Overview
overview
10Static
static
3e126c11aec...28.exe
windows7-x64
10e126c11aec...28.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3BCGCBProRe...T.html
windows7-x64
3BCGCBProRe...T.html
windows10-2004-x64
3System.Run...es.dll
windows7-x64
1System.Run...es.dll
windows10-2004-x64
1System.Threading.dll
windows7-x64
1System.Threading.dll
windows10-2004-x64
1Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:31
Static task
static1
Behavioral task
behavioral1
Sample
e126c11aec2897bd7959747e70bc85d4153abdadbe45344bb41771ced23f3228.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e126c11aec2897bd7959747e70bc85d4153abdadbe45344bb41771ced23f3228.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
BCGCBProRes_it-IT.html
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
BCGCBProRes_it-IT.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
System.Runtime.Handles.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
System.Runtime.Handles.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
System.Threading.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
System.Threading.dll
Resource
win10v2004-20241007-en
General
-
Target
BCGCBProRes_it-IT.html
-
Size
1KB
-
MD5
5343c1a8b203c162a3bf3870d9f50fd4
-
SHA1
04b5b886c20d88b57eea6d8ff882624a4ac1e51d
-
SHA256
dc1d54dab6ec8c00f70137927504e4f222c8395f10760b6beecfcfa94e08249f
-
SHA512
e0f50acb6061744e825a4051765cebf23e8c489b55b190739409d8a79bb08dac8f919247a4e5f65a015ea9c57d326bbef7ea045163915129e01f316c4958d949
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441763359" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{332C9E21-C706-11EF-A27C-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f9192d15f8fa0459b58d160e7b24c710000000002000000000010660000000100002000000090759debfb9f9fe727e820482edeed82df6cb660051d084f8d6c202e1fb34850000000000e800000000200002000000010d04cc791c3f31a67a236f009213a046048790644089d5e98af960070a501bf20000000dd04804da2093e91c886e05ecf41d45cc27d7b0133051d6622268965ad0e0158400000002396405c793d489214d99bec36652580238e9a6c3102df341b59807fbe3a21ca8b02f60aae6a3d7db1d463a5f24368cba6fe45c33d1607e8b7f9c3069384bae0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005f9192d15f8fa0459b58d160e7b24c71000000000200000000001066000000010000200000001221b790aad8d00382bcfebdb6e62bf88957a090d23260be6909d8ee72a782da000000000e80000000020000200000000d76f3dc3ac71228e6772cc3190d14c2561b3d5491a0631e949ea878f7f300e6900000002f1343ae2fa3e9c1d9a4c8dfb0f7e6e87632878cf115b71915479bc53d147665ba2434c67c13aba66d5e48423d15a3b648e89120184bba1c517b85fc08b16bebf7ab322554a0168f881a37fff69111222c040d17074d10c02a687ac7ed2ad903588193e4f358211fb08b68064a1a9ef8ce62c73d544d0d3e4c6b2a6805fca2e09a2bc6c06b7c23d5b375f5091297741b4000000004faa912f2b977447d126071f3f055a4a578ff6788bae96def21ca83a703aa3a069f156d2ef2793e0484dfdc187eed91ee93bf8a25e6c345aabe3d10a4ab919a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a69d07135bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1692 iexplore.exe 1692 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 3060 1692 iexplore.exe 30 PID 1692 wrote to memory of 3060 1692 iexplore.exe 30 PID 1692 wrote to memory of 3060 1692 iexplore.exe 30 PID 1692 wrote to memory of 3060 1692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\BCGCBProRes_it-IT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca9718babb60fd0a337772940568729
SHA1ffcd4e148eae2c92892ecedba225e8369eb85924
SHA256d17b5a3a8e75b37512eb7cd4de253a2e6731da1f941e3e146e90f010b788eedc
SHA5120befbc35704c95292511faafda816836334e3efbeade25a1e1a0947f88378e65120367b807abea746e453662acd16e601b6e8ce015dc77a560ccfefe9767aa07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb5ca377161fd1505454ded5fde4b57
SHA1b263447280aa6451ba99c2ac188a15c79e3eb333
SHA256c6603b66ff0b4483e1455aedc7ab1a8af2e913886530a16bf0c31fc8e3886b78
SHA512f954473dced32bc2c76941618967684268358999e26cc458bcf75483887a99d61adf354b948555d65e259a0a36227c841580a7d2733114099673178565581806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b85db8843cf71eb5c209f890ea08db
SHA1127cd1c7b9f7bec8d2bb3e51c518e7d7b8d87e69
SHA256e07ce255b236d470e2a95772d9ed949950c10303321a6fb912c1a43124c4c6f2
SHA5129dd3a8f2e4805aa93143f83b72ac519d6c88b460a315843c448b467ee11a7f80e244c3a34d0270f4856a8938d32bd6f61d6534aef0cbe8330305504382ba14d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851b553c569f54e2734ac3f43eecff93
SHA158c4da4fac19794f2f1a706a1d0665c5a5e214af
SHA25601bf03545891d287ebff42c6eddf9d52884b398b789acf2d8b045018107d2766
SHA512d96466bf593b26a60dd9add0e98b9e78228192e00580e8671bc7ad00ea7eeaac8c4e592612b19bb971705b38440d6ca411f55266c7dabe554385bd47860b2758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584dbc41b1a4dc4517d83222ae3b470dd
SHA15b02ea46207b5e82746f8dd02788cbd5b505b1b4
SHA256b52d3edfe9e73a428515c45de7a026a1139bf3d2b05b5145b0f3a0453fad9d8a
SHA51243ae9db582dd4c8eac3a68da561fff82e11d1e6f231dd212dfd370839a5de992f9f1692de1b9302ae9b2dcecc32a00570befb88efffca48991ed4b74ab1e4f36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55189662df61306a7c0d75dd76e3ec6f5
SHA153d0520c069758df24fad562d7f1a51f64d19c38
SHA2565e7dc455cef6c520e30dc782c61d169251824ecbbac17ffd4a2add3fa901e641
SHA51298a4866afa31ff8a58eb90a2896e900fe1a815e43e715eedccd371e7fb13ad7af2e94a3f832dbbc8010d54f0bba88f89105cc1c80a2416bb31b5c6ef1d46e54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318eb529062b4d7a1ba431f849b62608
SHA1d725b97797bc76dc7329404f94bc139e7063a97b
SHA256c7fe2147cd803084fb2c51581a1caad016a16b389f457adc252a1d297e62a17c
SHA512373ade15799673326cf0bfcca0b1aa19a2132ebc01771ad2644a4869ec6592b0a4e85b5acdd735989bbe0417dbf0016c0fec8834a010fe0c5b68b4769f06d020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597af82548706935160f124c2daab92c
SHA1fe99a2a9b8dbfdceff357f1392acfdf6a8fe1a80
SHA256de52846dc25c88add125f5459dc1213ca5542b74874b74abaa554798f2667bfd
SHA5129a61f7356b38770daa086e6206326141e1f5d7e28817ed0492df5c59f73e6df7dbbd4a6781a218c9b93dbf0e771dce6c035126e947ee9ead456d4d3a1767e224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a6ffd167f0fc45f0e75ac8a2fc6181
SHA10d5ef54122e518309d3065f0f8258ebfd9436c4c
SHA256598141372b335c9220396e3e7c0ce9b65eb157705278d388b044cdd0e25b68cc
SHA512c9b4388a08b5f671a634853b1e6b0894fd983732bf9c15d2062180bc330347336b85a691a94a3d2e0fe2f11112d55b26f5b9a082f82928d369048322629648db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a2d54474c7fed56ef686071c6f3f46
SHA15967e9280f43fbc5b7c3bcd98cc52a120842b064
SHA2563039845ce95cdf5e13e926369f6784ed0e82c23a4b3c15806b45a5e00360daca
SHA51291f59abd2c970ac1af81efb2c17ae439a451d8422aa55104fe53ab2f819c5f7bd5504575186ba18e97b206f290a5f5d242803be430027c1b4260737702c54c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703739f98087fadfffef8b440ed0c9f1
SHA154e90ba7e8ebb19277e46c273520e77115ef0b09
SHA2563c414d6e4f15841ef0ca03a410f8f26c3390e6e450464361edef6bc603b305e9
SHA5128812a4e995946dfd48e7c4105275f90b9d296f105e461e7f98fa81e061b30a255b905e7ef76ec4aa72d752fbed1bfbbb366a388ef357f5970e0d3bcd08b25630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008c711318295844ee7852a7e9b97363
SHA1be94b08185b0907b316c3d5b6b377f4469d25224
SHA256660cc9e55d860f552e6e24eb27df4c5f3cd8d81fcc7182f707433c2ce86dae0b
SHA5127669b50b014d17822a352e8b81a6991fc95b4db01cd564db770c90157775691e1bd0eb30dcc5de3834617df39430bb14d7e874d6c2fc79318dbd06e4519e18fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d6ae61e54b87c1873e098cdb393a035
SHA1f8d881fc1a22cb5f11cca2ccf13565bab7401506
SHA256e77e06a6d7f43da71e4fb5b4767eeba3cd99f630cf6503947ada3ff9d4a171ec
SHA512681d3476ef517530e6ffc9cb4772b890833190ed8996ef7235f2fb22023a69ac49470a344a2419b5e01e2dff01bf395d5dd28df0ff5e0e778c169b266d218698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca557f49d8553156cd56c76b1d44cc8d
SHA11b243bdae8dde974bae33efdd8aba41ca249efd3
SHA256ffe58ae496e4dad4c0466d131443add768a30aeefb22d037bfd1c2330d72c9b9
SHA51269df89ac5a15846228feeed58cc0ad4cc21c4b67433898fb7c30a6d786c4471b0138a02d389e7d835376962f0c94665cec63fda13c00e2a33bffffb8dd4714b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59af4190e1401063e64c8f24071779159
SHA1ef95e802db308661501e4dccb2d986d7ed8d089e
SHA25621d14e8dd0607d3a450d48ffb3ea71825b6f018180a8e23825b436da1f198df9
SHA5129c9a9b09abfc8ccfdb8a9a587d23c5c527a00ee0e70c0ef1b8a370403b249a09b5526b336ce5a753fc8298b5648a519c8bfc1a2dbabab62582b3aa6410b331ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f43e355b109349d493af6a4730520425
SHA10379df0cf57d3a87b28bdb4163149f14b4007384
SHA2566cb3d0d3fbb36cb5503b84d527b98b7168612f30d76347f74b8dfebe14b90f73
SHA51212374ffc8df47bfd3b59ef4083787732135c4c5229e2cb27b8614fa4fa2c2fefa078b949e19e054791bc354aa3bcae9c48abfb56938db0625b3af4d90e1513f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5726f1edf8b138a4cdb82574ca8bb7884
SHA15b65cca7697c8cb85545762f0c79e870cb8a00f3
SHA256c8db3b1bc333f75443bb6ffefca8fe05a4dad74aa2fb19268b0d78a7f9864561
SHA5123045fe6d5e8ba710df326b45cb0e6eb71ce7de8927f5522f31a3a2a67f4b2d4b60136a659a323c37d7076621897830b7c59c169934433f2b9eec2be096a2b25e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bff8c8ff561063139916bd788fa9d0
SHA1c4ea6b25836d691d2b30c3c627927e2de29bae97
SHA2566490e4a14cb7c8e23331ec03376ab1ee2b2134dd8124d46950d3ba2e97c53c4d
SHA512563d35e8da9b3630704000193d64f3e2de1694c7104bd655de2fd55c288888cb88ef8bc22acc82ed418a46b0483474b091be82ae5c2154b506ca9754817a0a77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b