580
SHA1662ab91ef4bf8353f20064302f923d3b006d5534
SHA25610640bd88e925c1e6d577d346942edce71e2667f0b62fec981d7ed4a86335673
SHA512f7a1c5874ba8e373326e45668a1170f2626f8292e0d3a3c18c2aa2108cc04a60858d5ba01e93b28496a2fafa81a910f5d6d89474644caff285046e549837ed07
-
Filesize
5KB
MD5b0e882b42c357ece535a91864e54bade
SHA169cf4d312f65da23c503e80b146f6e35e66a36e8
SHA256c418cdf93d52879c857491d1b0a5cc6633bf2ab4445f7dee94d2dd9ae245d2f4
SHA51291ea73f2e1d7c3eec820c28a3f62f33ea9a9a96146c3f51c7c026c3f7711d6d04dec95e3e7686567792d1f01f7da33fbd30bb497304c6bf0a8062fdd5b875d6e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378